<?xml version="1.0" encoding="UTF-8"?>
	<oval_definitions
		xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd"
		xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5"
		xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
		xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5"
		xmlns:oval-def="http://oval.mitre.org/XMLSchema/oval-definitions-5">
	  <generator>
	      <oval:product_name>Marcus Updateinfo to OVAL Converter</oval:product_name>
	      <oval:schema_version>5.5</oval:schema_version>
	      <oval:timestamp>2022-04-29T06:20:08</oval:timestamp>
	  </generator>
<definitions>
<definition id="oval:org.opensuse.security:def:20022443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2002-2443</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2002-2443" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-2443" source="CVE"/>
    <reference ref_id="SUSE CVE-2002-2443" ref_url="https://www.suse.com/security/cve/CVE-2002-2443" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000528.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1119-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1122-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00007.html" source="SUSE-SU"/>
    <description>
    schpw.c in the kpasswd service in kadmind in MIT Kerberos 5 (aka krb5) before 1.11.3 does not properly validate UDP packets before sending responses, which allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged packet that triggers a communication loop, as demonstrated by krb_pingpong.nasl, a related issue to CVE-1999-0103.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2002-2443/">CVE-2002-2443</cve>
	<bugzilla href="https://bugzilla.suse.com/825985">SUSE bug 825985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871411">SUSE bug 871411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887734">SUSE bug 887734</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009586719" comment="krb5-1.6.3-133.49.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009586720" comment="krb5-32bit-1.6.3-133.49.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009586721" comment="krb5-client-1.6.3-133.49.56.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20042771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-2771</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2004-2771" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2771" source="CVE"/>
    <reference ref_id="SUSE CVE-2004-2771" ref_url="https://www.suse.com/security/cve/CVE-2004-2771" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001127.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1713-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00097.html" source="SUSE-SU"/>
    <description>
    The expand function in fio.c in Heirloom mailx 12.5 and earlier and BSD mailx 8.1.2 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in an email address.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2004-2771/">CVE-2004-2771</cve>
	<bugzilla href="https://bugzilla.suse.com/909208">SUSE bug 909208</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009586750" comment="mailx-12.5-1.7.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2721</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2007-2721" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2721" source="CVE"/>
    <reference ref_id="SUSE CVE-2007-2721" ref_url="https://www.suse.com/security/cve/CVE-2007-2721" source="SUSE CVE"/>
    <description>
    The jpc_qcx_getcompparms function in jpc/jpc_cs.c for the JasPer JPEG-2000 library (libjasper) before 1.900 allows remote user-assisted attackers to cause a denial of service (crash) and possibly corrupt the heap via malformed image files, as originally demonstrated using imagemagick convert.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-2721/">CVE-2007-2721</cve>
	<bugzilla href="https://bugzilla.suse.com/258253">SUSE bug 258253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/339731">SUSE bug 339731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/340138">SUSE bug 340138</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334270" comment="ghostscript-library is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4772</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2007-4772" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4772" source="CVE"/>
    <reference ref_id="SUSE CVE-2007-4772" ref_url="https://www.suse.com/security/cve/CVE-2007-4772" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2008:005" ref_url="https://lists.opensuse.org/opensuse-security-announce/2008-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0539-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0555-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0531-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0578-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00056.html" source="SUSE-SU"/>
    <description>
    The regular expression parser in TCL before 8.4.17, as used in PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, and 7.4 before 7.4.19, allows context-dependent attackers to cause a denial of service (infinite loop) via a crafted regular expression.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4772/">CVE-2007-4772</cve>
	<bugzilla href="https://bugzilla.suse.com/329282">SUSE bug 329282</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567423" comment="libecpg6-9.4.6-0.14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567424" comment="libpq5-9.4.6-0.14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567425" comment="libpq5-32bit-9.4.6-0.14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567426" comment="postgresql94-9.4.6-0.14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567427" comment="postgresql94-docs-9.4.6-0.14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6209</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2007-6209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6209" source="CVE"/>
    <reference ref_id="SUSE CVE-2007-6209" ref_url="https://www.suse.com/security/cve/CVE-2007-6209" source="SUSE CVE"/>
    <description>
    Util/difflog.pl in zsh 4.3.4 allows local users to overwrite arbitrary files via a symlink attack on temporary files.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6209/">CVE-2007-6209</cve>
	<bugzilla href="https://bugzilla.suse.com/346454">SUSE bug 346454</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339511" comment="zsh is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6746</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2007-6746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6746" source="CVE"/>
    <reference ref_id="SUSE CVE-2007-6746" ref_url="https://www.suse.com/security/cve/CVE-2007-6746" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-August/000582.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0806-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00052.html" source="SUSE-SU"/>
    <description>
    telepathy-idle before 0.1.15 does not verify (1) that the issuer is a trusted CA, (2) that the server hostname matches a domain name in the subject's Common Name (CN), or (3) the expiration date of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6746/">CVE-2007-6746</cve>
	<bugzilla href="https://bugzilla.suse.com/817120">SUSE bug 817120</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566189" comment="telepathy-idle-0.1.5-1.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20087316" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-7316</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-7316" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-7316" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-7316" ref_url="https://www.suse.com/security/cve/CVE-2008-7316" source="SUSE CVE"/>
    <description>
    mm/filemap.c in the Linux kernel before 2.6.25 allows local users to cause a denial of service (infinite loop) via a writev system call that triggers an iovec of zero length, followed by a page fault for an iovec of nonzero length.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2008-7316/">CVE-2008-7316</cve>
	<bugzilla href="https://bugzilla.suse.com/963764">SUSE bug 963764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0269</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0269" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0269" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0269" ref_url="https://www.suse.com/security/cve/CVE-2009-0269" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:030" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:031" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html" source="SUSE-SU"/>
    <description>
    fs/ecryptfs/inode.c in the eCryptfs subsystem in the Linux kernel before 2.6.28.1 allows local users to cause a denial of service (fault or memory corruption), or possibly have unspecified other impact, via a readlink call that results in an error, leading to use of a -1 return value as an array index.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-04-28"/>
	<updated date="2022-04-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0269/">CVE-2009-0269</cve>
	<bugzilla href="https://bugzilla.suse.com/470942">SUSE bug 470942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0322</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0322" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0322" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0322" ref_url="https://www.suse.com/security/cve/CVE-2009-0322" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:015" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:030" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:031" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html" source="SUSE-SU"/>
    <description>
    drivers/firmware/dell_rbu.c in the Linux kernel before 2.6.27.13, and 2.6.28.x before 2.6.28.2, allows local users to cause a denial of service (system crash) via a read system call that specifies zero bytes from the (1) image_type or (2) packet_size file in /sys/devices/platform/dell_rbu/.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-04-28"/>
	<updated date="2022-04-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0322/">CVE-2009-0322</cve>
	<bugzilla href="https://bugzilla.suse.com/470943">SUSE bug 470943</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0689</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0689" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0689" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0689" ref_url="https://www.suse.com/security/cve/CVE-2009-0689" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:052" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:018" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:020" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1828-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002433.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0273-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-05/msg00021.html" source="SUSE-SU"/>
    <description>
    Array index error in the (1) dtoa implementation in dtoa.c (aka pdtoa.c) and the (2) gdtoa (aka new dtoa) implementation in gdtoa/misc.c in libc, as used in multiple operating systems and products including in FreeBSD 6.4 and 7.2, NetBSD 5.0, OpenBSD 4.5, Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4, K-Meleon 1.5.3, SeaMonkey 1.1.8, and other products, allows context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large precision value in the format argument to a printf function, which triggers incorrect memory allocation and a heap-based buffer overflow during conversion to a floating-point number.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0689/">CVE-2009-0689</cve>
	<bugzilla href="https://bugzilla.suse.com/522109">SUSE bug 522109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/545277">SUSE bug 545277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/546371">SUSE bug 546371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/557126">SUSE bug 557126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/557127">SUSE bug 557127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/557128">SUSE bug 557128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/557671">SUSE bug 557671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/590499">SUSE bug 590499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/607935">SUSE bug 607935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/851803">SUSE bug 851803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958097">SUSE bug 958097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963818">SUSE bug 963818</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566185" comment="ruby-1.8.7.p357-0.9.13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567394" comment="bytefx-data-mysql-2.6.7-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567395" comment="ibm-data-db2-2.6.7-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567396" comment="mono-core-2.6.7-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567397" comment="mono-data-2.6.7-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567398" comment="mono-data-firebird-2.6.7-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567399" comment="mono-data-oracle-2.6.7-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567400" comment="mono-data-postgresql-2.6.7-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567401" comment="mono-data-sqlite-2.6.7-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567402" comment="mono-data-sybase-2.6.7-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567403" comment="mono-devel-2.6.7-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567404" comment="mono-extras-2.6.7-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567405" comment="mono-jscript-2.6.7-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567406" comment="mono-locale-extras-2.6.7-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567407" comment="mono-nunit-2.6.7-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567408" comment="mono-wcf-2.6.7-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567409" comment="mono-web-2.6.7-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567410" comment="mono-winforms-2.6.7-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567411" comment="monodoc-core-2.6.7-0.16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091046" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1046</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1046" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1046" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1046" ref_url="https://www.suse.com/security/cve/CVE-2009-1046" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:017" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:045" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-08/msg00007.html" source="SUSE-SU"/>
    <description>
    The console selection feature in the Linux kernel 2.6.28 before 2.6.28.4, 2.6.25, and possibly earlier versions, when the UTF-8 console is used, allows physically proximate attackers to cause a denial of service (memory corruption) by selecting a small number of 3-byte UTF-8 characters, which triggers an "off-by-two memory error." NOTE: it is not clear whether this issue crosses privilege boundaries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1046/">CVE-2009-1046</cve>
	<bugzilla href="https://bugzilla.suse.com/478699">SUSE bug 478699</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20095138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-5138</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-5138" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5138" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-5138" ref_url="https://www.suse.com/security/cve/CVE-2009-5138" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0322-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0445-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00020.html" source="SUSE-SU"/>
    <description>
    GnuTLS before 2.7.6, when the GNUTLS_VERIFY_ALLOW_X509_V1_CA_CRT flag is not enabled, treats version 1 X.509 certificates as intermediate CAs, which allows remote attackers to bypass intended restrictions by leveraging a X.509 V1 certificate from a trusted CA to issue new certificates, a different vulnerability than CVE-2014-1959.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-5138/">CVE-2009-5138</cve>
	<bugzilla href="https://bugzilla.suse.com/865993">SUSE bug 865993</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009587393" comment="gnutls-2.4.1-24.39.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009587394" comment="libgnutls26-2.4.1-24.39.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009587395" comment="libgnutls26-32bit-2.4.1-24.39.49.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20095146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-5146</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-5146" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5146" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-5146" ref_url="https://www.suse.com/security/cve/CVE-2009-5146" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00024.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-5146/">CVE-2009-5146</cve>
	<bugzilla href="https://bugzilla.suse.com/915976">SUSE bug 915976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919648">SUSE bug 919648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922647">SUSE bug 922647</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009587402" comment="libopenssl0_9_8-0.9.8j-0.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009587403" comment="libopenssl0_9_8-32bit-0.9.8j-0.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009587404" comment="openssl-0.9.8j-0.70.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2240</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2240" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2240" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2240" ref_url="https://www.suse.com/security/cve/CVE-2010-2240" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:038" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-May/000117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-May/000121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0561-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-08/msg00064.html" source="SUSE-SU"/>
    <description>
    The do_anonymous_page function in mm/memory.c in the Linux kernel before 2.6.27.52, 2.6.32.x before 2.6.32.19, 2.6.34.x before 2.6.34.4, and 2.6.35.x before 2.6.35.2 does not properly separate the stack and the heap, which allows context-dependent attackers to execute arbitrary code by writing to the bottom page of a shared memory segment, as demonstrated by a memory-exhaustion attack against the X.Org X server.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2240/">CVE-2010-2240</cve>
	<bugzilla href="https://bugzilla.suse.com/1039348">SUSE bug 1039348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/211997">SUSE bug 211997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/546062">SUSE bug 546062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/59807">SUSE bug 59807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/615929">SUSE bug 615929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/618152">SUSE bug 618152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/632737">SUSE bug 632737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/643986">SUSE bug 643986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/746947">SUSE bug 746947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/746949">SUSE bug 746949</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009587785" comment="xorg-x11-server-rdp-7.3.99-3.18.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2243</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2243" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2243" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2243" ref_url="https://www.suse.com/security/cve/CVE-2010-2243" source="SUSE CVE"/>
    <description>
    A vulnerability exists in kernel/time/clocksource.c in the Linux kernel before 2.6.34 where on non-GENERIC_TIME systems (GENERIC_TIME=n), accessing /sys/devices/system/clocksource/clocksource0/current_clocksource results in an OOPS.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2243/">CVE-2010-2243</cve>
	<bugzilla href="https://bugzilla.suse.com/617903">SUSE bug 617903</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2800</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2800" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2800" ref_url="https://www.suse.com/security/cve/CVE-2010-2800" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000908.html" source="SUSE-SU"/>
    <description>
    The MS-ZIP decompressor in cabextract before 1.3 allows remote attackers to cause a denial of service (infinite loop) via a malformed MSZIP archive in a .cab file during a (1) test or (2) extract action, related to the libmspack library.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2800/">CVE-2010-2800</cve>
	<bugzilla href="https://bugzilla.suse.com/627753">SUSE bug 627753</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566369" comment="cabextract-1.2-2.10.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2801</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2801" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2801" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2801" ref_url="https://www.suse.com/security/cve/CVE-2010-2801" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000908.html" source="SUSE-SU"/>
    <description>
    Integer signedness error in the Quantum decompressor in cabextract before 1.3, when archive test mode is used, allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted Quantum archive in a .cab file, related to the libmspack library.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2801/">CVE-2010-2801</cve>
	<bugzilla href="https://bugzilla.suse.com/627753">SUSE bug 627753</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566369" comment="cabextract-1.2-2.10.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20105107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-5107</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-5107" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5107" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-5107" ref_url="https://www.suse.com/security/cve/CVE-2010-5107" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-August/000579.html" source="SUSE-SU"/>
    <description>
    The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodically making many new TCP connections.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-10"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-5107/">CVE-2010-5107</cve>
	<bugzilla href="https://bugzilla.suse.com/1074631">SUSE bug 1074631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802639">SUSE bug 802639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/841638">SUSE bug 841638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/858359">SUSE bug 858359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880259">SUSE bug 880259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/881234">SUSE bug 881234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996040">SUSE bug 996040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566167" comment="openssh-5.1p1-41.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566168" comment="openssh-askpass-5.1p1-41.57.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20105110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-5110</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-5110" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5110" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-5110" ref_url="https://www.suse.com/security/cve/CVE-2010-5110" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000877.html" source="SUSE-SU"/>
    <description>
    DCTStream.cc in Poppler before 0.13.3 allows remote attackers to cause a denial of service (crash) via a crafted PDF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-5110/">CVE-2010-5110</cve>
	<bugzilla href="https://bugzilla.suse.com/845765">SUSE bug 845765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970115">SUSE bug 970115</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566855" comment="libpoppler-glib4-0.12.3-1.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566856" comment="libpoppler-qt4-3-0.12.3-1.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566857" comment="libpoppler5-0.12.3-1.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563470" comment="poppler-tools-0.12.3-1.10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20105313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-5313</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-5313" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5313" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-5313" ref_url="https://www.suse.com/security/cve/CVE-2010-5313" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html" source="SUSE-SU"/>
    <description>
    Race condition in arch/x86/kvm/x86.c in the Linux kernel before 2.6.38 allows L2 guest OS users to cause a denial of service (L1 guest OS crash) via a crafted instruction that triggers an L2 emulation failure report, a similar issue to CVE-2014-7842.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-5313/">CVE-2010-5313</cve>
	<bugzilla href="https://bugzilla.suse.com/905312">SUSE bug 905312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907822">SUSE bug 907822</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1083</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1083" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1083" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1083" ref_url="https://www.suse.com/security/cve/CVE-2011-1083" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0554-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0554-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0540-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0799-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1439-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00002.html" source="SUSE-SU"/>
    <description>
    The epoll implementation in the Linux kernel 2.6.37.2 and earlier does not properly traverse a tree of epoll file descriptors, which allows local users to cause a denial of service (CPU consumption) via a crafted application that makes epoll_create and epoll_ctl system calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1083/">CVE-2011-1083</cve>
	<bugzilla href="https://bugzilla.suse.com/676204">SUSE bug 676204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/690537">SUSE bug 690537</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009588509" comment="kernel-default-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588510" comment="kernel-default-base-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588511" comment="kernel-default-devel-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588512" comment="kernel-default-extra-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588513" comment="kernel-source-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588514" comment="kernel-syms-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588515" comment="kernel-trace-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588516" comment="kernel-trace-base-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588517" comment="kernel-trace-devel-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588518" comment="kernel-trace-extra-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588519" comment="kernel-xen-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588520" comment="kernel-xen-base-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588521" comment="kernel-xen-devel-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588522" comment="kernel-xen-extra-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566052" comment="xen-kmp-default-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566054" comment="xen-kmp-trace-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111344" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1344</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1344" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1344" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1344" ref_url="https://www.suse.com/security/cve/CVE-2011-1344" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-December/000309.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in WebKit, as used in Apple Safari before 5.0.5; iOS before 4.3.2 for iPhone, iPod, and iPad; iOS before 4.2.7 for iPhone 4 (CDMA); and possibly other products allows remote attackers to execute arbitrary code by adding children to a WBR tag and then removing the tag, related to text nodes, as demonstrated by Chaouki Bekrar during a Pwn2Own competition at CanSecWest 2011.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1344/">CVE-2011-1344</cve>
	<bugzilla href="https://bugzilla.suse.com/688702">SUSE bug 688702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820928">SUSE bug 820928</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009588591" comment="libwebkit-1_0-2-1.2.7-0.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588592" comment="libwebkit-lang-1.2.7-0.15.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2485</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2485" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2485" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2485" ref_url="https://www.suse.com/security/cve/CVE-2011-2485" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-July/000172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-July/000174.html" source="SUSE-SU"/>
    <description>
    The gdk_pixbuf__gif_image_load function in gdk-pixbuf/io-gif.c in gdk-pixbuf before 2.23.5 does not properly handle certain return values, which allows remote attackers to cause a denial of service (memory consumption) via a crafted GIF image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2485/">CVE-2011-2485</cve>
	<bugzilla href="https://bugzilla.suse.com/702028">SUSE bug 702028</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566013" comment="gtk2-2.18.9-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566014" comment="gtk2-32bit-2.18.9-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566015" comment="gtk2-devel-2.18.9-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566016" comment="gtk2-lang-2.18.9-0.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2494</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2494" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2494" ref_url="https://www.suse.com/security/cve/CVE-2011-2494" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0153-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0554-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0554-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0927-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00064.html" source="SUSE-SU"/>
    <description>
    kernel/taskstats.c in the Linux kernel before 3.1 allows local users to obtain sensitive I/O statistics by sending taskstats commands to a netlink socket, as demonstrated by discovering the length of another user's password.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-19"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2494/">CVE-2011-2494</cve>
	<bugzilla href="https://bugzilla.suse.com/703156">SUSE bug 703156</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009588509" comment="kernel-default-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588510" comment="kernel-default-base-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588511" comment="kernel-default-devel-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588512" comment="kernel-default-extra-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588513" comment="kernel-source-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588514" comment="kernel-syms-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588515" comment="kernel-trace-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588516" comment="kernel-trace-base-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588517" comment="kernel-trace-devel-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588518" comment="kernel-trace-extra-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588519" comment="kernel-xen-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588520" comment="kernel-xen-base-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588521" comment="kernel-xen-devel-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588522" comment="kernel-xen-extra-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566052" comment="xen-kmp-default-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566054" comment="xen-kmp-trace-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3201</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3201" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3201" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3201" ref_url="https://www.suse.com/security/cve/CVE-2011-3201" source="SUSE CVE"/>
    <description>
    GNOME Evolution before 3.2.3 allows user-assisted remote attackers to read arbitrary files via the attachment parameter to a mailto: URL, which attaches the file to the email.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3201/">CVE-2011-3201</cve>
	<bugzilla href="https://bugzilla.suse.com/714939">SUSE bug 714939</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009588862" comment="evolution-2.28.2-0.28.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588863" comment="evolution-data-server-2.28.2-0.29.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588864" comment="evolution-data-server-32bit-2.28.2-0.29.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588865" comment="evolution-data-server-lang-2.28.2-0.29.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588866" comment="evolution-ews-2.28-0.10.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588867" comment="evolution-ews-lang-2.28-0.10.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588868" comment="evolution-lang-2.28.2-0.28.21 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588869" comment="evolution-pilot-2.28.2-0.28.21 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3970</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3970" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3970" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3970" ref_url="https://www.suse.com/security/cve/CVE-2011-3970" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-April/000068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0464-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-April/000069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000629.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0343-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-03/msg00009.html" source="SUSE-SU"/>
    <description>
    libxslt, as used in Google Chrome before 17.0.963.46, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3970/">CVE-2011-3970</cve>
	<bugzilla href="https://bugzilla.suse.com/746039">SUSE bug 746039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/747327">SUSE bug 747327</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566146" comment="libxslt-1.1.24-19.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566147" comment="libxslt-32bit-1.1.24-19.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4028</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-4028" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4028" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-4028" ref_url="https://www.suse.com/security/cve/CVE-2011-4028" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2011:1292-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-12/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-May/000117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-May/000121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0227-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00008.html" source="SUSE-SU"/>
    <description>
    The LockServer function in os/utils.c in X.Org xserver before 1.11.2 allows local users to determine the existence of arbitrary files via a symlink attack on a temporary lock file, which is handled differently if the file exists.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4028/">CVE-2011-4028</cve>
	<bugzilla href="https://bugzilla.suse.com/722944">SUSE bug 722944</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009587785" comment="xorg-x11-server-rdp-7.3.99-3.18.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4029</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-4029" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4029" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-4029" ref_url="https://www.suse.com/security/cve/CVE-2011-4029" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2011:1292-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-12/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-May/000117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-May/000121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0227-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00008.html" source="SUSE-SU"/>
    <description>
    The LockServer function in os/utils.c in X.Org xserver before 1.11.2 allows local users to change the permissions of arbitrary files to 444, read those files, and possibly cause a denial of service (removed execution permission) via a symlink attack on a temporary lock file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4029/">CVE-2011-4029</cve>
	<bugzilla href="https://bugzilla.suse.com/722944">SUSE bug 722944</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009587785" comment="xorg-x11-server-rdp-7.3.99-3.18.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4086</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-4086" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4086" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-4086" ref_url="https://www.suse.com/security/cve/CVE-2011-4086" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0554-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0554-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0540-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0799-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1439-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00002.html" source="SUSE-SU"/>
    <description>
    The journal_unmap_buffer function in fs/jbd2/transaction.c in the Linux kernel before 3.3.1 does not properly handle the _Delay and _Unwritten buffer head states, which allows local users to cause a denial of service (system crash) by leveraging the presence of an ext4 filesystem that was mounted with a journal.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4086/">CVE-2011-4086</cve>
	<bugzilla href="https://bugzilla.suse.com/745832">SUSE bug 745832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009588509" comment="kernel-default-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588510" comment="kernel-default-base-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588511" comment="kernel-default-devel-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588512" comment="kernel-default-extra-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588513" comment="kernel-source-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588514" comment="kernel-syms-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588515" comment="kernel-trace-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588516" comment="kernel-trace-base-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588517" comment="kernel-trace-devel-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588518" comment="kernel-trace-extra-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588519" comment="kernel-xen-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588520" comment="kernel-xen-base-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588521" comment="kernel-xen-devel-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588522" comment="kernel-xen-extra-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566052" comment="xen-kmp-default-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566054" comment="xen-kmp-trace-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4127</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-4127" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4127" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-4127" ref_url="https://www.suse.com/security/cve/CVE-2011-4127" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0153-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0554-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0554-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0927-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00064.html" source="SUSE-SU"/>
    <description>
    The Linux kernel before 3.2.2 does not properly restrict SG_IO ioctl calls, which allows local users to bypass intended restrictions on disk read and write operations by sending a SCSI command to (1) a partition block device or (2) an LVM volume.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-19"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-4127/">CVE-2011-4127</cve>
	<bugzilla href="https://bugzilla.suse.com/738400">SUSE bug 738400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/758104">SUSE bug 758104</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009588509" comment="kernel-default-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588510" comment="kernel-default-base-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588511" comment="kernel-default-devel-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588512" comment="kernel-default-extra-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588513" comment="kernel-source-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588514" comment="kernel-syms-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588515" comment="kernel-trace-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588516" comment="kernel-trace-base-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588517" comment="kernel-trace-devel-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588518" comment="kernel-trace-extra-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588519" comment="kernel-xen-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588520" comment="kernel-xen-base-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588521" comment="kernel-xen-devel-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588522" comment="kernel-xen-extra-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566052" comment="xen-kmp-default-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566054" comment="xen-kmp-trace-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4131</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-4131" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4131" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-4131" ref_url="https://www.suse.com/security/cve/CVE-2011-4131" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0554-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0554-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0925-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0927-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00064.html" source="SUSE-SU"/>
    <description>
    The NFSv4 implementation in the Linux kernel before 3.2.2 does not properly handle bitmap sizes in GETACL replies, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-19"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4131/">CVE-2011-4131</cve>
	<bugzilla href="https://bugzilla.suse.com/730117">SUSE bug 730117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/762992">SUSE bug 762992</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009588509" comment="kernel-default-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588510" comment="kernel-default-base-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588511" comment="kernel-default-devel-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588512" comment="kernel-default-extra-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588513" comment="kernel-source-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588514" comment="kernel-syms-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588515" comment="kernel-trace-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588516" comment="kernel-trace-base-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588517" comment="kernel-trace-devel-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588518" comment="kernel-trace-extra-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588519" comment="kernel-xen-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588520" comment="kernel-xen-base-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588521" comment="kernel-xen-devel-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588522" comment="kernel-xen-extra-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566052" comment="xen-kmp-default-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566054" comment="xen-kmp-trace-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4132</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-4132" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4132" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-4132" ref_url="https://www.suse.com/security/cve/CVE-2011-4132" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0153-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0554-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0554-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html" source="SUSE-SU"/>
    <description>
    The cleanup_journal_tail function in the Journaling Block Device (JBD) functionality in the Linux kernel 2.6 allows local users to cause a denial of service (assertion error and kernel oops) via an ext3 or ext4 image with an "invalid log first block value."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4132/">CVE-2011-4132</cve>
	<bugzilla href="https://bugzilla.suse.com/730118">SUSE bug 730118</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009588509" comment="kernel-default-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588510" comment="kernel-default-base-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588511" comment="kernel-default-devel-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588512" comment="kernel-default-extra-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588513" comment="kernel-source-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588514" comment="kernel-syms-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588515" comment="kernel-trace-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588516" comment="kernel-trace-base-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588517" comment="kernel-trace-devel-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588518" comment="kernel-trace-extra-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588519" comment="kernel-xen-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588520" comment="kernel-xen-base-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588521" comment="kernel-xen-devel-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588522" comment="kernel-xen-extra-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566052" comment="xen-kmp-default-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566054" comment="xen-kmp-trace-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4599</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-4599" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4599" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-4599" ref_url="https://www.suse.com/security/cve/CVE-2011-4599" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-January/000003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-April/000067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-January/000327.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0100-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-01/msg00035.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the _canonicalize function in common/uloc.c in International Components for Unicode (ICU) before 49.1 allows remote attackers to execute arbitrary code via a crafted locale ID that is not properly handled during variant canonicalization.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4599/">CVE-2011-4599</cve>
	<bugzilla href="https://bugzilla.suse.com/736146">SUSE bug 736146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/740453">SUSE bug 740453</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009562934" comment="icu-4.0-7.26.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566020" comment="libicu-4.0-7.26.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20115321" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-5321</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-5321" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5321" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-5321" ref_url="https://www.suse.com/security/cve/CVE-2011-5321" source="SUSE CVE"/>
    <description>
    The tty_open function in drivers/tty/tty_io.c in the Linux kernel before 3.1.1 mishandles a driver-lookup failure, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via crafted access to a device file under the /dev/pts directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-5321/">CVE-2011-5321</cve>
	<bugzilla href="https://bugzilla.suse.com/922447">SUSE bug 922447</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0060</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0060" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0060" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0060" ref_url="https://www.suse.com/security/cve/CVE-2012-0060" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-May/000114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-July/000180.html" source="SUSE-SU"/>
		<reference ref_id="TID7006535" ref_url="https://www.suse.com/support/kb/doc/?id=7006535" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0588-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0589-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-05/msg00005.html" source="SUSE-SU"/>
    <description>
    RPM before 4.9.1.3 does not properly validate region tags, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an invalid region tag in a package header to the (1) headerLoad, (2) rpmReadSignature, or (3) headerVerify function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0060/">CVE-2012-0060</cve>
	<bugzilla href="https://bugzilla.suse.com/754284">SUSE bug 754284</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589035" comment="popt-1.7-37.50.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589036" comment="popt-32bit-1.7-37.50.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589037" comment="rpm-4.4.2.3-37.50.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589038" comment="rpm-32bit-4.4.2.3-37.50.6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0061</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0061" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0061" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0061" ref_url="https://www.suse.com/security/cve/CVE-2012-0061" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-May/000114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-July/000180.html" source="SUSE-SU"/>
		<reference ref_id="TID7006535" ref_url="https://www.suse.com/support/kb/doc/?id=7006535" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0588-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0589-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-05/msg00005.html" source="SUSE-SU"/>
    <description>
    The headerLoad function in lib/header.c in RPM before 4.9.1.3 does not properly validate region tags, which allows user-assisted remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large region size in a package header.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0061/">CVE-2012-0061</cve>
	<bugzilla href="https://bugzilla.suse.com/754285">SUSE bug 754285</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589035" comment="popt-1.7-37.50.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589036" comment="popt-32bit-1.7-37.50.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589037" comment="rpm-4.4.2.3-37.50.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589038" comment="rpm-32bit-4.4.2.3-37.50.6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0065</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0065" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0065" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0065" ref_url="https://www.suse.com/security/cve/CVE-2012-0065" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:0345-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-03/msg00011.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the receive_packet function in libusbmuxd/libusbmuxd.c in usbmuxd 1.0.5 through 1.0.7 allows physically proximate attackers to execute arbitrary code via a long SerialNumber field in a property list.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0065/">CVE-2012-0065</cve>
	<bugzilla href="https://bugzilla.suse.com/742546">SUSE bug 742546</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566190" comment="usbmuxd-1.0.7-5.10.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0217</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0217" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0217" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0217" ref_url="https://www.suse.com/security/cve/CVE-2012-0217" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0730-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0886-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00008.html" source="SUSE-SU"/>
    <description>
    The x86-64 kernel system-call functionality in Xen 4.1.2 and earlier, as used in Citrix XenServer 6.0.2 and earlier and other products; Oracle Solaris 11 and earlier; illumos before r13724; Joyent SmartOS before 20120614T184600Z; FreeBSD before 9.0-RELEASE-p3; NetBSD 6.0 Beta and earlier; Microsoft Windows Server 2008 R2 and R2 SP1 and Windows 7 Gold and SP1; and possibly other operating systems, when running on an Intel processor, incorrectly uses the sysret path in cases where a certain address is not a canonical address, which allows local users to gain privileges via a crafted application.  NOTE: because this issue is due to incorrect use of the Intel specification, it should have been split into separate identifiers; however, there was some value in preserving the original mapping of the multi-codebase coordinated-disclosure effort to a single identifier.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0217/">CVE-2012-0217</cve>
	<bugzilla href="https://bugzilla.suse.com/757537">SUSE bug 757537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/764077">SUSE bug 764077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589049" comment="libvirt-0.9.6-0.15.71 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589050" comment="libvirt-client-0.9.6-0.15.71 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589051" comment="libvirt-client-32bit-0.9.6-0.15.71 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589052" comment="libvirt-doc-0.9.6-0.15.71 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589053" comment="libvirt-python-0.9.6-0.15.71 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589054" comment="virt-manager-0.9.0-3.17.26 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589055" comment="virt-utils-1.1.7-0.11.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589056" comment="vm-install-0.5.9-0.7.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589057" comment="xen-4.1.2_18-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589058" comment="xen-doc-html-4.1.2_18-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589059" comment="xen-doc-pdf-4.1.2_18-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589060" comment="xen-kmp-default-4.1.2_18_3.0.31_0.9-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589061" comment="xen-kmp-pae-4.1.2_18_3.0.31_0.9-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589062" comment="xen-kmp-trace-4.1.2_18_3.0.31_0.9-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589063" comment="xen-libs-4.1.2_18-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589064" comment="xen-libs-32bit-4.1.2_18-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589065" comment="xen-tools-4.1.2_18-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589066" comment="xen-tools-domU-4.1.2_18-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589067" comment="yast2-vm-2.17.10-0.5.42 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0218</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0218" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0218" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0218" ref_url="https://www.suse.com/security/cve/CVE-2012-0218" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0730-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0886-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00008.html" source="SUSE-SU"/>
    <description>
    Xen 3.4, 4.0, and 4.1, when the guest OS has not registered a handler for a syscall or sysenter instruction, does not properly clear a flag for exception injection when injecting a General Protection Fault, which allows local PV guest OS users to cause a denial of service (guest crash) by later triggering an exception that would normally be handled within Xen.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0218/">CVE-2012-0218</cve>
	<bugzilla href="https://bugzilla.suse.com/757970">SUSE bug 757970</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589049" comment="libvirt-0.9.6-0.15.71 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589050" comment="libvirt-client-0.9.6-0.15.71 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589051" comment="libvirt-client-32bit-0.9.6-0.15.71 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589052" comment="libvirt-doc-0.9.6-0.15.71 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589053" comment="libvirt-python-0.9.6-0.15.71 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589054" comment="virt-manager-0.9.0-3.17.26 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589055" comment="virt-utils-1.1.7-0.11.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589056" comment="vm-install-0.5.9-0.7.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589057" comment="xen-4.1.2_18-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589058" comment="xen-doc-html-4.1.2_18-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589059" comment="xen-doc-pdf-4.1.2_18-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589060" comment="xen-kmp-default-4.1.2_18_3.0.31_0.9-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589061" comment="xen-kmp-pae-4.1.2_18_3.0.31_0.9-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589062" comment="xen-kmp-trace-4.1.2_18_3.0.31_0.9-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589063" comment="xen-libs-4.1.2_18-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589064" comment="xen-libs-32bit-4.1.2_18-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589065" comment="xen-tools-4.1.2_18-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589066" comment="xen-tools-domU-4.1.2_18-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589067" comment="yast2-vm-2.17.10-0.5.42 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0420</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0420" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0420" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0420" ref_url="https://www.suse.com/security/cve/CVE-2012-0420" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-July/000186.html" source="SUSE-SU"/>
    <description>
    zypp-refresh-wrapper in SUSE Zypper before 1.3.20 and 1.6.x before 1.6.166 allows local users to create files in arbitrary directories, or possibly have unspecified other impact, via a pathname in the ZYPP_LOCKFILE_ROOT environment variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0420/">CVE-2012-0420</cve>
	<bugzilla href="https://bugzilla.suse.com/770630">SUSE bug 770630</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566299" comment="zypper-1.6.166-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566300" comment="zypper-log-1.6.166-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0425</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0425" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0425" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0425" ref_url="https://www.suse.com/security/cve/CVE-2012-0425" source="SUSE CVE"/>
    <description>
    LanItems.ycp in save_y2logs in yast2-network before 2.24.4 in SUSE YaST writes cleartext Wi-Fi credentials to the y2log log file, which allows context-dependent attackers to obtain sensitive information by reading the (1) WIRELESS_WPA_PASSWORD or (2) WIRELESS_CLIENT_KEY_PASSWORD field.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0425/">CVE-2012-0425</cve>
	<bugzilla href="https://bugzilla.suse.com/752464">SUSE bug 752464</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589071" comment="yast2-network-2.17.175-0.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0427</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0427" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0427" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0427" ref_url="https://www.suse.com/security/cve/CVE-2012-0427" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-November/000304.html" source="SUSE-SU"/>
    <description>
    yast2-add-on-creator in SUSE inst-source-utils 2008.11.26 before 2008.11.26-0.9.1 and 2012.9.13 before 2012.9.13-0.8.1 allows local users to gain privileges via a crafted (1) file name or (2) directory name.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0427/">CVE-2012-0427</cve>
	<bugzilla href="https://bugzilla.suse.com/604730">SUSE bug 604730</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589074" comment="inst-source-utils-2012.9.13-0.8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0547</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0547" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0547" ref_url="https://www.suse.com/security/cve/CVE-2012-0547" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1231-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00019.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 6 and earlier, and 6 Update 34 and earlier, has no impact and remote attack vectors involving AWT and "a security-in-depth issue that is not directly exploitable but which can be used to aggravate security vulnerabilities that can be directly exploited." NOTE: this identifier was assigned by the Oracle CNA, but CVE is not intended to cover defense-in-depth issues that are only exposed by the presence of other vulnerabilities.  NOTE: Oracle has not commented on claims from a downstream vendor that this issue is related to "toolkit internals references."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0547/">CVE-2012-0547</cve>
	<bugzilla href="https://bugzilla.suse.com/777499">SUSE bug 777499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/780897">SUSE bug 780897</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589086" comment="java-1_6_0-openjdk-1.6.0.0_b24.1.11.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589087" comment="java-1_6_0-openjdk-demo-1.6.0.0_b24.1.11.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589088" comment="java-1_6_0-openjdk-devel-1.6.0.0_b24.1.11.4-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0698</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0698" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0698" ref_url="https://www.suse.com/security/cve/CVE-2012-0698" source="SUSE CVE"/>
    <description>
    tcsd in TrouSerS before 0.3.10 allows remote attackers to cause a denial of service (daemon crash) via a crafted type_offset value in a TCP packet to port 30003.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0698/">CVE-2012-0698</cve>
	<bugzilla href="https://bugzilla.suse.com/791029">SUSE bug 791029</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589096" comment="libtspi1-0.3.7-3.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589097" comment="libtspi1-32bit-0.3.7-3.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589098" comment="trousers-0.3.7-3.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0786</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0786" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0786" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0786" ref_url="https://www.suse.com/security/cve/CVE-2012-0786" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000961.html" source="SUSE-SU"/>
    <description>
    The transform_save function in transform.c in Augeas before 1.0.0 allows local users to overwrite arbitrary files and obtain sensitive information via a symlink attack on a .augnew file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0786/">CVE-2012-0786</cve>
	<bugzilla href="https://bugzilla.suse.com/853044">SUSE bug 853044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885003">SUSE bug 885003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566350" comment="libaugeas0-0.9.0-3.15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0815</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0815" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0815" ref_url="https://www.suse.com/security/cve/CVE-2012-0815" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-May/000114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-July/000180.html" source="SUSE-SU"/>
		<reference ref_id="TID7006535" ref_url="https://www.suse.com/support/kb/doc/?id=7006535" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0588-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0589-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-05/msg00005.html" source="SUSE-SU"/>
    <description>
    The headerVerifyInfo function in lib/header.c in RPM before 4.9.1.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a negative value in a region offset of a package header, which is not properly handled in a numeric range comparison.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0815/">CVE-2012-0815</cve>
	<bugzilla href="https://bugzilla.suse.com/754281">SUSE bug 754281</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589035" comment="popt-1.7-37.50.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589036" comment="popt-32bit-1.7-37.50.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589037" comment="rpm-4.4.2.3-37.50.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589038" comment="rpm-32bit-4.4.2.3-37.50.6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0817</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0817" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0817" ref_url="https://www.suse.com/security/cve/CVE-2012-0817" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0502-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00008.html" source="SUSE-SU"/>
    <description>
    Memory leak in smbd in Samba 3.6.x before 3.6.3 allows remote attackers to cause a denial of service (memory and CPU consumption) by making many connection requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0817/">CVE-2012-0817</cve>
	<bugzilla href="https://bugzilla.suse.com/743986">SUSE bug 743986</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589107" comment="libldb1-3.6.3-0.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589108" comment="libldb1-32bit-3.6.3-0.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589109" comment="libsmbclient0-3.6.3-0.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589110" comment="libsmbclient0-32bit-3.6.3-0.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589111" comment="libtalloc2-3.6.3-0.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589112" comment="libtalloc2-32bit-3.6.3-0.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589113" comment="libtdb1-3.6.3-0.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589114" comment="libtdb1-32bit-3.6.3-0.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589115" comment="libtevent0-3.6.3-0.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589116" comment="libtevent0-32bit-3.6.3-0.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589117" comment="libwbclient0-3.6.3-0.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589118" comment="libwbclient0-32bit-3.6.3-0.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589119" comment="samba-3.6.3-0.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589120" comment="samba-32bit-3.6.3-0.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589121" comment="samba-client-3.6.3-0.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589122" comment="samba-client-32bit-3.6.3-0.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589123" comment="samba-doc-3.6.3-0.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589124" comment="samba-krb-printing-3.6.3-0.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589125" comment="samba-winbind-3.6.3-0.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589126" comment="samba-winbind-32bit-3.6.3-0.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0862</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0862" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0862" ref_url="https://www.suse.com/security/cve/CVE-2012-0862" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-March/000774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000898.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0494-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0517-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00034.html" source="SUSE-SU"/>
    <description>
    builtins.c in Xinetd before 2.3.15 does not check the service type when the tcpmux-server service is enabled, which exposes all enabled services and allows remote attackers to bypass intended access restrictions via a request to tcpmux port 1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0862/">CVE-2012-0862</cve>
	<bugzilla href="https://bugzilla.suse.com/762294">SUSE bug 762294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/844230">SUSE bug 844230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/855685">SUSE bug 855685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567271" comment="xinetd-2.3.14-130.133.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0864</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0864" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0864" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0864" ref_url="https://www.suse.com/security/cve/CVE-2012-0864" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-August/000563.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the vfprintf function in stdio-common/vfprintf.c in glibc 2.14 and other versions allows context-dependent attackers to bypass the FORTIFY_SOURCE protection mechanism, conduct format string attacks, and write to arbitrary memory via a large number of arguments.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0864/">CVE-2012-0864</cve>
	<bugzilla href="https://bugzilla.suse.com/747768">SUSE bug 747768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826666">SUSE bug 826666</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589184" comment="glibc-2.11.3-17.35.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589185" comment="glibc-32bit-2.11.3-17.35.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589186" comment="glibc-devel-2.11.3-17.35.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589187" comment="glibc-devel-32bit-2.11.3-17.35.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589188" comment="glibc-i18ndata-2.11.3-17.35.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589189" comment="glibc-locale-2.11.3-17.35.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589190" comment="glibc-locale-32bit-2.11.3-17.35.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589191" comment="nscd-2.11.3-17.35.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0870</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0870" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0870" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0870" ref_url="https://www.suse.com/security/cve/CVE-2012-0870" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0337-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0338-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-03/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0502-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00011.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in process.c in smbd in Samba 3.0, as used in the file-sharing service on the BlackBerry PlayBook tablet before 2.0.0.7971 and other products, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a Batched (aka AndX) request that triggers infinite recursion.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0870/">CVE-2012-0870</cve>
	<bugzilla href="https://bugzilla.suse.com/747934">SUSE bug 747934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752797">SUSE bug 752797</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589107" comment="libldb1-3.6.3-0.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589108" comment="libldb1-32bit-3.6.3-0.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589109" comment="libsmbclient0-3.6.3-0.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589110" comment="libsmbclient0-32bit-3.6.3-0.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589111" comment="libtalloc2-3.6.3-0.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589112" comment="libtalloc2-32bit-3.6.3-0.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589113" comment="libtdb1-3.6.3-0.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589114" comment="libtdb1-32bit-3.6.3-0.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589115" comment="libtevent0-3.6.3-0.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589116" comment="libtevent0-32bit-3.6.3-0.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589117" comment="libwbclient0-3.6.3-0.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589118" comment="libwbclient0-32bit-3.6.3-0.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589119" comment="samba-3.6.3-0.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589120" comment="samba-32bit-3.6.3-0.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589121" comment="samba-client-3.6.3-0.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589122" comment="samba-client-32bit-3.6.3-0.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589123" comment="samba-doc-3.6.3-0.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589124" comment="samba-krb-printing-3.6.3-0.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589125" comment="samba-winbind-3.6.3-0.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589126" comment="samba-winbind-32bit-3.6.3-0.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0957</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0957" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0957" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0957" ref_url="https://www.suse.com/security/cve/CVE-2012-0957" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-February/000339.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0396-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00005.html" source="SUSE-SU"/>
    <description>
    The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0957/">CVE-2012-0957</cve>
	<bugzilla href="https://bugzilla.suse.com/783515">SUSE bug 783515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/783606">SUSE bug 783606</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589222" comment="kernel-default-3.0.58-0.6.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589223" comment="kernel-default-base-3.0.58-0.6.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589224" comment="kernel-default-devel-3.0.58-0.6.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589225" comment="kernel-default-extra-3.0.58-0.6.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589226" comment="kernel-source-3.0.58-0.6.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589227" comment="kernel-syms-3.0.58-0.6.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589228" comment="kernel-trace-3.0.58-0.6.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589229" comment="kernel-trace-base-3.0.58-0.6.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589230" comment="kernel-trace-devel-3.0.58-0.6.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589231" comment="kernel-trace-extra-3.0.58-0.6.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589232" comment="kernel-xen-3.0.58-0.6.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589233" comment="kernel-xen-base-3.0.58-0.6.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589234" comment="kernel-xen-devel-3.0.58-0.6.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589235" comment="kernel-xen-extra-3.0.58-0.6.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589236" comment="xen-kmp-default-4.1.3_06_3.0.58_0.6.2-0.7.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589237" comment="xen-kmp-trace-4.1.3_06_3.0.58_0.6.2-0.7.16 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1097</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1097" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1097" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1097" ref_url="https://www.suse.com/security/cve/CVE-2012-1097" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0554-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0554-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0540-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0799-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1439-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00002.html" source="SUSE-SU"/>
    <description>
    The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1097/">CVE-2012-1097</cve>
	<bugzilla href="https://bugzilla.suse.com/750079">SUSE bug 750079</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009588509" comment="kernel-default-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588510" comment="kernel-default-base-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588511" comment="kernel-default-devel-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588512" comment="kernel-default-extra-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588513" comment="kernel-source-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588514" comment="kernel-syms-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588515" comment="kernel-trace-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588516" comment="kernel-trace-base-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588517" comment="kernel-trace-devel-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588518" comment="kernel-trace-extra-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588519" comment="kernel-xen-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588520" comment="kernel-xen-base-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588521" comment="kernel-xen-devel-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588522" comment="kernel-xen-extra-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566052" comment="xen-kmp-default-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566054" comment="xen-kmp-trace-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1146</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1146" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1146" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1146" ref_url="https://www.suse.com/security/cve/CVE-2012-1146" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0554-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0554-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0540-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0799-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1439-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00002.html" source="SUSE-SU"/>
    <description>
    The mem_cgroup_usage_unregister_event function in mm/memcontrol.c in the Linux kernel before 3.2.10 does not properly handle multiple events that are attached to the same eventfd, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by registering memory threshold events.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1146/">CVE-2012-1146</cve>
	<bugzilla href="https://bugzilla.suse.com/750959">SUSE bug 750959</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009588509" comment="kernel-default-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588510" comment="kernel-default-base-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588511" comment="kernel-default-devel-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588512" comment="kernel-default-extra-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588513" comment="kernel-source-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588514" comment="kernel-syms-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588515" comment="kernel-trace-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588516" comment="kernel-trace-base-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588517" comment="kernel-trace-devel-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588518" comment="kernel-trace-extra-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588519" comment="kernel-xen-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588520" comment="kernel-xen-base-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588521" comment="kernel-xen-devel-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588522" comment="kernel-xen-extra-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566052" comment="xen-kmp-default-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566054" comment="xen-kmp-trace-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1179</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1179" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1179" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1179" ref_url="https://www.suse.com/security/cve/CVE-2012-1179" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0554-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0554-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0927-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00064.html" source="SUSE-SU"/>
    <description>
    The Linux kernel before 3.3.1, when KVM is used, allows guest OS users to cause a denial of service (host OS crash) by leveraging administrative access to the guest OS, related to the pmd_none_or_clear_bad function and page faults for huge pages.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-19"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1179/">CVE-2012-1179</cve>
	<bugzilla href="https://bugzilla.suse.com/752599">SUSE bug 752599</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009588509" comment="kernel-default-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588510" comment="kernel-default-base-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588511" comment="kernel-default-devel-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588512" comment="kernel-default-extra-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588513" comment="kernel-source-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588514" comment="kernel-syms-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588515" comment="kernel-trace-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588516" comment="kernel-trace-base-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588517" comment="kernel-trace-devel-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588518" comment="kernel-trace-extra-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588519" comment="kernel-xen-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588520" comment="kernel-xen-base-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588521" comment="kernel-xen-devel-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009588522" comment="kernel-xen-extra-3.0.26-0.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566052" comment="xen-kmp-default-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566054" comment="xen-kmp-trace-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1182</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1182" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1182" ref_url="https://www.suse.com/security/cve/CVE-2012-1182" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0500-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0501-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0501-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0502-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0504-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0508-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00012.html" source="SUSE-SU"/>
    <description>
    The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1182/">CVE-2012-1182</cve>
	<bugzilla href="https://bugzilla.suse.com/747934">SUSE bug 747934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752797">SUSE bug 752797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/754443">SUSE bug 754443</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589107" comment="libldb1-3.6.3-0.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589108" comment="libldb1-32bit-3.6.3-0.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589109" comment="libsmbclient0-3.6.3-0.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589110" comment="libsmbclient0-32bit-3.6.3-0.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589111" comment="libtalloc2-3.6.3-0.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589112" comment="libtalloc2-32bit-3.6.3-0.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589113" comment="libtdb1-3.6.3-0.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589114" comment="libtdb1-32bit-3.6.3-0.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589115" comment="libtevent0-3.6.3-0.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589116" comment="libtevent0-32bit-3.6.3-0.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589117" comment="libwbclient0-3.6.3-0.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589118" comment="libwbclient0-32bit-3.6.3-0.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589119" comment="samba-3.6.3-0.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589120" comment="samba-32bit-3.6.3-0.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589121" comment="samba-client-3.6.3-0.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589122" comment="samba-client-32bit-3.6.3-0.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589123" comment="samba-doc-3.6.3-0.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589124" comment="samba-krb-printing-3.6.3-0.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589125" comment="samba-winbind-3.6.3-0.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589126" comment="samba-winbind-32bit-3.6.3-0.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1530</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1530" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1530" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1530" ref_url="https://www.suse.com/security/cve/CVE-2012-1530" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0047-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0138-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0193-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0363-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00083.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the XSLT engine in Adobe Reader and Acrobat 9.x before 9.5.3, 10.x before 10.1.5, and 11.x before 11.0.1 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a PDF file containing an XSL file that triggers memory corruption when the lang function processes XML data with a crafted node-set.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1530/">CVE-2012-1530</cve>
	<bugzilla href="https://bugzilla.suse.com/797529">SUSE bug 797529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589376" comment="acroread-9.5.3-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589377" comment="acroread-cmaps-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589378" comment="acroread-fonts-ja-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589379" comment="acroread-fonts-ko-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589380" comment="acroread-fonts-zh_CN-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589381" comment="acroread-fonts-zh_TW-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565854" comment="acroread_ja-9.4.2-0.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1531</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1531" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1531" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1531" ref_url="https://www.suse.com/security/cve/CVE-2012-1531" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier; and JavaFX 2.2 and earlier; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1531/">CVE-2012-1531</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589382" comment="java-1_6_0-openjdk-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589383" comment="java-1_6_0-openjdk-demo-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589384" comment="java-1_6_0-openjdk-devel-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1532</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1532" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1532" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1532" ref_url="https://www.suse.com/security/cve/CVE-2012-1532" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier and 6 Update 35 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1532/">CVE-2012-1532</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589382" comment="java-1_6_0-openjdk-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589383" comment="java-1_6_0-openjdk-demo-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589384" comment="java-1_6_0-openjdk-devel-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1533</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1533" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1533" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1533" ref_url="https://www.suse.com/security/cve/CVE-2012-1533" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2012-3159.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1533/">CVE-2012-1533</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589382" comment="java-1_6_0-openjdk-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589383" comment="java-1_6_0-openjdk-demo-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589384" comment="java-1_6_0-openjdk-devel-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1586</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1586" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1586" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1586" ref_url="https://www.suse.com/security/cve/CVE-2012-1586" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-April/000098.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0607-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-05/msg00011.html" source="SUSE-SU"/>
    <description>
    mount.cifs in cifs-utils 2.6 allows local users to determine the existence of arbitrary files or directories via the file path in the second argument, which reveals their existence in an error message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1586/">CVE-2012-1586</cve>
	<bugzilla href="https://bugzilla.suse.com/754443">SUSE bug 754443</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589405" comment="cifs-utils-5.1-0.7.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1601</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1601" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1601" ref_url="https://www.suse.com/security/cve/CVE-2012-1601" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-December/000318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-March/000365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0925-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0927-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00064.html" source="SUSE-SU"/>
    <description>
    The KVM implementation in the Linux kernel before 3.3.6 allows host OS users to cause a denial of service (NULL pointer dereference and host OS crash) by making a KVM_CREATE_IRQCHIP ioctl call after a virtual CPU already exists.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-19"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1601/">CVE-2012-1601</cve>
	<bugzilla href="https://bugzilla.suse.com/754898">SUSE bug 754898</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589408" comment="kernel-default-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589409" comment="kernel-default-base-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589410" comment="kernel-default-devel-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589411" comment="kernel-default-extra-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589412" comment="kernel-source-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589413" comment="kernel-syms-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589414" comment="kernel-trace-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589415" comment="kernel-trace-base-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589416" comment="kernel-trace-devel-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589417" comment="kernel-trace-extra-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589418" comment="kernel-xen-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589419" comment="kernel-xen-base-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589420" comment="kernel-xen-devel-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589421" comment="kernel-xen-extra-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566052" comment="xen-kmp-default-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566054" comment="xen-kmp-trace-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1667</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1667" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1667" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1667" ref_url="https://www.suse.com/security/cve/CVE-2012-1667" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0741-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0741-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0741-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0741-4" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0741-5" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0741-6" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0722-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0605-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00035.html" source="SUSE-SU"/>
    <description>
    ISC BIND 9.x before 9.7.6-P1, 9.8.x before 9.8.3-P1, 9.9.x before 9.9.1-P1, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P1 does not properly handle resource records with a zero-length RDATA section, which allows remote DNS servers to cause a denial of service (daemon crash or data corruption) or obtain sensitive information from process memory via a crafted record.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1667/">CVE-2012-1667</cve>
	<bugzilla href="https://bugzilla.suse.com/765315">SUSE bug 765315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/792926">SUSE bug 792926</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589436" comment="bind-libs-9.6ESVR7P1-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589437" comment="bind-libs-32bit-9.6ESVR7P1-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589438" comment="bind-utils-9.6ESVR7P1-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1682</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1682" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1682" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1682" ref_url="https://www.suse.com/security/cve/CVE-2012-1682" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1231-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00019.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 6 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Beans, a different vulnerability than CVE-2012-3136.  NOTE: Oracle has not commented on claims from a downstream vendor that this issue is related to "XMLDecoder security issue via ClassFinder."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1682/">CVE-2012-1682</cve>
	<bugzilla href="https://bugzilla.suse.com/777499">SUSE bug 777499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/780897">SUSE bug 780897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589086" comment="java-1_6_0-openjdk-1.6.0.0_b24.1.11.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589087" comment="java-1_6_0-openjdk-demo-1.6.0.0_b24.1.11.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589088" comment="java-1_6_0-openjdk-devel-1.6.0.0_b24.1.11.4-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1956</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1956" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1956" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1956" ref_url="https://www.suse.com/security/cve/CVE-2012-1956" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 15.0, Thunderbird before 15.0, and SeaMonkey before 2.12 do not prevent use of the Object.defineProperty method to shadow the location object (aka window.location), which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via vectors involving a plugin.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1956/">CVE-2012-1956</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565919" comment="MozillaFirefox-10.0.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565920" comment="MozillaFirefox-branding-SLED-7-0.6.7.80 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565921" comment="MozillaFirefox-translations-10.0.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565922" comment="libfreebl3-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565923" comment="libfreebl3-32bit-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565924" comment="mozilla-nspr-4.9.2-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565925" comment="mozilla-nspr-32bit-4.9.2-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565926" comment="mozilla-nss-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565927" comment="mozilla-nss-32bit-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565928" comment="mozilla-nss-tools-3.13.6-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1970</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1970" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1970" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1970" ref_url="https://www.suse.com/security/cve/CVE-2012-1970" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1970/">CVE-2012-1970</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565919" comment="MozillaFirefox-10.0.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565920" comment="MozillaFirefox-branding-SLED-7-0.6.7.80 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565921" comment="MozillaFirefox-translations-10.0.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565922" comment="libfreebl3-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565923" comment="libfreebl3-32bit-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565924" comment="mozilla-nspr-4.9.2-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565925" comment="mozilla-nspr-32bit-4.9.2-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565926" comment="mozilla-nss-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565927" comment="mozilla-nss-32bit-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565928" comment="mozilla-nss-tools-3.13.6-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1971</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1971" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1971" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1971" ref_url="https://www.suse.com/security/cve/CVE-2012-1971" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 15.0, Thunderbird before 15.0, and SeaMonkey before 2.12 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to garbage collection after certain MethodJIT execution, and unknown other vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1971/">CVE-2012-1971</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565919" comment="MozillaFirefox-10.0.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565920" comment="MozillaFirefox-branding-SLED-7-0.6.7.80 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565921" comment="MozillaFirefox-translations-10.0.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565922" comment="libfreebl3-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565923" comment="libfreebl3-32bit-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565924" comment="mozilla-nspr-4.9.2-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565925" comment="mozilla-nspr-32bit-4.9.2-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565926" comment="mozilla-nss-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565927" comment="mozilla-nss-32bit-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565928" comment="mozilla-nss-tools-3.13.6-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1972</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1972" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1972" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1972" ref_url="https://www.suse.com/security/cve/CVE-2012-1972" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsHTMLEditor::CollapseAdjacentTextNodes function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1972/">CVE-2012-1972</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565919" comment="MozillaFirefox-10.0.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565920" comment="MozillaFirefox-branding-SLED-7-0.6.7.80 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565921" comment="MozillaFirefox-translations-10.0.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565922" comment="libfreebl3-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565923" comment="libfreebl3-32bit-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565924" comment="mozilla-nspr-4.9.2-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565925" comment="mozilla-nspr-32bit-4.9.2-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565926" comment="mozilla-nss-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565927" comment="mozilla-nss-32bit-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565928" comment="mozilla-nss-tools-3.13.6-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1973</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1973" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1973" ref_url="https://www.suse.com/security/cve/CVE-2012-1973" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsObjectLoadingContent::LoadObject function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1973/">CVE-2012-1973</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565919" comment="MozillaFirefox-10.0.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565920" comment="MozillaFirefox-branding-SLED-7-0.6.7.80 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565921" comment="MozillaFirefox-translations-10.0.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565922" comment="libfreebl3-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565923" comment="libfreebl3-32bit-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565924" comment="mozilla-nspr-4.9.2-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565925" comment="mozilla-nspr-32bit-4.9.2-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565926" comment="mozilla-nss-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565927" comment="mozilla-nss-32bit-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565928" comment="mozilla-nss-tools-3.13.6-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1974</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1974" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1974" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1974" ref_url="https://www.suse.com/security/cve/CVE-2012-1974" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the gfxTextRun::CanBreakLineBefore function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1974/">CVE-2012-1974</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565919" comment="MozillaFirefox-10.0.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565920" comment="MozillaFirefox-branding-SLED-7-0.6.7.80 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565921" comment="MozillaFirefox-translations-10.0.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565922" comment="libfreebl3-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565923" comment="libfreebl3-32bit-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565924" comment="mozilla-nspr-4.9.2-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565925" comment="mozilla-nspr-32bit-4.9.2-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565926" comment="mozilla-nss-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565927" comment="mozilla-nss-32bit-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565928" comment="mozilla-nss-tools-3.13.6-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1975</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1975" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1975" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1975" ref_url="https://www.suse.com/security/cve/CVE-2012-1975" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the PresShell::CompleteMove function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1975/">CVE-2012-1975</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565919" comment="MozillaFirefox-10.0.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565920" comment="MozillaFirefox-branding-SLED-7-0.6.7.80 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565921" comment="MozillaFirefox-translations-10.0.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565922" comment="libfreebl3-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565923" comment="libfreebl3-32bit-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565924" comment="mozilla-nspr-4.9.2-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565925" comment="mozilla-nspr-32bit-4.9.2-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565926" comment="mozilla-nss-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565927" comment="mozilla-nss-32bit-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565928" comment="mozilla-nss-tools-3.13.6-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1976</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1976" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1976" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1976" ref_url="https://www.suse.com/security/cve/CVE-2012-1976" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsHTMLSelectElement::SubmitNamesValues function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1976/">CVE-2012-1976</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565919" comment="MozillaFirefox-10.0.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565920" comment="MozillaFirefox-branding-SLED-7-0.6.7.80 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565921" comment="MozillaFirefox-translations-10.0.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565922" comment="libfreebl3-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565923" comment="libfreebl3-32bit-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565924" comment="mozilla-nspr-4.9.2-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565925" comment="mozilla-nspr-32bit-4.9.2-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565926" comment="mozilla-nss-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565927" comment="mozilla-nss-32bit-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565928" comment="mozilla-nss-tools-3.13.6-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2110</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2110" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2110" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2110" ref_url="https://www.suse.com/security/cve/CVE-2012-2110" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0623-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0637-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0674-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1149-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="TID7021279" ref_url="https://www.suse.com/support/kb/doc/?id=7021279" source="SUSE-SU"/>
		<reference ref_id="TID7021456" ref_url="https://www.suse.com/support/kb/doc/?id=7021456" source="SUSE-SU"/>
		<reference ref_id="TID7021518" ref_url="https://www.suse.com/support/kb/doc/?id=7021518" source="SUSE-SU"/>
		<reference ref_id="TID7021676" ref_url="https://www.suse.com/support/kb/doc/?id=7021676" source="SUSE-SU"/>
		<reference ref_id="TID7021736" ref_url="https://www.suse.com/support/kb/doc/?id=7021736" source="SUSE-SU"/>
		<reference ref_id="TID7021848" ref_url="https://www.suse.com/support/kb/doc/?id=7021848" source="SUSE-SU"/>
		<reference ref_id="TID7021874" ref_url="https://www.suse.com/support/kb/doc/?id=7021874" source="SUSE-SU"/>
		<reference ref_id="TID7021991" ref_url="https://www.suse.com/support/kb/doc/?id=7021991" source="SUSE-SU"/>
		<reference ref_id="TID7022023" ref_url="https://www.suse.com/support/kb/doc/?id=7022023" source="SUSE-SU"/>
		<reference ref_id="TID7022090" ref_url="https://www.suse.com/support/kb/doc/?id=7022090" source="SUSE-SU"/>
		<reference ref_id="TID7022091" ref_url="https://www.suse.com/support/kb/doc/?id=7022091" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0336-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00069.html" source="SUSE-SU"/>
    <description>
    The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in OpenSSL before 0.9.8v, 1.0.0 before 1.0.0i, and 1.0.1 before 1.0.1a does not properly interpret integer data, which allows remote attackers to conduct buffer overflow attacks, and cause a denial of service (memory corruption) or possibly have unspecified other impact, via crafted DER data, as demonstrated by an X.509 certificate or an RSA public key.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2110/">CVE-2012-2110</cve>
	<bugzilla href="https://bugzilla.suse.com/758060">SUSE bug 758060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/778825">SUSE bug 778825</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565900" comment="compat-openssl097g-0.9.7g-146.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565901" comment="compat-openssl097g-32bit-0.9.7g-146.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2111</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2111" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2111" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2111" ref_url="https://www.suse.com/security/cve/CVE-2012-2111" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0573-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0575-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0583-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00001.html" source="SUSE-SU"/>
    <description>
    The (1) CreateAccount, (2) OpenAccount, (3) AddAccountRights, and (4) RemoveAccountRights LSA RPC procedures in smbd in Samba 3.4.x before 3.4.17, 3.5.x before 3.5.15, and 3.6.x before 3.6.5 do not properly restrict modifications to the privileges database, which allows remote authenticated users to obtain the "take ownership" privilege via an LSA connection.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2111/">CVE-2012-2111</cve>
	<bugzilla href="https://bugzilla.suse.com/754443">SUSE bug 754443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/757576">SUSE bug 757576</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566062" comment="libldb1-3.6.3-0.24.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566063" comment="libldb1-32bit-3.6.3-0.24.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566064" comment="libsmbclient0-3.6.3-0.24.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566065" comment="libsmbclient0-32bit-3.6.3-0.24.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566066" comment="libtalloc2-3.6.3-0.24.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566067" comment="libtalloc2-32bit-3.6.3-0.24.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566068" comment="libtdb1-3.6.3-0.24.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566069" comment="libtdb1-32bit-3.6.3-0.24.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566070" comment="libtevent0-3.6.3-0.24.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566071" comment="libtevent0-32bit-3.6.3-0.24.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566072" comment="libwbclient0-3.6.3-0.24.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566073" comment="libwbclient0-32bit-3.6.3-0.24.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566074" comment="samba-3.6.3-0.24.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566075" comment="samba-32bit-3.6.3-0.24.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566076" comment="samba-client-3.6.3-0.24.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566077" comment="samba-client-32bit-3.6.3-0.24.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566078" comment="samba-doc-3.6.3-0.24.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566079" comment="samba-krb-printing-3.6.3-0.24.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566080" comment="samba-winbind-3.6.3-0.24.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566081" comment="samba-winbind-32bit-3.6.3-0.24.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2119</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2119" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2119" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2119" ref_url="https://www.suse.com/security/cve/CVE-2012-2119" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0789-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0781-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-06/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0799-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0812-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1439-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0925-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the macvtap device driver in the Linux kernel before 3.4.5, when running in certain configurations, allows privileged KVM guest users to cause a denial of service (crash) via a long descriptor with a long vector length.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2119/">CVE-2012-2119</cve>
	<bugzilla href="https://bugzilla.suse.com/758243">SUSE bug 758243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589500" comment="kernel-default-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589501" comment="kernel-default-base-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589502" comment="kernel-default-devel-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589503" comment="kernel-default-extra-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589504" comment="kernel-source-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589505" comment="kernel-syms-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589506" comment="kernel-trace-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589507" comment="kernel-trace-base-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589508" comment="kernel-trace-devel-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589509" comment="kernel-trace-extra-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589510" comment="kernel-xen-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589511" comment="kernel-xen-base-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589512" comment="kernel-xen-devel-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589513" comment="kernel-xen-extra-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566052" comment="xen-kmp-default-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566054" comment="xen-kmp-trace-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2127</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2127" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2127" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2127" ref_url="https://www.suse.com/security/cve/CVE-2012-2127" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0689-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00001.html" source="SUSE-SU"/>
    <description>
    fs/proc/root.c in the procfs implementation in the Linux kernel before 3.2 does not properly interact with CLONE_NEWPID clone system calls, which allows remote attackers to cause a denial of service (reference leak and memory consumption) by making many connections to a daemon that uses PID namespaces to isolate clients, as demonstrated by vsftpd.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2127/">CVE-2012-2127</cve>
	<bugzilla href="https://bugzilla.suse.com/757783">SUSE bug 757783</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589531" comment="kernel-default-3.0.31-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589532" comment="kernel-default-base-3.0.31-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589533" comment="kernel-default-devel-3.0.31-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589534" comment="kernel-default-extra-3.0.31-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589535" comment="kernel-source-3.0.31-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589536" comment="kernel-syms-3.0.31-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589537" comment="kernel-trace-3.0.31-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589538" comment="kernel-trace-base-3.0.31-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589539" comment="kernel-trace-devel-3.0.31-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589540" comment="kernel-trace-extra-3.0.31-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589541" comment="kernel-xen-3.0.31-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589542" comment="kernel-xen-base-3.0.31-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589543" comment="kernel-xen-devel-3.0.31-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589544" comment="kernel-xen-extra-3.0.31-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566052" comment="xen-kmp-default-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566054" comment="xen-kmp-trace-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2132</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2132" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2132" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2132" ref_url="https://www.suse.com/security/cve/CVE-2012-2132" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-July/000178.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0609-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-05/msg00013.html" source="SUSE-SU"/>
    <description>
    libsoup 2.32.2 and earlier does not validate certificates or clear the trust flag when the ssl-ca-file does not exist, which allows remote attackers to bypass authentication by connecting with a SSL connection.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2132/">CVE-2012-2132</cve>
	<bugzilla href="https://bugzilla.suse.com/758431">SUSE bug 758431</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589559" comment="libsoup-2_4-1-2.32.2-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589560" comment="libsoup-2_4-1-32bit-2.32.2-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2133</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2133" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2133" ref_url="https://www.suse.com/security/cve/CVE-2012-2133" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0689-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0927-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00064.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the Linux kernel before 3.3.6, when huge pages are enabled, allows local users to cause a denial of service (system crash) or possibly gain privileges by interacting with a hugetlbfs filesystem, as demonstrated by a umount operation that triggers improper handling of quota data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-19"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2133/">CVE-2012-2133</cve>
	<bugzilla href="https://bugzilla.suse.com/758532">SUSE bug 758532</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589531" comment="kernel-default-3.0.31-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589532" comment="kernel-default-base-3.0.31-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589533" comment="kernel-default-devel-3.0.31-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589534" comment="kernel-default-extra-3.0.31-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589535" comment="kernel-source-3.0.31-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589536" comment="kernel-syms-3.0.31-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589537" comment="kernel-trace-3.0.31-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589538" comment="kernel-trace-base-3.0.31-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589539" comment="kernel-trace-devel-3.0.31-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589540" comment="kernel-trace-extra-3.0.31-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589541" comment="kernel-xen-3.0.31-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589542" comment="kernel-xen-base-3.0.31-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589543" comment="kernel-xen-devel-3.0.31-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589544" comment="kernel-xen-extra-3.0.31-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566052" comment="xen-kmp-default-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566054" comment="xen-kmp-trace-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2136</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2136" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2136" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2136" ref_url="https://www.suse.com/security/cve/CVE-2012-2136" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0789-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-July/000194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0781-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-06/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0799-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0812-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1439-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00002.html" source="SUSE-SU"/>
    <description>
    The sock_alloc_send_pskb function in net/core/sock.c in the Linux kernel before 3.4.5 does not properly validate a certain length value, which allows local users to cause a denial of service (heap-based buffer overflow and system crash) or possibly gain privileges by leveraging access to a TUN/TAP device.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2136/">CVE-2012-2136</cve>
	<bugzilla href="https://bugzilla.suse.com/765320">SUSE bug 765320</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589500" comment="kernel-default-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589501" comment="kernel-default-base-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589502" comment="kernel-default-devel-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589503" comment="kernel-default-extra-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589504" comment="kernel-source-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589505" comment="kernel-syms-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589506" comment="kernel-trace-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589507" comment="kernel-trace-base-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589508" comment="kernel-trace-devel-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589509" comment="kernel-trace-extra-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589510" comment="kernel-xen-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589511" comment="kernel-xen-base-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589512" comment="kernel-xen-devel-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589513" comment="kernel-xen-extra-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566052" comment="xen-kmp-default-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566054" comment="xen-kmp-trace-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2137</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2137" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2137" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2137" ref_url="https://www.suse.com/security/cve/CVE-2012-2137" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-March/000365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0759-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0759-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0925-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in virt/kvm/irq_comm.c in the KVM subsystem in the Linux kernel before 3.2.24 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to Message Signaled Interrupts (MSI), irq routing entries, and an incorrect check by the setup_routing_entry function before invoking the kvm_set_irq function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2137/">CVE-2012-2137</cve>
	<bugzilla href="https://bugzilla.suse.com/767612">SUSE bug 767612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589566" comment="kernel-default-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589567" comment="kernel-default-base-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589568" comment="kernel-default-devel-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589569" comment="kernel-default-extra-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589570" comment="kernel-source-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589571" comment="kernel-syms-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589572" comment="kernel-trace-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589573" comment="kernel-trace-base-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589574" comment="kernel-trace-devel-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589575" comment="kernel-trace-extra-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589576" comment="kernel-xen-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589577" comment="kernel-xen-base-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589578" comment="kernel-xen-devel-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589579" comment="kernel-xen-extra-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589580" comment="xen-kmp-default-4.1.4_02_3.0.74_0.6.6-0.5.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589581" comment="xen-kmp-trace-4.1.4_02_3.0.74_0.6.6-0.5.22 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2150</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2150" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2150" ref_url="https://www.suse.com/security/cve/CVE-2012-2150" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001765.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1429-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0018-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00007.html" source="SUSE-SU"/>
    <description>
    xfs_metadump in xfsprogs before 3.2.4 does not properly obfuscate file data, which allows remote attackers to obtain sensitive information by reading a generated image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-2150/">CVE-2012-2150</cve>
	<bugzilla href="https://bugzilla.suse.com/939367">SUSE bug 939367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567270" comment="xfsprogs-3.1.8-0.7.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2313</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2313" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2313" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2313" ref_url="https://www.suse.com/security/cve/CVE-2012-2313" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0689-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0766-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00013.html" source="SUSE-SU"/>
    <description>
    The rio_ioctl function in drivers/net/ethernet/dlink/dl2k.c in the Linux kernel before 3.3.7 does not restrict access to the SIOCSMIIREG command, which allows local users to write data to an Ethernet adapter via an ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2313/">CVE-2012-2313</cve>
	<bugzilla href="https://bugzilla.suse.com/758813">SUSE bug 758813</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589531" comment="kernel-default-3.0.31-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589532" comment="kernel-default-base-3.0.31-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589533" comment="kernel-default-devel-3.0.31-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589534" comment="kernel-default-extra-3.0.31-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589535" comment="kernel-source-3.0.31-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589536" comment="kernel-syms-3.0.31-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589537" comment="kernel-trace-3.0.31-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589538" comment="kernel-trace-base-3.0.31-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589539" comment="kernel-trace-devel-3.0.31-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589540" comment="kernel-trace-extra-3.0.31-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589541" comment="kernel-xen-3.0.31-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589542" comment="kernel-xen-base-3.0.31-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589543" comment="kernel-xen-devel-3.0.31-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589544" comment="kernel-xen-extra-3.0.31-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566052" comment="xen-kmp-default-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566054" comment="xen-kmp-trace-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122319" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2319</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2319" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2319" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2319" ref_url="https://www.suse.com/security/cve/CVE-2012-2319" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0689-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-July/000194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in the hfsplus filesystem implementation in the Linux kernel before 3.3.5 allow local users to gain privileges via a crafted HFS plus filesystem, a related issue to CVE-2009-4020.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2319/">CVE-2012-2319</cve>
	<bugzilla href="https://bugzilla.suse.com/760902">SUSE bug 760902</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589531" comment="kernel-default-3.0.31-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589532" comment="kernel-default-base-3.0.31-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589533" comment="kernel-default-devel-3.0.31-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589534" comment="kernel-default-extra-3.0.31-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589535" comment="kernel-source-3.0.31-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589536" comment="kernel-syms-3.0.31-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589537" comment="kernel-trace-3.0.31-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589538" comment="kernel-trace-base-3.0.31-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589539" comment="kernel-trace-devel-3.0.31-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589540" comment="kernel-trace-extra-3.0.31-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589541" comment="kernel-xen-3.0.31-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589542" comment="kernel-xen-base-3.0.31-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589543" comment="kernel-xen-devel-3.0.31-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589544" comment="kernel-xen-extra-3.0.31-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566052" comment="xen-kmp-default-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566054" comment="xen-kmp-trace-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2370</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2370" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2370" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2370" ref_url="https://www.suse.com/security/cve/CVE-2012-2370" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-July/000172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-July/000174.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0897-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-07/msg00037.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the read_bitmap_file_data function in io-xbm.c in gdk-pixbuf before 2.26.1 allow remote attackers to cause a denial of service (application crash) via a negative (1) height or (2) width in an XBM file, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2370/">CVE-2012-2370</cve>
	<bugzilla href="https://bugzilla.suse.com/762735">SUSE bug 762735</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566013" comment="gtk2-2.18.9-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566014" comment="gtk2-32bit-2.18.9-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566015" comment="gtk2-devel-2.18.9-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566016" comment="gtk2-lang-2.18.9-0.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2372</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2372" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2372" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2372" ref_url="https://www.suse.com/security/cve/CVE-2012-2372" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-December/000318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-March/000365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0927-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00064.html" source="SUSE-SU"/>
    <description>
    The rds_ib_xmit function in net/rds/ib_send.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel 3.7.4 and earlier allows local users to cause a denial of service (BUG_ON and kernel panic) by establishing an RDS connection with the source IP address equal to the IPoIB interface's own IP address, as demonstrated by rds-ping.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-19"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2372/">CVE-2012-2372</cve>
	<bugzilla href="https://bugzilla.suse.com/767610">SUSE bug 767610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/795039">SUSE bug 795039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589697" comment="kernel-default-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589698" comment="kernel-default-base-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589699" comment="kernel-default-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589700" comment="kernel-default-extra-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589701" comment="kernel-source-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589702" comment="kernel-syms-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589703" comment="kernel-trace-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589704" comment="kernel-xen-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589705" comment="kernel-xen-base-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589706" comment="kernel-xen-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589707" comment="kernel-xen-extra-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589708" comment="xen-kmp-default-4.2.4_02_3.0.101_0.35-0.7.45 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589408" comment="kernel-default-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589409" comment="kernel-default-base-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589410" comment="kernel-default-devel-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589411" comment="kernel-default-extra-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589412" comment="kernel-source-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589413" comment="kernel-syms-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589414" comment="kernel-trace-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589415" comment="kernel-trace-base-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589416" comment="kernel-trace-devel-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589417" comment="kernel-trace-extra-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589418" comment="kernel-xen-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589419" comment="kernel-xen-base-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589420" comment="kernel-xen-devel-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589421" comment="kernel-xen-extra-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566052" comment="xen-kmp-default-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566054" comment="xen-kmp-trace-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2373</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2373" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2373" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2373" ref_url="https://www.suse.com/security/cve/CVE-2012-2373" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0789-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0781-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-06/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0812-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0927-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00064.html" source="SUSE-SU"/>
    <description>
    The Linux kernel before 3.4.5 on the x86 platform, when Physical Address Extension (PAE) is enabled, does not properly use the Page Middle Directory (PMD), which allows local users to cause a denial of service (panic) via a crafted application that triggers a race condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-19"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2373/">CVE-2012-2373</cve>
	<bugzilla href="https://bugzilla.suse.com/762991">SUSE bug 762991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589500" comment="kernel-default-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589501" comment="kernel-default-base-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589502" comment="kernel-default-devel-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589503" comment="kernel-default-extra-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589504" comment="kernel-source-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589505" comment="kernel-syms-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589506" comment="kernel-trace-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589507" comment="kernel-trace-base-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589508" comment="kernel-trace-devel-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589509" comment="kernel-trace-extra-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589510" comment="kernel-xen-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589511" comment="kernel-xen-base-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589512" comment="kernel-xen-devel-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589513" comment="kernel-xen-extra-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566052" comment="xen-kmp-default-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566054" comment="xen-kmp-trace-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2375</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2375" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2375" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2375" ref_url="https://www.suse.com/security/cve/CVE-2012-2375" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0789-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00020.html" source="SUSE-SU"/>
    <description>
    The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-4131.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2375/">CVE-2012-2375</cve>
	<bugzilla href="https://bugzilla.suse.com/762992">SUSE bug 762992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/851103">SUSE bug 851103</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589500" comment="kernel-default-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589501" comment="kernel-default-base-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589502" comment="kernel-default-devel-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589503" comment="kernel-default-extra-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589504" comment="kernel-source-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589505" comment="kernel-syms-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589506" comment="kernel-trace-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589507" comment="kernel-trace-base-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589508" comment="kernel-trace-devel-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589509" comment="kernel-trace-extra-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589510" comment="kernel-xen-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589511" comment="kernel-xen-base-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589512" comment="kernel-xen-devel-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589513" comment="kernel-xen-extra-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566052" comment="xen-kmp-default-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566054" comment="xen-kmp-trace-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2390</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2390" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2390" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2390" ref_url="https://www.suse.com/security/cve/CVE-2012-2390" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0789-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-July/000194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0927-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00064.html" source="SUSE-SU"/>
    <description>
    Memory leak in mm/hugetlb.c in the Linux kernel before 3.4.2 allows local users to cause a denial of service (memory consumption or system crash) via invalid MAP_HUGETLB mmap operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-19"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2390/">CVE-2012-2390</cve>
	<bugzilla href="https://bugzilla.suse.com/764150">SUSE bug 764150</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589500" comment="kernel-default-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589501" comment="kernel-default-base-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589502" comment="kernel-default-devel-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589503" comment="kernel-default-extra-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589504" comment="kernel-source-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589505" comment="kernel-syms-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589506" comment="kernel-trace-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589507" comment="kernel-trace-base-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589508" comment="kernel-trace-devel-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589509" comment="kernel-trace-extra-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589510" comment="kernel-xen-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589511" comment="kernel-xen-base-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589512" comment="kernel-xen-devel-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589513" comment="kernel-xen-extra-3.0.34-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566052" comment="xen-kmp-default-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566054" comment="xen-kmp-trace-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2652</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2652" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2652" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2652" ref_url="https://www.suse.com/security/cve/CVE-2012-2652" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1202-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0832-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-07/msg00012.html" source="SUSE-SU"/>
    <description>
    The bdrv_open function in Qemu 1.0 does not properly handle the failure of the mkstemp function, when in snapshot node, which allows local users to overwrite or read arbitrary files via a symlink attack on an unspecified temporary file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2652/">CVE-2012-2652</cve>
	<bugzilla href="https://bugzilla.suse.com/764526">SUSE bug 764526</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589767" comment="kvm-0.15.1-0.21.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2745</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2745" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2745" ref_url="https://www.suse.com/security/cve/CVE-2012-2745" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-October/000278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-March/000365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0396-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0927-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00064.html" source="SUSE-SU"/>
    <description>
    The copy_creds function in kernel/cred.c in the Linux kernel before 3.3.2 provides an invalid replacement session keyring to a child process, which allows local users to cause a denial of service (panic) via a crafted application that uses the fork system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-19"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2745/">CVE-2012-2745</cve>
	<bugzilla href="https://bugzilla.suse.com/770695">SUSE bug 770695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/795039">SUSE bug 795039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589831" comment="kernel-default-3.0.42-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589832" comment="kernel-default-base-3.0.42-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589833" comment="kernel-default-devel-3.0.42-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589834" comment="kernel-default-extra-3.0.42-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589835" comment="kernel-source-3.0.42-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589836" comment="kernel-syms-3.0.42-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589837" comment="kernel-trace-3.0.42-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589838" comment="kernel-trace-base-3.0.42-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589839" comment="kernel-trace-devel-3.0.42-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589840" comment="kernel-trace-extra-3.0.42-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589841" comment="kernel-xen-3.0.42-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589842" comment="kernel-xen-base-3.0.42-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589843" comment="kernel-xen-devel-3.0.42-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589844" comment="kernel-xen-extra-3.0.42-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566052" comment="xen-kmp-default-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566054" comment="xen-kmp-trace-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2825</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2825" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2825" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2825" ref_url="https://www.suse.com/security/cve/CVE-2012-2825" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-July/000191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000629.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0813-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0883-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-07/msg00033.html" source="SUSE-SU"/>
    <description>
    The XSL implementation in Google Chrome before 20.0.1132.43 allows remote attackers to cause a denial of service (incorrect read operation) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2825/">CVE-2012-2825</cve>
	<bugzilla href="https://bugzilla.suse.com/769181">SUSE bug 769181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/769182">SUSE bug 769182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849019">SUSE bug 849019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566146" comment="libxslt-1.1.24-19.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566147" comment="libxslt-32bit-1.1.24-19.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2934</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2934" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2934" ref_url="https://www.suse.com/security/cve/CVE-2012-2934" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0730-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="TID7010688" ref_url="https://www.suse.com/support/kb/doc?id=7010688" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0886-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1572-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1573-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html" source="SUSE-SU"/>
    <description>
    Xen 4.0, and 4.1, when running a 64-bit PV guest on "older" AMD CPUs, does not properly protect against a certain AMD processor bug, which allows local guest OS users to cause a denial of service (host hang) via sequential execution of instructions across a non-canonical boundary, a different vulnerability than CVE-2012-0217.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2934/">CVE-2012-2934</cve>
	<bugzilla href="https://bugzilla.suse.com/764077">SUSE bug 764077</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589049" comment="libvirt-0.9.6-0.15.71 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589050" comment="libvirt-client-0.9.6-0.15.71 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589051" comment="libvirt-client-32bit-0.9.6-0.15.71 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589052" comment="libvirt-doc-0.9.6-0.15.71 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589053" comment="libvirt-python-0.9.6-0.15.71 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589054" comment="virt-manager-0.9.0-3.17.26 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589055" comment="virt-utils-1.1.7-0.11.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589056" comment="vm-install-0.5.9-0.7.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589057" comment="xen-4.1.2_18-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589058" comment="xen-doc-html-4.1.2_18-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589059" comment="xen-doc-pdf-4.1.2_18-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589060" comment="xen-kmp-default-4.1.2_18_3.0.31_0.9-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589061" comment="xen-kmp-pae-4.1.2_18_3.0.31_0.9-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589062" comment="xen-kmp-trace-4.1.2_18_3.0.31_0.9-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589063" comment="xen-libs-4.1.2_18-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589064" comment="xen-libs-32bit-4.1.2_18-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589065" comment="xen-tools-4.1.2_18-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589066" comment="xen-tools-domU-4.1.2_18-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589067" comment="yast2-vm-2.17.10-0.5.42 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3143</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3143" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3143" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3143" ref_url="https://www.suse.com/security/cve/CVE-2012-3143" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, and 5.0 Update 36 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to JMX, a different vulnerability than CVE-2012-5089.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3143/">CVE-2012-3143</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589382" comment="java-1_6_0-openjdk-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589383" comment="java-1_6_0-openjdk-demo-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589384" comment="java-1_6_0-openjdk-devel-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3159</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3159" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3159" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3159" ref_url="https://www.suse.com/security/cve/CVE-2012-3159" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2012-1533.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3159/">CVE-2012-3159</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589382" comment="java-1_6_0-openjdk-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589383" comment="java-1_6_0-openjdk-demo-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589384" comment="java-1_6_0-openjdk-devel-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3216</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3216" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3216" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3216" ref_url="https://www.suse.com/security/cve/CVE-2012-3216" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1423-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00024.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect confidentiality via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-3216/">CVE-2012-3216</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589382" comment="java-1_6_0-openjdk-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589383" comment="java-1_6_0-openjdk-demo-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589384" comment="java-1_6_0-openjdk-devel-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3375</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3375" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3375" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3375" ref_url="https://www.suse.com/security/cve/CVE-2012-3375" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-July/000194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
    <description>
    The epoll_ctl system call in fs/eventpoll.c in the Linux kernel before 3.2.24 does not properly handle ELOOP errors in EPOLL_CTL_ADD operations, which allows local users to cause a denial of service (file-descriptor consumption and system crash) via a crafted application that attempts to create a circular epoll dependency.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-1083.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3375/">CVE-2012-3375</cve>
	<bugzilla href="https://bugzilla.suse.com/769896">SUSE bug 769896</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589859" comment="kernel-default-3.0.38-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589860" comment="kernel-default-base-3.0.38-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589861" comment="kernel-default-devel-3.0.38-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589862" comment="kernel-default-extra-3.0.38-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589863" comment="kernel-source-3.0.38-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589864" comment="kernel-syms-3.0.38-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589865" comment="kernel-trace-3.0.38-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589866" comment="kernel-trace-base-3.0.38-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589867" comment="kernel-trace-devel-3.0.38-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589868" comment="kernel-trace-extra-3.0.38-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589869" comment="kernel-xen-3.0.38-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589870" comment="kernel-xen-base-3.0.38-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589871" comment="kernel-xen-devel-3.0.38-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589872" comment="kernel-xen-extra-3.0.38-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566052" comment="xen-kmp-default-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566054" comment="xen-kmp-trace-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3381</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3381" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3381" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3381" ref_url="https://www.suse.com/security/cve/CVE-2012-3381" source="SUSE CVE"/>
    <description>
    sfcb in sblim-sfcb places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3381/">CVE-2012-3381</cve>
	<bugzilla href="https://bugzilla.suse.com/770234">SUSE bug 770234</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589887" comment="sblim-sfcb-1.3.11-0.19.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3382</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3382" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3382" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3382" ref_url="https://www.suse.com/security/cve/CVE-2012-3382" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-July/000197.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0974-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00017.html" source="SUSE-SU"/>
    <description>
    Cross-site scripting (XSS) vulnerability in the ProcessRequest function in mcs/class/System.Web/System.Web/HttpForbiddenHandler.cs in Mono 2.10.8 and earlier allows remote attackers to inject arbitrary web script or HTML via a file with a crafted name and a forbidden extension, which is not properly handled in an error message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3382/">CVE-2012-3382</cve>
	<bugzilla href="https://bugzilla.suse.com/769799">SUSE bug 769799</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565859" comment="bytefx-data-mysql-2.6.7-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565860" comment="ibm-data-db2-2.6.7-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565861" comment="mono-core-2.6.7-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565862" comment="mono-data-2.6.7-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565863" comment="mono-data-firebird-2.6.7-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565864" comment="mono-data-oracle-2.6.7-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565865" comment="mono-data-postgresql-2.6.7-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565866" comment="mono-data-sqlite-2.6.7-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565867" comment="mono-data-sybase-2.6.7-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565868" comment="mono-devel-2.6.7-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565869" comment="mono-extras-2.6.7-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565870" comment="mono-jscript-2.6.7-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565871" comment="mono-locale-extras-2.6.7-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565872" comment="mono-nunit-2.6.7-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565873" comment="mono-wcf-2.6.7-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565874" comment="mono-web-2.6.7-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565875" comment="mono-winforms-2.6.7-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565876" comment="monodoc-core-2.6.7-0.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123400" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3400</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3400" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3400" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3400" ref_url="https://www.suse.com/security/cve/CVE-2012-3400" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-July/000194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the udf_load_logicalvol function in fs/udf/super.c in the Linux kernel before 3.4.5 allows remote attackers to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted UDF filesystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3400/">CVE-2012-3400</cve>
	<bugzilla href="https://bugzilla.suse.com/769784">SUSE bug 769784</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589859" comment="kernel-default-3.0.38-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589860" comment="kernel-default-base-3.0.38-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589861" comment="kernel-default-devel-3.0.38-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589862" comment="kernel-default-extra-3.0.38-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589863" comment="kernel-source-3.0.38-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589864" comment="kernel-syms-3.0.38-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589865" comment="kernel-trace-3.0.38-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589866" comment="kernel-trace-base-3.0.38-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589867" comment="kernel-trace-devel-3.0.38-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589868" comment="kernel-trace-extra-3.0.38-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589869" comment="kernel-xen-3.0.38-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589870" comment="kernel-xen-base-3.0.38-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589871" comment="kernel-xen-devel-3.0.38-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589872" comment="kernel-xen-extra-3.0.38-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566052" comment="xen-kmp-default-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566054" comment="xen-kmp-trace-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123404" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3404</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3404" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3404" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3404" ref_url="https://www.suse.com/security/cve/CVE-2012-3404" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1666-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-December/000315.html" source="SUSE-SU"/>
    <description>
    The vfprintf function in stdio-common/vfprintf.c in libc in GNU C Library (aka glibc) 2.12 and other versions does not properly calculate a buffer length, which allows context-dependent attackers to bypass the FORTIFY_SOURCE format-string protection mechanism and cause a denial of service (stack corruption and crash) via a format string that uses positional parameters and many format specifiers.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3404/">CVE-2012-3404</cve>
	<bugzilla href="https://bugzilla.suse.com/770891">SUSE bug 770891</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589889" comment="glibc-2.11.3-17.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589890" comment="glibc-32bit-2.11.3-17.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589891" comment="glibc-devel-2.11.3-17.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589892" comment="glibc-devel-32bit-2.11.3-17.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589893" comment="glibc-i18ndata-2.11.3-17.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589894" comment="glibc-locale-2.11.3-17.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589895" comment="glibc-locale-32bit-2.11.3-17.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589896" comment="nscd-2.11.3-17.43.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3405</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3405" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3405" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3405" ref_url="https://www.suse.com/security/cve/CVE-2012-3405" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1666-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-December/000315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000539.html" source="SUSE-SU"/>
    <description>
    The vfprintf function in stdio-common/vfprintf.c in libc in GNU C Library (aka glibc) 2.14 and other versions does not properly calculate a buffer length, which allows context-dependent attackers to bypass the FORTIFY_SOURCE format-string protection mechanism and cause a denial of service (segmentation fault and crash) via a format string with a large number of format specifiers that triggers "desynchronization within the buffer size handling," a different vulnerability than CVE-2012-3404.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3405/">CVE-2012-3405</cve>
	<bugzilla href="https://bugzilla.suse.com/770891">SUSE bug 770891</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589889" comment="glibc-2.11.3-17.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589890" comment="glibc-32bit-2.11.3-17.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589891" comment="glibc-devel-2.11.3-17.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589892" comment="glibc-devel-32bit-2.11.3-17.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589893" comment="glibc-i18ndata-2.11.3-17.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589894" comment="glibc-locale-2.11.3-17.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589895" comment="glibc-locale-32bit-2.11.3-17.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589896" comment="nscd-2.11.3-17.43.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123406" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3406</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3406" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3406" ref_url="https://www.suse.com/security/cve/CVE-2012-3406" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-November/000297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1666-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-December/000315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000539.html" source="SUSE-SU"/>
    <description>
    The vfprintf function in stdio-common/vfprintf.c in GNU C Library (aka glibc) 2.5, 2.12, and probably other versions does not "properly restrict the use of" the alloca function when allocating the SPECS array, which allows context-dependent attackers to bypass the FORTIFY_SOURCE format-string protection mechanism and cause a denial of service (crash) or possibly execute arbitrary code via a crafted format string using positional parameters and a large number of format specifiers, a different vulnerability than CVE-2012-3404 and CVE-2012-3405.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3406/">CVE-2012-3406</cve>
	<bugzilla href="https://bugzilla.suse.com/770891">SUSE bug 770891</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589889" comment="glibc-2.11.3-17.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589890" comment="glibc-32bit-2.11.3-17.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589891" comment="glibc-devel-2.11.3-17.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589892" comment="glibc-devel-32bit-2.11.3-17.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589893" comment="glibc-i18ndata-2.11.3-17.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589894" comment="glibc-locale-2.11.3-17.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589895" comment="glibc-locale-32bit-2.11.3-17.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589896" comment="nscd-2.11.3-17.43.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3412</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3412" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3412" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3412" ref_url="https://www.suse.com/security/cve/CVE-2012-3412" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-December/000318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-March/000365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005470.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1330-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0396-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0927-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00064.html" source="SUSE-SU"/>
    <description>
    The sfc (aka Solarflare Solarstorm) driver in the Linux kernel before 3.2.30 allows remote attackers to cause a denial of service (DMA descriptor consumption and network-controller outage) via crafted TCP packets that trigger a small MSS value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3412/">CVE-2012-3412</cve>
	<bugzilla href="https://bugzilla.suse.com/774523">SUSE bug 774523</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589408" comment="kernel-default-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589409" comment="kernel-default-base-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589410" comment="kernel-default-devel-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589411" comment="kernel-default-extra-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589412" comment="kernel-source-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589413" comment="kernel-syms-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589414" comment="kernel-trace-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589415" comment="kernel-trace-base-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589416" comment="kernel-trace-devel-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589417" comment="kernel-trace-extra-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589418" comment="kernel-xen-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589419" comment="kernel-xen-base-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589420" comment="kernel-xen-devel-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589421" comment="kernel-xen-extra-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566052" comment="xen-kmp-default-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566054" comment="xen-kmp-trace-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3417</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3417" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3417" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3417" ref_url="https://www.suse.com/security/cve/CVE-2012-3417" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1071-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000236.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1058-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00038.html" source="SUSE-SU"/>
    <description>
    The good_client function in rquotad (rquota_svc.c) in Linux DiskQuota (aka quota) before 3.17 invokes the hosts_ctl function the first time without a host name, which might allow remote attackers to bypass TCP Wrappers rules in hosts.deny.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3417/">CVE-2012-3417</cve>
	<bugzilla href="https://bugzilla.suse.com/772570">SUSE bug 772570</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589908" comment="quota-3.16-50.39.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3418</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3418" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3418" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3418" ref_url="https://www.suse.com/security/cve/CVE-2012-3418" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0190-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1036-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1079-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1081-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-09/msg00002.html" source="SUSE-SU"/>
    <description>
    libpcp in Performance Co-Pilot (PCP) before 3.6.5 allows remote attackers to cause a denial of service and possibly execute arbitrary code via (1) a PDU with the numcreds field value greater than the number of actual elements to the __pmDecodeCreds function in p_creds.c; (2) the string byte number value to the __pmDecodeNameList function in p_pmns.c; (3) the numids value to the __pmDecodeIDList function in p_pmns.c; (4) unspecified vectors to the __pmDecodeProfile function in p_profile.c; the (5) status number value or (6) string number value to the __pmDecodeNameList function in p_pmns.c; (7) certain input to the __pmDecodeResult function in p_result.c; (8) the name length field (namelen) to the DecodeNameReq function in p_pmns.c; (9) a crafted PDU_FETCH request to the __pmDecodeFetch function in p_fetch.c; (10) the namelen field in the __pmDecodeInstanceReq function in p_instance.c; (11) the buflen field to the __pmDecodeText function in p_text.c; (12) PDU_INSTANCE packets to the __pmDecodeInstance in p_instance.c; or the (13) c_numpmid or (14) v_numval fields to the __pmDecodeLogControl function in p_lcontrol.c, which triggers integer overflows, heap-based buffer overflows, and/or buffer over-reads.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3418/">CVE-2012-3418</cve>
	<bugzilla href="https://bugzilla.suse.com/775009">SUSE bug 775009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566116" comment="permissions-2013.1.7-0.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3419</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3419" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3419" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3419" ref_url="https://www.suse.com/security/cve/CVE-2012-3419" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0190-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1036-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1079-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1081-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-09/msg00002.html" source="SUSE-SU"/>
    <description>
    Performance Co-Pilot (PCP) before 3.6.5 exports some of the /proc file system, which allows attackers to obtain sensitive information such as proc/pid/maps and command line arguments.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3419/">CVE-2012-3419</cve>
	<bugzilla href="https://bugzilla.suse.com/775010">SUSE bug 775010</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566116" comment="permissions-2013.1.7-0.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3420</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3420" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3420" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3420" ref_url="https://www.suse.com/security/cve/CVE-2012-3420" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0190-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1036-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1079-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1081-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-09/msg00002.html" source="SUSE-SU"/>
    <description>
    Multiple memory leaks in Performance Co-Pilot (PCP) before 3.6.5 allow remote attackers to cause a denial of service (memory consumption or daemon crash) via a large number of PDUs with (1) a crafted context number to the DoFetch function in pmcd/src/dofetch.c or (2) a negative type value to the __pmGetPDU function in libpcp/src/pdu.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3420/">CVE-2012-3420</cve>
	<bugzilla href="https://bugzilla.suse.com/775009">SUSE bug 775009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/775011">SUSE bug 775011</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566116" comment="permissions-2013.1.7-0.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3421</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3421" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3421" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3421" ref_url="https://www.suse.com/security/cve/CVE-2012-3421" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0190-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1036-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1079-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1081-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-09/msg00002.html" source="SUSE-SU"/>
    <description>
    The pduread function in pdu.c in libpcp in Performance Co-Pilot (PCP) before 3.6.5 does not properly time out connections, which allows remote attackers to cause a denial of service (pmcd hang) by sending individual bytes of a PDU separately, related to an "event-driven programming flaw."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3421/">CVE-2012-3421</cve>
	<bugzilla href="https://bugzilla.suse.com/775009">SUSE bug 775009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/775013">SUSE bug 775013</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566116" comment="permissions-2013.1.7-0.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3422</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3422" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3422" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3422" ref_url="https://www.suse.com/security/cve/CVE-2012-3422" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0979-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0851-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0981-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0982-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0826-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0893-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0966-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00101.html" source="SUSE-SU"/>
    <description>
    The getFirstInTableInstance function in the IcedTea-Web plugin before 1.2.1 returns an uninitialized pointer when the instance_to_id_map hash is empty, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted web page, which causes an uninitialized memory location to be read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3422/">CVE-2012-3422</cve>
	<bugzilla href="https://bugzilla.suse.com/773458">SUSE bug 773458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/818768">SUSE bug 818768</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589913" comment="icedtea-web-1.4-0.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589914" comment="icedtea-web-1.4-0.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3423</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3423" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3423" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3423" ref_url="https://www.suse.com/security/cve/CVE-2012-3423" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0979-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0851-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0981-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0982-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0826-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0893-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0966-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00101.html" source="SUSE-SU"/>
    <description>
    The IcedTea-Web plugin before 1.2.1 does not properly handle NPVariant NPStrings without NUL terminators, which allows remote attackers to cause a denial of service (crash), obtain sensitive information from memory, or execute arbitrary code via a crafted Java applet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3423/">CVE-2012-3423</cve>
	<bugzilla href="https://bugzilla.suse.com/773458">SUSE bug 773458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/818768">SUSE bug 818768</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589913" comment="icedtea-web-1.4-0.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589914" comment="icedtea-web-1.4-0.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3430</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3430" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3430" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3430" ref_url="https://www.suse.com/security/cve/CVE-2012-3430" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-December/000318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-December/000321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-March/000365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005470.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0927-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00064.html" source="SUSE-SU"/>
    <description>
    The rds_recvmsg function in net/rds/recv.c in the Linux kernel before 3.0.44 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a (1) recvfrom or (2) recvmsg system call on an RDS socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-19"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3430/">CVE-2012-3430</cve>
	<bugzilla href="https://bugzilla.suse.com/773383">SUSE bug 773383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/795039">SUSE bug 795039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589408" comment="kernel-default-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589409" comment="kernel-default-base-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589410" comment="kernel-default-devel-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589411" comment="kernel-default-extra-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589412" comment="kernel-source-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589413" comment="kernel-syms-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589414" comment="kernel-trace-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589415" comment="kernel-trace-base-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589416" comment="kernel-trace-devel-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589417" comment="kernel-trace-extra-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589418" comment="kernel-xen-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589419" comment="kernel-xen-base-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589420" comment="kernel-xen-devel-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589421" comment="kernel-xen-extra-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566052" comment="xen-kmp-default-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566054" comment="xen-kmp-trace-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3432</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3432" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3432" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3432" ref_url="https://www.suse.com/security/cve/CVE-2012-3432" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1176-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-09/msg00063.html" source="SUSE-SU"/>
    <description>
    The handle_mmio function in arch/x86/hvm/io.c in the MMIO operations emulator for Xen 3.3 and 4.x, when running an HVM guest, does not properly reset certain state information between emulation cycles, which allows local guest OS users to cause a denial of service (guest OS crash) via unspecified operations on MMIO regions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3432/">CVE-2012-3432</cve>
	<bugzilla href="https://bugzilla.suse.com/773393">SUSE bug 773393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773401">SUSE bug 773401</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566203" comment="libvirt-0.9.6-0.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566204" comment="libvirt-client-0.9.6-0.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566205" comment="libvirt-client-32bit-0.9.6-0.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566206" comment="libvirt-doc-0.9.6-0.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566207" comment="libvirt-python-0.9.6-0.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566208" comment="virt-manager-0.9.0-3.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566209" comment="vm-install-0.5.10-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566210" comment="xen-4.1.2_20-0.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566211" comment="xen-doc-html-4.1.2_20-0.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566212" comment="xen-doc-pdf-4.1.2_20-0.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566213" comment="xen-kmp-default-4.1.2_20_3.0.38_0.5-0.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566214" comment="xen-kmp-trace-4.1.2_20_3.0.38_0.5-0.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566215" comment="xen-libs-4.1.2_20-0.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566216" comment="xen-libs-32bit-4.1.2_20-0.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566217" comment="xen-tools-4.1.2_20-0.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566218" comment="xen-tools-domU-4.1.2_20-0.5.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3438</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3438" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3438" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3438" ref_url="https://www.suse.com/security/cve/CVE-2012-3438" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0536-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00102.html" source="SUSE-SU"/>
    <description>
    The Magick_png_malloc function in coders/png.c in GraphicsMagick 6.7.8-6 does not use the proper variable type for the allocation size, which might allow remote attackers to cause a denial of service (crash) via a crafted PNG file that triggers incorrect memory allocation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3438/">CVE-2012-3438</cve>
	<bugzilla href="https://bugzilla.suse.com/773612">SUSE bug 773612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785093">SUSE bug 785093</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565839" comment="ImageMagick-6.4.3.6-7.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565840" comment="libMagick++1-6.4.3.6-7.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565841" comment="libMagickCore1-6.4.3.6-7.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565842" comment="libMagickCore1-32bit-6.4.3.6-7.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565843" comment="libMagickWand1-6.4.3.6-7.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3461</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3461" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3461" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3461" ref_url="https://www.suse.com/security/cve/CVE-2012-3461" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1578-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00019.html" source="SUSE-SU"/>
    <description>
    The (1) otrl_base64_otr_decode function in src/b64.c; (2) otrl_proto_data_read_flags and (3) otrl_proto_accept_data functions in src/proto.c; and (4) decode function in toolkit/parse.c in libotr before 3.2.1 allocates a zero-length buffer when decoding a base64 string, which allows remote attackers to cause a denial of service (application crash) via a message with the value "?OTR:===.", which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3461/">CVE-2012-3461</cve>
	<bugzilla href="https://bugzilla.suse.com/777468">SUSE bug 777468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/789190">SUSE bug 789190</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566115" comment="libotr2-3.2.0-10.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3480</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3480" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3480" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3480" ref_url="https://www.suse.com/security/cve/CVE-2012-3480" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1666-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-December/000315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-December/000316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-August/000563.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the (1) strtod, (2) strtof, (3) strtold, (4) strtod_l, and other unspecified "related functions" in stdlib in GNU C Library (aka glibc or libc6) 2.16 allow local users to cause a denial of service (application crash) and possibly execute arbitrary code via a long string, which triggers a stack-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-21"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3480/">CVE-2012-3480</cve>
	<bugzilla href="https://bugzilla.suse.com/775690">SUSE bug 775690</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589889" comment="glibc-2.11.3-17.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589890" comment="glibc-32bit-2.11.3-17.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589891" comment="glibc-devel-2.11.3-17.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589892" comment="glibc-devel-32bit-2.11.3-17.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589893" comment="glibc-i18ndata-2.11.3-17.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589894" comment="glibc-locale-2.11.3-17.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589895" comment="glibc-locale-32bit-2.11.3-17.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589896" comment="nscd-2.11.3-17.43.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3482</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3482" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3482" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3482" ref_url="https://www.suse.com/security/cve/CVE-2012-3482" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001966.html" source="SUSE-SU"/>
    <description>
    Fetchmail 5.0.8 through 6.3.21, when using NTLM authentication in debug mode, allows remote NTLM servers to (1) cause a denial of service (crash and delayed delivery of inbound mail) via a crafted NTLM response that triggers an out-of-bounds read in the base64 decoder, or (2) obtain sensitive information from memory via an NTLM Type 2 message with a crafted Target Name structure, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3482/">CVE-2012-3482</cve>
	<bugzilla href="https://bugzilla.suse.com/775988">SUSE bug 775988</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567313" comment="fetchmail-6.3.8.90-13.20.21.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3494</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3494" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3494" ref_url="https://www.suse.com/security/cve/CVE-2012-3494" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1129-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1132-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1133-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1135-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1162-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1176-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-09/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1572-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1573-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html" source="SUSE-SU"/>
    <description>
    The set_debugreg hypercall in include/asm-x86/debugreg.h in Xen 4.0, 4.1, and 4.2, and Citrix XenServer 6.0.2 and earlier, when running on x86-64 systems, allows local OS guest users to cause a denial of service (host crash) by writing to the reserved bits of the DR7 debug control register.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3494/">CVE-2012-3494</cve>
	<bugzilla href="https://bugzilla.suse.com/777090">SUSE bug 777090</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589916" comment="vm-install-0.5.12-0.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566220" comment="xen-4.1.3_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566221" comment="xen-doc-html-4.1.3_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566222" comment="xen-doc-pdf-4.1.3_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566223" comment="xen-kmp-default-4.1.3_02_3.0.38_0.5-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566224" comment="xen-kmp-trace-4.1.3_02_3.0.38_0.5-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566225" comment="xen-libs-4.1.3_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566226" comment="xen-libs-32bit-4.1.3_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566227" comment="xen-tools-4.1.3_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566228" comment="xen-tools-domU-4.1.3_02-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3495</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3495" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3495" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3495" ref_url="https://www.suse.com/security/cve/CVE-2012-3495" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1132-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1133-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1176-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-09/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1572-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1573-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html" source="SUSE-SU"/>
    <description>
    The physdev_get_free_pirq hypercall in arch/x86/physdev.c in Xen 4.1.x and Citrix XenServer 6.0.2 and earlier uses the return value of the get_free_pirq function as an array index without checking that the return value indicates an error, which allows guest OS users to cause a denial of service (invalid memory write and host crash) and possibly gain privileges via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3495/">CVE-2012-3495</cve>
	<bugzilla href="https://bugzilla.suse.com/777088">SUSE bug 777088</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589916" comment="vm-install-0.5.12-0.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566220" comment="xen-4.1.3_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566221" comment="xen-doc-html-4.1.3_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566222" comment="xen-doc-pdf-4.1.3_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566223" comment="xen-kmp-default-4.1.3_02_3.0.38_0.5-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566224" comment="xen-kmp-trace-4.1.3_02_3.0.38_0.5-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566225" comment="xen-libs-4.1.3_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566226" comment="xen-libs-32bit-4.1.3_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566227" comment="xen-tools-4.1.3_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566228" comment="xen-tools-domU-4.1.3_02-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123496" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3496</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3496" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3496" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3496" ref_url="https://www.suse.com/security/cve/CVE-2012-3496" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1132-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1133-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1162-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1176-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-09/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1572-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1573-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html" source="SUSE-SU"/>
    <description>
    XENMEM_populate_physmap in Xen 4.0, 4.1, and 4.2, and Citrix XenServer 6.0.2 and earlier, when translating paging mode is not used, allows local PV OS guest kernels to cause a denial of service (BUG triggered and host crash) via invalid flags such as MEMF_populate_on_demand.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3496/">CVE-2012-3496</cve>
	<bugzilla href="https://bugzilla.suse.com/777091">SUSE bug 777091</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589916" comment="vm-install-0.5.12-0.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566220" comment="xen-4.1.3_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566221" comment="xen-doc-html-4.1.3_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566222" comment="xen-doc-pdf-4.1.3_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566223" comment="xen-kmp-default-4.1.3_02_3.0.38_0.5-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566224" comment="xen-kmp-trace-4.1.3_02_3.0.38_0.5-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566225" comment="xen-libs-4.1.3_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566226" comment="xen-libs-32bit-4.1.3_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566227" comment="xen-tools-4.1.3_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566228" comment="xen-tools-domU-4.1.3_02-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3497</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3497" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3497" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3497" ref_url="https://www.suse.com/security/cve/CVE-2012-3497" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1487-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1572-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1573-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html" source="SUSE-SU"/>
    <description>
    (1) TMEMC_SAVE_GET_CLIENT_WEIGHT, (2) TMEMC_SAVE_GET_CLIENT_CAP, (3) TMEMC_SAVE_GET_CLIENT_FLAGS and (4) TMEMC_SAVE_END in the Transcendent Memory (TMEM) in Xen 4.0, 4.1, and 4.2 allow local guest OS users to cause a denial of service (NULL pointer dereference or memory corruption and host crash) or possibly have other unspecified impacts via a NULL client id.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3497/">CVE-2012-3497</cve>
	<bugzilla href="https://bugzilla.suse.com/777890">SUSE bug 777890</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566138" comment="libvirt-0.9.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566139" comment="libvirt-client-0.9.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566140" comment="libvirt-client-32bit-0.9.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566141" comment="libvirt-doc-0.9.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566142" comment="libvirt-python-0.9.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589917" comment="vm-install-0.5.14-0.5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566229" comment="xen-4.1.3_04-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566230" comment="xen-doc-html-4.1.3_04-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566231" comment="xen-doc-pdf-4.1.3_04-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566232" comment="xen-kmp-default-4.1.3_04_3.0.42_0.7-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566233" comment="xen-kmp-pae-4.1.3_04_3.0.42_0.7-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566234" comment="xen-kmp-trace-4.1.3_04_3.0.42_0.7-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566235" comment="xen-libs-4.1.3_04-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566236" comment="xen-libs-32bit-4.1.3_04-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566237" comment="xen-tools-4.1.3_04-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566238" comment="xen-tools-domU-4.1.3_04-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3498</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3498" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3498" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3498" ref_url="https://www.suse.com/security/cve/CVE-2012-3498" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1132-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1133-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1176-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-09/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1572-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1573-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html" source="SUSE-SU"/>
    <description>
    PHYSDEVOP_map_pirq in Xen 4.1 and 4.2 and Citrix XenServer 6.0.2 and earlier allows local HVM guest OS kernels to cause a denial of service (host crash) and possibly read hypervisor or guest memory via vectors related to a missing range check of map-&gt;index.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3498/">CVE-2012-3498</cve>
	<bugzilla href="https://bugzilla.suse.com/777086">SUSE bug 777086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589916" comment="vm-install-0.5.12-0.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566220" comment="xen-4.1.3_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566221" comment="xen-doc-html-4.1.3_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566222" comment="xen-doc-pdf-4.1.3_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566223" comment="xen-kmp-default-4.1.3_02_3.0.38_0.5-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566224" comment="xen-kmp-trace-4.1.3_02_3.0.38_0.5-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566225" comment="xen-libs-4.1.3_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566226" comment="xen-libs-32bit-4.1.3_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566227" comment="xen-tools-4.1.3_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566228" comment="xen-tools-domU-4.1.3_02-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3509</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3509" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3509" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3509" ref_url="https://www.suse.com/security/cve/CVE-2012-3509" source="SUSE CVE"/>
    <description>
    Multiple integer overflows in the (1) _objalloc_alloc function in objalloc.c and (2) objalloc_alloc macro in include/objalloc.h in GNU libiberty, as used by binutils 2.22, allow remote attackers to cause a denial of service (crash) via vectors related to the "addition of CHUNK_HEADER_SIZE to the length," which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3509/">CVE-2012-3509</cve>
	<bugzilla href="https://bugzilla.suse.com/776968">SUSE bug 776968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589925" comment="binutils-2.25.0-5.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589926" comment="gdb-7.9.1-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589927" comment="libgcc_s1-5.2.1+r226025-2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589928" comment="libgcc_s1-32bit-5.2.1+r226025-2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589929" comment="libgfortran3-5.2.1+r226025-2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589930" comment="libgfortran3-32bit-5.2.1+r226025-2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589931" comment="libgomp1-5.2.1+r226025-2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589932" comment="libgomp1-32bit-5.2.1+r226025-2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589933" comment="libquadmath0-5.2.1+r226025-2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589934" comment="libquadmath0-32bit-5.2.1+r226025-2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589935" comment="libstdc++6-5.2.1+r226025-2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589936" comment="libstdc++6-32bit-5.2.1+r226025-2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589937" comment="libstdc++6-locale-5.2.1+r226025-2.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3515</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3515" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3515" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3515" ref_url="https://www.suse.com/security/cve/CVE-2012-3515" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1129-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1132-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1133-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1135-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1162-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1202-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1203-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1205-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1153-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1170-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1176-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-09/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1572-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1573-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html" source="SUSE-SU"/>
    <description>
    Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3515/">CVE-2012-3515</cve>
	<bugzilla href="https://bugzilla.suse.com/777084">SUSE bug 777084</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589990" comment="kvm-0.15.1-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589916" comment="vm-install-0.5.12-0.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566220" comment="xen-4.1.3_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566221" comment="xen-doc-html-4.1.3_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566222" comment="xen-doc-pdf-4.1.3_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566223" comment="xen-kmp-default-4.1.3_02_3.0.38_0.5-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566224" comment="xen-kmp-trace-4.1.3_02_3.0.38_0.5-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566225" comment="xen-libs-4.1.3_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566226" comment="xen-libs-32bit-4.1.3_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566227" comment="xen-tools-4.1.3_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566228" comment="xen-tools-domU-4.1.3_02-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3524</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3524" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3524" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3524" ref_url="https://www.suse.com/security/cve/CVE-2012-3524" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1287-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1418-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-10/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1228-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0111-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00051.html" source="SUSE-SU"/>
    <description>
    libdbus 1.5.x and earlier, when used in setuid or other privileged programs in X.org and possibly other products, allows local users to gain privileges and execute arbitrary code via the DBUS_SYSTEM_BUS_ADDRESS environment variable.  NOTE: libdbus maintainers state that this is a vulnerability in the applications that do not cleanse environment variables, not in libdbus itself: "we do not support use of libdbus in setuid binaries that do not sanitize their environment before their first call into libdbus."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3524/">CVE-2012-3524</cve>
	<bugzilla href="https://bugzilla.suse.com/697105">SUSE bug 697105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852781">SUSE bug 852781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912016">SUSE bug 912016</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589991" comment="dbus-1-1.2.10-3.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589992" comment="dbus-1-32bit-1.2.10-3.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589993" comment="dbus-1-x11-1.2.10-3.25.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3543</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3543" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3543" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3543" ref_url="https://www.suse.com/security/cve/CVE-2012-3543" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002433.html" source="SUSE-SU"/>
    <description>
    mono 2.10.x ASP.NET Web Form Hash collision DoS
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3543/">CVE-2012-3543</cve>
	<bugzilla href="https://bugzilla.suse.com/739119">SUSE bug 739119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963818">SUSE bug 963818</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567394" comment="bytefx-data-mysql-2.6.7-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567395" comment="ibm-data-db2-2.6.7-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567396" comment="mono-core-2.6.7-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567397" comment="mono-data-2.6.7-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567398" comment="mono-data-firebird-2.6.7-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567399" comment="mono-data-oracle-2.6.7-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567400" comment="mono-data-postgresql-2.6.7-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567401" comment="mono-data-sqlite-2.6.7-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567402" comment="mono-data-sybase-2.6.7-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567403" comment="mono-devel-2.6.7-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567404" comment="mono-extras-2.6.7-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567405" comment="mono-jscript-2.6.7-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567406" comment="mono-locale-extras-2.6.7-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567407" comment="mono-nunit-2.6.7-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567408" comment="mono-wcf-2.6.7-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567409" comment="mono-web-2.6.7-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567410" comment="mono-winforms-2.6.7-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567411" comment="monodoc-core-2.6.7-0.16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3570</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3570" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3570" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3570" ref_url="https://www.suse.com/security/cve/CVE-2012-3570" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000210.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1006-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00030.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in ISC DHCP 4.2.x before 4.2.4-P1, when DHCPv6 mode is enabled, allows remote attackers to cause a denial of service (segmentation fault and daemon exit) via a crafted client identifier parameter.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3570/">CVE-2012-3570</cve>
	<bugzilla href="https://bugzilla.suse.com/772924">SUSE bug 772924</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590002" comment="dhcp-4.2.4.P1-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590003" comment="dhcp-client-4.2.4.P1-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3571</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3571" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3571" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3571" ref_url="https://www.suse.com/security/cve/CVE-2012-3571" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000212.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1006-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00030.html" source="SUSE-SU"/>
    <description>
    ISC DHCP 4.1.2 through 4.2.4 and 4.1-ESV before 4.1-ESV-R6 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a malformed client identifier.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3571/">CVE-2012-3571</cve>
	<bugzilla href="https://bugzilla.suse.com/772924">SUSE bug 772924</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590002" comment="dhcp-4.2.4.P1-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590003" comment="dhcp-client-4.2.4.P1-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3817</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3817" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3817" ref_url="https://www.suse.com/security/cve/CVE-2012-3817" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1048-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1048-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000233.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0969-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0971-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0605-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00035.html" source="SUSE-SU"/>
    <description>
    ISC BIND 9.4.x, 9.5.x, 9.6.x, and 9.7.x before 9.7.6-P2; 9.8.x before 9.8.3-P2; 9.9.x before 9.9.1-P2; and 9.6-ESV before 9.6-ESV-R7-P2, when DNSSEC validation is enabled, does not properly initialize the failing-query cache, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) by sending many queries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-10"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3817/">CVE-2012-3817</cve>
	<bugzilla href="https://bugzilla.suse.com/772945">SUSE bug 772945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/792926">SUSE bug 792926</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590009" comment="bind-libs-9.6ESVR7P2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590010" comment="bind-libs-32bit-9.6ESVR7P2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590011" comment="bind-utils-9.6ESVR7P2-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3954</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3954" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3954" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3954" ref_url="https://www.suse.com/security/cve/CVE-2012-3954" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000212.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1006-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00030.html" source="SUSE-SU"/>
    <description>
    Multiple memory leaks in ISC DHCP 4.1.x and 4.2.x before 4.2.4-P1 and 4.1-ESV before 4.1-ESV-R6 allow remote attackers to cause a denial of service (memory consumption) by sending many requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3954/">CVE-2012-3954</cve>
	<bugzilla href="https://bugzilla.suse.com/772924">SUSE bug 772924</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590002" comment="dhcp-4.2.4.P1-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590003" comment="dhcp-client-4.2.4.P1-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3955</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3955" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3955" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3955" ref_url="https://www.suse.com/security/cve/CVE-2012-3955" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-October/000274.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1234-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-09/msg00088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1252-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-09/msg00103.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1254-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-09/msg00105.html" source="SUSE-SU"/>
    <description>
    ISC DHCP 4.1.x before 4.1-ESV-R7 and 4.2.x before 4.2.4-P2 allows remote attackers to cause a denial of service (daemon crash) in opportunistic circumstances by establishing an IPv6 lease in an environment where the lease expiration time is later reduced.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3955/">CVE-2012-3955</cve>
	<bugzilla href="https://bugzilla.suse.com/780167">SUSE bug 780167</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590018" comment="dhcp-4.2.4.P2-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590019" comment="dhcp-client-4.2.4.P2-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3956</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3956" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3956" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3956" ref_url="https://www.suse.com/security/cve/CVE-2012-3956" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the MediaStreamGraphThreadRunnable::Run function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3956/">CVE-2012-3956</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565919" comment="MozillaFirefox-10.0.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565920" comment="MozillaFirefox-branding-SLED-7-0.6.7.80 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565921" comment="MozillaFirefox-translations-10.0.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565922" comment="libfreebl3-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565923" comment="libfreebl3-32bit-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565924" comment="mozilla-nspr-4.9.2-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565925" comment="mozilla-nspr-32bit-4.9.2-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565926" comment="mozilla-nss-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565927" comment="mozilla-nss-32bit-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565928" comment="mozilla-nss-tools-3.13.6-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3957</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3957" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3957" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3957" ref_url="https://www.suse.com/security/cve/CVE-2012-3957" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the nsBlockFrame::MarkLineDirty function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3957/">CVE-2012-3957</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565919" comment="MozillaFirefox-10.0.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565920" comment="MozillaFirefox-branding-SLED-7-0.6.7.80 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565921" comment="MozillaFirefox-translations-10.0.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565922" comment="libfreebl3-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565923" comment="libfreebl3-32bit-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565924" comment="mozilla-nspr-4.9.2-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565925" comment="mozilla-nspr-32bit-4.9.2-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565926" comment="mozilla-nss-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565927" comment="mozilla-nss-32bit-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565928" comment="mozilla-nss-tools-3.13.6-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3958</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3958" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3958" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3958" ref_url="https://www.suse.com/security/cve/CVE-2012-3958" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsHTMLEditRules::DeleteNonTableElements function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3958/">CVE-2012-3958</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565919" comment="MozillaFirefox-10.0.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565920" comment="MozillaFirefox-branding-SLED-7-0.6.7.80 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565921" comment="MozillaFirefox-translations-10.0.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565922" comment="libfreebl3-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565923" comment="libfreebl3-32bit-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565924" comment="mozilla-nspr-4.9.2-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565925" comment="mozilla-nspr-32bit-4.9.2-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565926" comment="mozilla-nss-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565927" comment="mozilla-nss-32bit-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565928" comment="mozilla-nss-tools-3.13.6-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3959</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3959" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3959" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3959" ref_url="https://www.suse.com/security/cve/CVE-2012-3959" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsRangeUpdater::SelAdjDeleteNode function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3959/">CVE-2012-3959</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565919" comment="MozillaFirefox-10.0.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565920" comment="MozillaFirefox-branding-SLED-7-0.6.7.80 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565921" comment="MozillaFirefox-translations-10.0.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565922" comment="libfreebl3-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565923" comment="libfreebl3-32bit-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565924" comment="mozilla-nspr-4.9.2-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565925" comment="mozilla-nspr-32bit-4.9.2-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565926" comment="mozilla-nss-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565927" comment="mozilla-nss-32bit-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565928" comment="mozilla-nss-tools-3.13.6-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3960</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3960" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3960" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3960" ref_url="https://www.suse.com/security/cve/CVE-2012-3960" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the mozSpellChecker::SetCurrentDictionary function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3960/">CVE-2012-3960</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565919" comment="MozillaFirefox-10.0.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565920" comment="MozillaFirefox-branding-SLED-7-0.6.7.80 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565921" comment="MozillaFirefox-translations-10.0.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565922" comment="libfreebl3-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565923" comment="libfreebl3-32bit-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565924" comment="mozilla-nspr-4.9.2-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565925" comment="mozilla-nspr-32bit-4.9.2-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565926" comment="mozilla-nss-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565927" comment="mozilla-nss-32bit-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565928" comment="mozilla-nss-tools-3.13.6-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3961</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3961" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3961" ref_url="https://www.suse.com/security/cve/CVE-2012-3961" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the RangeData implementation in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3961/">CVE-2012-3961</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565919" comment="MozillaFirefox-10.0.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565920" comment="MozillaFirefox-branding-SLED-7-0.6.7.80 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565921" comment="MozillaFirefox-translations-10.0.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565922" comment="libfreebl3-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565923" comment="libfreebl3-32bit-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565924" comment="mozilla-nspr-4.9.2-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565925" comment="mozilla-nspr-32bit-4.9.2-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565926" comment="mozilla-nss-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565927" comment="mozilla-nss-32bit-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565928" comment="mozilla-nss-tools-3.13.6-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3962</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3962" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3962" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3962" ref_url="https://www.suse.com/security/cve/CVE-2012-3962" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 do not properly iterate through the characters in a text run, which allows remote attackers to execute arbitrary code via a crafted document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3962/">CVE-2012-3962</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565919" comment="MozillaFirefox-10.0.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565920" comment="MozillaFirefox-branding-SLED-7-0.6.7.80 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565921" comment="MozillaFirefox-translations-10.0.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565922" comment="libfreebl3-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565923" comment="libfreebl3-32bit-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565924" comment="mozilla-nspr-4.9.2-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565925" comment="mozilla-nspr-32bit-4.9.2-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565926" comment="mozilla-nss-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565927" comment="mozilla-nss-32bit-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565928" comment="mozilla-nss-tools-3.13.6-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123963" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3963</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3963" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3963" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3963" ref_url="https://www.suse.com/security/cve/CVE-2012-3963" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the js::gc::MapAllocToTraceKind function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3963/">CVE-2012-3963</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565919" comment="MozillaFirefox-10.0.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565920" comment="MozillaFirefox-branding-SLED-7-0.6.7.80 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565921" comment="MozillaFirefox-translations-10.0.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565922" comment="libfreebl3-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565923" comment="libfreebl3-32bit-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565924" comment="mozilla-nspr-4.9.2-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565925" comment="mozilla-nspr-32bit-4.9.2-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565926" comment="mozilla-nss-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565927" comment="mozilla-nss-32bit-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565928" comment="mozilla-nss-tools-3.13.6-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3964</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3964" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3964" ref_url="https://www.suse.com/security/cve/CVE-2012-3964" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the gfxTextRun::GetUserData function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3964/">CVE-2012-3964</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565919" comment="MozillaFirefox-10.0.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565920" comment="MozillaFirefox-branding-SLED-7-0.6.7.80 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565921" comment="MozillaFirefox-translations-10.0.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565922" comment="libfreebl3-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565923" comment="libfreebl3-32bit-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565924" comment="mozilla-nspr-4.9.2-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565925" comment="mozilla-nspr-32bit-4.9.2-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565926" comment="mozilla-nss-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565927" comment="mozilla-nss-32bit-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565928" comment="mozilla-nss-tools-3.13.6-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3965</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3965" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3965" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3965" ref_url="https://www.suse.com/security/cve/CVE-2012-3965" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 15.0 does not properly restrict navigation to the about:newtab page, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted web site that triggers creation of a new tab and then a new window.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3965/">CVE-2012-3965</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565919" comment="MozillaFirefox-10.0.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565920" comment="MozillaFirefox-branding-SLED-7-0.6.7.80 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565921" comment="MozillaFirefox-translations-10.0.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565922" comment="libfreebl3-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565923" comment="libfreebl3-32bit-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565924" comment="mozilla-nspr-4.9.2-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565925" comment="mozilla-nspr-32bit-4.9.2-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565926" comment="mozilla-nss-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565927" comment="mozilla-nss-32bit-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565928" comment="mozilla-nss-tools-3.13.6-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3966</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3966" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3966" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3966" ref_url="https://www.suse.com/security/cve/CVE-2012-3966" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a negative height value in a BMP image within a .ICO file, related to (1) improper handling of the transparency bitmask by the nsICODecoder component and (2) improper processing of the alpha channel by the nsBMPDecoder component.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3966/">CVE-2012-3966</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565919" comment="MozillaFirefox-10.0.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565920" comment="MozillaFirefox-branding-SLED-7-0.6.7.80 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565921" comment="MozillaFirefox-translations-10.0.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565922" comment="libfreebl3-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565923" comment="libfreebl3-32bit-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565924" comment="mozilla-nspr-4.9.2-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565925" comment="mozilla-nspr-32bit-4.9.2-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565926" comment="mozilla-nss-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565927" comment="mozilla-nss-32bit-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565928" comment="mozilla-nss-tools-3.13.6-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3967</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3967" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3967" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3967" ref_url="https://www.suse.com/security/cve/CVE-2012-3967" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The WebGL implementation in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 on Linux, when a large number of sampler uniforms are used, does not properly interact with Mesa drivers, which allows remote attackers to execute arbitrary code or cause a denial of service (stack memory corruption) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3967/">CVE-2012-3967</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565919" comment="MozillaFirefox-10.0.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565920" comment="MozillaFirefox-branding-SLED-7-0.6.7.80 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565921" comment="MozillaFirefox-translations-10.0.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565922" comment="libfreebl3-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565923" comment="libfreebl3-32bit-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565924" comment="mozilla-nspr-4.9.2-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565925" comment="mozilla-nspr-32bit-4.9.2-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565926" comment="mozilla-nss-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565927" comment="mozilla-nss-32bit-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565928" comment="mozilla-nss-tools-3.13.6-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123968" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3968</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3968" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3968" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3968" ref_url="https://www.suse.com/security/cve/CVE-2012-3968" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the WebGL implementation in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code via vectors related to deletion of a fragment shader by its accessor.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3968/">CVE-2012-3968</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565919" comment="MozillaFirefox-10.0.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565920" comment="MozillaFirefox-branding-SLED-7-0.6.7.80 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565921" comment="MozillaFirefox-translations-10.0.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565922" comment="libfreebl3-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565923" comment="libfreebl3-32bit-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565924" comment="mozilla-nspr-4.9.2-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565925" comment="mozilla-nspr-32bit-4.9.2-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565926" comment="mozilla-nss-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565927" comment="mozilla-nss-32bit-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565928" comment="mozilla-nss-tools-3.13.6-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3969</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3969" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3969" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3969" ref_url="https://www.suse.com/security/cve/CVE-2012-3969" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the nsSVGFEMorphologyElement::Filter function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code via a crafted SVG filter that triggers an incorrect sum calculation, leading to a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3969/">CVE-2012-3969</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565919" comment="MozillaFirefox-10.0.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565920" comment="MozillaFirefox-branding-SLED-7-0.6.7.80 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565921" comment="MozillaFirefox-translations-10.0.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565922" comment="libfreebl3-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565923" comment="libfreebl3-32bit-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565924" comment="mozilla-nspr-4.9.2-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565925" comment="mozilla-nspr-32bit-4.9.2-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565926" comment="mozilla-nss-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565927" comment="mozilla-nss-32bit-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565928" comment="mozilla-nss-tools-3.13.6-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3970</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3970" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3970" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3970" ref_url="https://www.suse.com/security/cve/CVE-2012-3970" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsTArray_base::Length function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving movement of a requiredFeatures attribute from one SVG document to another.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3970/">CVE-2012-3970</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565919" comment="MozillaFirefox-10.0.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565920" comment="MozillaFirefox-branding-SLED-7-0.6.7.80 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565921" comment="MozillaFirefox-translations-10.0.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565922" comment="libfreebl3-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565923" comment="libfreebl3-32bit-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565924" comment="mozilla-nspr-4.9.2-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565925" comment="mozilla-nspr-32bit-4.9.2-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565926" comment="mozilla-nss-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565927" comment="mozilla-nss-32bit-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565928" comment="mozilla-nss-tools-3.13.6-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3971</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3971" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3971" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3971" ref_url="https://www.suse.com/security/cve/CVE-2012-3971" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Summer Institute of Linguistics (SIL) Graphite 2, as used in Mozilla Firefox before 15.0, Thunderbird before 15.0, and SeaMonkey before 2.12, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors related to the (1) Silf::readClassMap and (2) Pass::readPass functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3971/">CVE-2012-3971</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565919" comment="MozillaFirefox-10.0.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565920" comment="MozillaFirefox-branding-SLED-7-0.6.7.80 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565921" comment="MozillaFirefox-translations-10.0.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565922" comment="libfreebl3-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565923" comment="libfreebl3-32bit-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565924" comment="mozilla-nspr-4.9.2-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565925" comment="mozilla-nspr-32bit-4.9.2-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565926" comment="mozilla-nss-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565927" comment="mozilla-nss-32bit-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565928" comment="mozilla-nss-tools-3.13.6-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3972</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3972" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3972" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3972" ref_url="https://www.suse.com/security/cve/CVE-2012-3972" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The format-number functionality in the XSLT implementation in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to obtain sensitive information via unspecified vectors that trigger a heap-based buffer over-read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3972/">CVE-2012-3972</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565919" comment="MozillaFirefox-10.0.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565920" comment="MozillaFirefox-branding-SLED-7-0.6.7.80 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565921" comment="MozillaFirefox-translations-10.0.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565922" comment="libfreebl3-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565923" comment="libfreebl3-32bit-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565924" comment="mozilla-nspr-4.9.2-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565925" comment="mozilla-nspr-32bit-4.9.2-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565926" comment="mozilla-nss-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565927" comment="mozilla-nss-32bit-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565928" comment="mozilla-nss-tools-3.13.6-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3973</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3973" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3973" ref_url="https://www.suse.com/security/cve/CVE-2012-3973" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
    <description>
    The debugger in the developer-tools subsystem in Mozilla Firefox before 15.0, when remote debugging is disabled, does not properly restrict access to the remote-debugging service, which allows remote attackers to execute arbitrary code by leveraging the presence of the HTTPMonitor extension and connecting to that service through the HTTPMonitor port.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3973/">CVE-2012-3973</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565919" comment="MozillaFirefox-10.0.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565920" comment="MozillaFirefox-branding-SLED-7-0.6.7.80 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565921" comment="MozillaFirefox-translations-10.0.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565922" comment="libfreebl3-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565923" comment="libfreebl3-32bit-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565924" comment="mozilla-nspr-4.9.2-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565925" comment="mozilla-nspr-32bit-4.9.2-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565926" comment="mozilla-nss-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565927" comment="mozilla-nss-32bit-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565928" comment="mozilla-nss-tools-3.13.6-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3974</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3974" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3974" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3974" ref_url="https://www.suse.com/security/cve/CVE-2012-3974" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
    <description>
    Untrusted search path vulnerability in the installer in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, and Thunderbird ESR 10.x before 10.0.7 on Windows allows local users to gain privileges via a Trojan horse executable file in a root directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3974/">CVE-2012-3974</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565919" comment="MozillaFirefox-10.0.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565920" comment="MozillaFirefox-branding-SLED-7-0.6.7.80 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565921" comment="MozillaFirefox-translations-10.0.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565922" comment="libfreebl3-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565923" comment="libfreebl3-32bit-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565924" comment="mozilla-nspr-4.9.2-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565925" comment="mozilla-nspr-32bit-4.9.2-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565926" comment="mozilla-nss-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565927" comment="mozilla-nss-32bit-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565928" comment="mozilla-nss-tools-3.13.6-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3975</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3975" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3975" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3975" ref_url="https://www.suse.com/security/cve/CVE-2012-3975" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The DOMParser component in Mozilla Firefox before 15.0, Thunderbird before 15.0, and SeaMonkey before 2.12 loads subresources during parsing of text/html data within an extension, which allows remote attackers to obtain sensitive information by providing crafted data to privileged extension code.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-3975/">CVE-2012-3975</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565919" comment="MozillaFirefox-10.0.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565920" comment="MozillaFirefox-branding-SLED-7-0.6.7.80 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565921" comment="MozillaFirefox-translations-10.0.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565922" comment="libfreebl3-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565923" comment="libfreebl3-32bit-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565924" comment="mozilla-nspr-4.9.2-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565925" comment="mozilla-nspr-32bit-4.9.2-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565926" comment="mozilla-nss-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565927" comment="mozilla-nss-32bit-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565928" comment="mozilla-nss-tools-3.13.6-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3976</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3976" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3976" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3976" ref_url="https://www.suse.com/security/cve/CVE-2012-3976" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, and SeaMonkey before 2.12 do not properly handle onLocationChange events during navigation between different https sites, which allows remote attackers to spoof the X.509 certificate information in the address bar via a crafted web page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3976/">CVE-2012-3976</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565919" comment="MozillaFirefox-10.0.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565920" comment="MozillaFirefox-branding-SLED-7-0.6.7.80 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565921" comment="MozillaFirefox-translations-10.0.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565922" comment="libfreebl3-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565923" comment="libfreebl3-32bit-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565924" comment="mozilla-nspr-4.9.2-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565925" comment="mozilla-nspr-32bit-4.9.2-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565926" comment="mozilla-nss-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565927" comment="mozilla-nss-32bit-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565928" comment="mozilla-nss-tools-3.13.6-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3977</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3977" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3977" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3977" ref_url="https://www.suse.com/security/cve/CVE-2012-3977" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-4930.  Reason: This candidate is a duplicate of CVE-2012-4930.  Notes: All CVE users should reference CVE-2012-4930 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3977/">CVE-2012-3977</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565929" comment="MozillaFirefox-10.0.9-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565930" comment="MozillaFirefox-branding-SLED-7-0.6.7.85 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565931" comment="MozillaFirefox-translations-10.0.9-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3978</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3978" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3978" ref_url="https://www.suse.com/security/cve/CVE-2012-3978" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The nsLocation::CheckURL function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 does not properly follow the security model of the location object, which allows remote attackers to bypass intended content-loading restrictions or possibly have unspecified other impact via vectors involving chrome code.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3978/">CVE-2012-3978</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565919" comment="MozillaFirefox-10.0.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565920" comment="MozillaFirefox-branding-SLED-7-0.6.7.80 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565921" comment="MozillaFirefox-translations-10.0.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565922" comment="libfreebl3-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565923" comment="libfreebl3-32bit-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565924" comment="mozilla-nspr-4.9.2-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565925" comment="mozilla-nspr-32bit-4.9.2-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565926" comment="mozilla-nss-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565927" comment="mozilla-nss-32bit-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565928" comment="mozilla-nss-tools-3.13.6-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3979</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3979" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3979" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3979" ref_url="https://www.suse.com/security/cve/CVE-2012-3979" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 15.0 on Android does not properly implement unspecified callers of the __android_log_print function, which allows remote attackers to execute arbitrary code via a crafted web page that calls the JavaScript dump function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3979/">CVE-2012-3979</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565919" comment="MozillaFirefox-10.0.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565920" comment="MozillaFirefox-branding-SLED-7-0.6.7.80 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565921" comment="MozillaFirefox-translations-10.0.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565922" comment="libfreebl3-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565923" comment="libfreebl3-32bit-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565924" comment="mozilla-nspr-4.9.2-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565925" comment="mozilla-nspr-32bit-4.9.2-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565926" comment="mozilla-nss-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565927" comment="mozilla-nss-32bit-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565928" comment="mozilla-nss-tools-3.13.6-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3980</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3980" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3980" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3980" ref_url="https://www.suse.com/security/cve/CVE-2012-3980" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The web console in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, and Thunderbird ESR 10.x before 10.0.7 allows user-assisted remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted web site that injects this code and triggers an eval operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3980/">CVE-2012-3980</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565919" comment="MozillaFirefox-10.0.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565920" comment="MozillaFirefox-branding-SLED-7-0.6.7.80 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565921" comment="MozillaFirefox-translations-10.0.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565922" comment="libfreebl3-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565923" comment="libfreebl3-32bit-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565924" comment="mozilla-nspr-4.9.2-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565925" comment="mozilla-nspr-32bit-4.9.2-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565926" comment="mozilla-nss-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565927" comment="mozilla-nss-32bit-3.13.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565928" comment="mozilla-nss-tools-3.13.6-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3982</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3982" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3982" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3982" ref_url="https://www.suse.com/security/cve/CVE-2012-3982" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3982/">CVE-2012-3982</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565929" comment="MozillaFirefox-10.0.9-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565930" comment="MozillaFirefox-branding-SLED-7-0.6.7.85 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565931" comment="MozillaFirefox-translations-10.0.9-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3983</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3983" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3983" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3983" ref_url="https://www.suse.com/security/cve/CVE-2012-3983" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 16.0, Thunderbird before 16.0, and SeaMonkey before 2.13 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3983/">CVE-2012-3983</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565929" comment="MozillaFirefox-10.0.9-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565930" comment="MozillaFirefox-branding-SLED-7-0.6.7.85 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565931" comment="MozillaFirefox-translations-10.0.9-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3984</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3984" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3984" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3984" ref_url="https://www.suse.com/security/cve/CVE-2012-3984" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 16.0, Thunderbird before 16.0, and SeaMonkey before 2.13 do not properly handle navigation away from a web page that has a SELECT element's menu active, which allows remote attackers to spoof page content via vectors involving absolute positioning and scrolling.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3984/">CVE-2012-3984</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565929" comment="MozillaFirefox-10.0.9-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565930" comment="MozillaFirefox-branding-SLED-7-0.6.7.85 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565931" comment="MozillaFirefox-translations-10.0.9-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3985</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3985" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3985" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3985" ref_url="https://www.suse.com/security/cve/CVE-2012-3985" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 16.0, Thunderbird before 16.0, and SeaMonkey before 2.13 do not properly implement the HTML5 Same Origin Policy, which allows remote attackers to conduct cross-site scripting (XSS) attacks by leveraging initial-origin access after document.domain has been set.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3985/">CVE-2012-3985</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565929" comment="MozillaFirefox-10.0.9-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565930" comment="MozillaFirefox-branding-SLED-7-0.6.7.85 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565931" comment="MozillaFirefox-translations-10.0.9-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3986</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3986" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3986" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3986" ref_url="https://www.suse.com/security/cve/CVE-2012-3986" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 do not properly restrict calls to DOMWindowUtils (aka nsDOMWindowUtils) methods, which allows remote attackers to bypass intended access restrictions via crafted JavaScript code.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3986/">CVE-2012-3986</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565929" comment="MozillaFirefox-10.0.9-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565930" comment="MozillaFirefox-branding-SLED-7-0.6.7.85 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565931" comment="MozillaFirefox-translations-10.0.9-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3987</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3987" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3987" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3987" ref_url="https://www.suse.com/security/cve/CVE-2012-3987" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 16.0 on Android assigns chrome privileges to Reader Mode pages, which allows user-assisted remote attackers to bypass intended access restrictions via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3987/">CVE-2012-3987</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565929" comment="MozillaFirefox-10.0.9-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565930" comment="MozillaFirefox-branding-SLED-7-0.6.7.85 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565931" comment="MozillaFirefox-translations-10.0.9-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3988</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3988" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3988" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3988" ref_url="https://www.suse.com/security/cve/CVE-2012-3988" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 might allow user-assisted remote attackers to execute arbitrary code via vectors involving use of mozRequestFullScreen to enter full-screen mode, and use of the history.back method for backwards history navigation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3988/">CVE-2012-3988</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565929" comment="MozillaFirefox-10.0.9-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565930" comment="MozillaFirefox-branding-SLED-7-0.6.7.85 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565931" comment="MozillaFirefox-translations-10.0.9-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3989</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3989" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3989" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3989" ref_url="https://www.suse.com/security/cve/CVE-2012-3989" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 16.0, Thunderbird before 16.0, and SeaMonkey before 2.13 do not properly perform a cast of an unspecified variable during use of the instanceof operator on a JavaScript object, which allows remote attackers to execute arbitrary code or cause a denial of service (assertion failure) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3989/">CVE-2012-3989</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565929" comment="MozillaFirefox-10.0.9-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565930" comment="MozillaFirefox-branding-SLED-7-0.6.7.85 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565931" comment="MozillaFirefox-translations-10.0.9-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3990</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3990" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3990" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3990" ref_url="https://www.suse.com/security/cve/CVE-2012-3990" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the IME State Manager implementation in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code via unspecified vectors, related to the nsIContent::GetNameSpaceID function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3990/">CVE-2012-3990</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565929" comment="MozillaFirefox-10.0.9-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565930" comment="MozillaFirefox-branding-SLED-7-0.6.7.85 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565931" comment="MozillaFirefox-translations-10.0.9-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3991</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3991" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3991" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3991" ref_url="https://www.suse.com/security/cve/CVE-2012-3991" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 do not properly restrict JSAPI access to the GetProperty function, which allows remote attackers to bypass the Same Origin Policy and possibly have unspecified other impact via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3991/">CVE-2012-3991</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565929" comment="MozillaFirefox-10.0.9-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565930" comment="MozillaFirefox-branding-SLED-7-0.6.7.85 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565931" comment="MozillaFirefox-translations-10.0.9-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3992</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3992" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3992" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3992" ref_url="https://www.suse.com/security/cve/CVE-2012-3992" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 do not properly manage history data, which allows remote attackers to conduct cross-site scripting (XSS) attacks or obtain sensitive POST content via vectors involving a location.hash write operation and history navigation that triggers the loading of a URL into the history object.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3992/">CVE-2012-3992</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565929" comment="MozillaFirefox-10.0.9-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565930" comment="MozillaFirefox-branding-SLED-7-0.6.7.85 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565931" comment="MozillaFirefox-translations-10.0.9-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3993</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3993" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3993" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3993" ref_url="https://www.suse.com/security/cve/CVE-2012-3993" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The Chrome Object Wrapper (COW) implementation in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 does not properly interact with failures of InstallTrigger methods, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted web site, related to an "XrayWrapper pollution" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3993/">CVE-2012-3993</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565929" comment="MozillaFirefox-10.0.9-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565930" comment="MozillaFirefox-branding-SLED-7-0.6.7.85 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565931" comment="MozillaFirefox-translations-10.0.9-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3994</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3994" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3994" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3994" ref_url="https://www.suse.com/security/cve/CVE-2012-3994" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allow remote attackers to conduct cross-site scripting (XSS) attacks via a binary plugin that uses Object.defineProperty to shadow the top object, and leverages the relationship between top.location and the location property.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3994/">CVE-2012-3994</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565929" comment="MozillaFirefox-10.0.9-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565930" comment="MozillaFirefox-branding-SLED-7-0.6.7.85 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565931" comment="MozillaFirefox-translations-10.0.9-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3995</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3995" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3995" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3995" ref_url="https://www.suse.com/security/cve/CVE-2012-3995" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The IsCSSWordSpacingSpace function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3995/">CVE-2012-3995</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565929" comment="MozillaFirefox-10.0.9-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565930" comment="MozillaFirefox-branding-SLED-7-0.6.7.85 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565931" comment="MozillaFirefox-translations-10.0.9-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124048" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4048</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4048" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4048" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4048" ref_url="https://www.suse.com/security/cve/CVE-2012-4048" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-September/000256.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0930-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00000.html" source="SUSE-SU"/>
    <description>
    The PPP dissector in Wireshark 1.4.x before 1.4.14, 1.6.x before 1.6.9, and 1.8.x before 1.8.1 allows remote attackers to cause a denial of service (invalid pointer dereference and application crash) via a crafted packet, as demonstrated by a usbmon dump.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4048/">CVE-2012-4048</cve>
	<bugzilla href="https://bugzilla.suse.com/772738">SUSE bug 772738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590025" comment="wireshark-1.4.15-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4049</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4049" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4049" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4049" ref_url="https://www.suse.com/security/cve/CVE-2012-4049" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-September/000256.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0930-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00000.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-nfs.c in the NFS dissector in Wireshark 1.4.x before 1.4.14, 1.6.x before 1.6.9, and 1.8.x before 1.8.1 allows remote attackers to cause a denial of service (loop and CPU consumption) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4049/">CVE-2012-4049</cve>
	<bugzilla href="https://bugzilla.suse.com/772738">SUSE bug 772738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590025" comment="wireshark-1.4.15-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4179</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4179" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4179" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4179" ref_url="https://www.suse.com/security/cve/CVE-2012-4179" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsHTMLCSSUtils::CreateCSSPropertyTxn function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4179/">CVE-2012-4179</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565929" comment="MozillaFirefox-10.0.9-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565930" comment="MozillaFirefox-branding-SLED-7-0.6.7.85 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565931" comment="MozillaFirefox-translations-10.0.9-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4180</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4180" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4180" ref_url="https://www.suse.com/security/cve/CVE-2012-4180" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the nsHTMLEditor::IsPrevCharInNodeWhitespace function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4180/">CVE-2012-4180</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565929" comment="MozillaFirefox-10.0.9-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565930" comment="MozillaFirefox-branding-SLED-7-0.6.7.85 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565931" comment="MozillaFirefox-translations-10.0.9-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4181</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4181" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4181" ref_url="https://www.suse.com/security/cve/CVE-2012-4181" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsSMILAnimationController::DoSample function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4181/">CVE-2012-4181</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565929" comment="MozillaFirefox-10.0.9-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565930" comment="MozillaFirefox-branding-SLED-7-0.6.7.85 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565931" comment="MozillaFirefox-translations-10.0.9-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4182</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4182" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4182" ref_url="https://www.suse.com/security/cve/CVE-2012-4182" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsTextEditRules::WillInsert function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4182/">CVE-2012-4182</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565929" comment="MozillaFirefox-10.0.9-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565930" comment="MozillaFirefox-branding-SLED-7-0.6.7.85 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565931" comment="MozillaFirefox-translations-10.0.9-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4183</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4183" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4183" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4183" ref_url="https://www.suse.com/security/cve/CVE-2012-4183" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the DOMSVGTests::GetRequiredFeatures function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4183/">CVE-2012-4183</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565929" comment="MozillaFirefox-10.0.9-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565930" comment="MozillaFirefox-branding-SLED-7-0.6.7.85 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565931" comment="MozillaFirefox-translations-10.0.9-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4184</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4184" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4184" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4184" ref_url="https://www.suse.com/security/cve/CVE-2012-4184" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The Chrome Object Wrapper (COW) implementation in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 does not prevent access to properties of a prototype for a standard class, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4184/">CVE-2012-4184</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565929" comment="MozillaFirefox-10.0.9-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565930" comment="MozillaFirefox-branding-SLED-7-0.6.7.85 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565931" comment="MozillaFirefox-translations-10.0.9-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4185</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4185" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4185" ref_url="https://www.suse.com/security/cve/CVE-2012-4185" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the nsCharTraits::length function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4185/">CVE-2012-4185</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565929" comment="MozillaFirefox-10.0.9-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565930" comment="MozillaFirefox-branding-SLED-7-0.6.7.85 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565931" comment="MozillaFirefox-translations-10.0.9-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4186</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4186" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4186" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4186" ref_url="https://www.suse.com/security/cve/CVE-2012-4186" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the nsWaveReader::DecodeAudioData function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4186/">CVE-2012-4186</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565929" comment="MozillaFirefox-10.0.9-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565930" comment="MozillaFirefox-branding-SLED-7-0.6.7.85 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565931" comment="MozillaFirefox-translations-10.0.9-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4187</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4187" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4187" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4187" ref_url="https://www.suse.com/security/cve/CVE-2012-4187" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 do not properly manage a certain insPos variable, which allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption and assertion failure) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4187/">CVE-2012-4187</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565929" comment="MozillaFirefox-10.0.9-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565930" comment="MozillaFirefox-branding-SLED-7-0.6.7.85 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565931" comment="MozillaFirefox-translations-10.0.9-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4188</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4188" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4188" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4188" ref_url="https://www.suse.com/security/cve/CVE-2012-4188" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the Convolve3x3 function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4188/">CVE-2012-4188</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565929" comment="MozillaFirefox-10.0.9-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565930" comment="MozillaFirefox-branding-SLED-7-0.6.7.85 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565931" comment="MozillaFirefox-translations-10.0.9-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4192</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4192" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4192" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4192" ref_url="https://www.suse.com/security/cve/CVE-2012-4192" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox 16.0, Thunderbird 16.0, and SeaMonkey 2.13 allow remote attackers to bypass the Same Origin Policy and read the properties of a Location object via a crafted web site, a related issue to CVE-2012-4193.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4192/">CVE-2012-4192</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565929" comment="MozillaFirefox-10.0.9-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565930" comment="MozillaFirefox-branding-SLED-7-0.6.7.85 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565931" comment="MozillaFirefox-translations-10.0.9-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4193</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4193" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4193" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4193" ref_url="https://www.suse.com/security/cve/CVE-2012-4193" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 16.0.1, Firefox ESR 10.x before 10.0.9, Thunderbird before 16.0.1, Thunderbird ESR 10.x before 10.0.9, and SeaMonkey before 2.13.1 omit a security check in the defaultValue function during the unwrapping of security wrappers, which allows remote attackers to bypass the Same Origin Policy and read the properties of a Location object, or execute arbitrary JavaScript code, via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4193/">CVE-2012-4193</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565929" comment="MozillaFirefox-10.0.9-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565930" comment="MozillaFirefox-branding-SLED-7-0.6.7.85 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565931" comment="MozillaFirefox-translations-10.0.9-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4194</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4194" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4194" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4194" ref_url="https://www.suse.com/security/cve/CVE-2012-4194" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 16.0.2, Firefox ESR 10.x before 10.0.10, Thunderbird before 16.0.2, Thunderbird ESR 10.x before 10.0.10, and SeaMonkey before 2.13.2 do not prevent use of the valueOf method to shadow the location object (aka window.location), which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via vectors involving a plugin.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4194/">CVE-2012-4194</cve>
	<bugzilla href="https://bugzilla.suse.com/786522">SUSE bug 786522</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565932" comment="MozillaFirefox-10.0.10-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565933" comment="MozillaFirefox-translations-10.0.10-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565934" comment="mozilla-nspr-4.9.3-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565935" comment="mozilla-nspr-32bit-4.9.3-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4195</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4195" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4195" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4195" ref_url="https://www.suse.com/security/cve/CVE-2012-4195" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The nsLocation::CheckURL function in Mozilla Firefox before 16.0.2, Firefox ESR 10.x before 10.0.10, Thunderbird before 16.0.2, Thunderbird ESR 10.x before 10.0.10, and SeaMonkey before 2.13.2 does not properly determine the calling document and principal in its return value, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted web site, and makes it easier for remote attackers to execute arbitrary JavaScript code by leveraging certain add-on behavior.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4195/">CVE-2012-4195</cve>
	<bugzilla href="https://bugzilla.suse.com/786522">SUSE bug 786522</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565932" comment="MozillaFirefox-10.0.10-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565933" comment="MozillaFirefox-translations-10.0.10-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565934" comment="mozilla-nspr-4.9.3-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565935" comment="mozilla-nspr-32bit-4.9.3-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4196</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4196" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4196" ref_url="https://www.suse.com/security/cve/CVE-2012-4196" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 16.0.2, Firefox ESR 10.x before 10.0.10, Thunderbird before 16.0.2, Thunderbird ESR 10.x before 10.0.10, and SeaMonkey before 2.13.2 allow remote attackers to bypass the Same Origin Policy and read the Location object via a prototype property-injection attack that defeats certain protection mechanisms for this object.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4196/">CVE-2012-4196</cve>
	<bugzilla href="https://bugzilla.suse.com/786522">SUSE bug 786522</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565932" comment="MozillaFirefox-10.0.10-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565933" comment="MozillaFirefox-translations-10.0.10-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565934" comment="mozilla-nspr-4.9.3-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565935" comment="mozilla-nspr-32bit-4.9.3-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4201</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4201" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4201" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4201" ref_url="https://www.suse.com/security/cve/CVE-2012-4201" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The evalInSandbox implementation in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 uses an incorrect context during the handling of JavaScript code that sets the location.href property, which allows remote attackers to conduct cross-site scripting (XSS) attacks or read arbitrary files by leveraging a sandboxed add-on.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4201/">CVE-2012-4201</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565936" comment="MozillaFirefox-10.0.11-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565937" comment="MozillaFirefox-translations-10.0.11-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565938" comment="libfreebl3-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565939" comment="libfreebl3-32bit-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565940" comment="mozilla-nss-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565941" comment="mozilla-nss-32bit-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565942" comment="mozilla-nss-tools-3.14-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4202</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4202" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4202" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4202" ref_url="https://www.suse.com/security/cve/CVE-2012-4202" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the image::RasterImage::DrawFrameTo function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code via a crafted GIF image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4202/">CVE-2012-4202</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565936" comment="MozillaFirefox-10.0.11-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565937" comment="MozillaFirefox-translations-10.0.11-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565938" comment="libfreebl3-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565939" comment="libfreebl3-32bit-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565940" comment="mozilla-nss-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565941" comment="mozilla-nss-32bit-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565942" comment="mozilla-nss-tools-3.14-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4203</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4203" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4203" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4203" ref_url="https://www.suse.com/security/cve/CVE-2012-4203" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
    <description>
    The New Tab page in Mozilla Firefox before 17.0 uses a privileged context for execution of JavaScript code by bookmarklets, which allows user-assisted remote attackers to run arbitrary programs by leveraging a javascript: URL in a bookmark.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4203/">CVE-2012-4203</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565936" comment="MozillaFirefox-10.0.11-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565937" comment="MozillaFirefox-translations-10.0.11-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565938" comment="libfreebl3-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565939" comment="libfreebl3-32bit-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565940" comment="mozilla-nss-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565941" comment="mozilla-nss-32bit-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565942" comment="mozilla-nss-tools-3.14-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4204</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4204" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4204" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4204" ref_url="https://www.suse.com/security/cve/CVE-2012-4204" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The str_unescape function in the JavaScript engine in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4204/">CVE-2012-4204</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565936" comment="MozillaFirefox-10.0.11-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565937" comment="MozillaFirefox-translations-10.0.11-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565938" comment="libfreebl3-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565939" comment="libfreebl3-32bit-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565940" comment="mozilla-nss-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565941" comment="mozilla-nss-32bit-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565942" comment="mozilla-nss-tools-3.14-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4205</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4205" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4205" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4205" ref_url="https://www.suse.com/security/cve/CVE-2012-4205" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 assign the system principal, rather than the sandbox principal, to XMLHttpRequest objects created in sandboxes, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks or obtain sensitive information by leveraging a sandboxed add-on.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4205/">CVE-2012-4205</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565936" comment="MozillaFirefox-10.0.11-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565937" comment="MozillaFirefox-translations-10.0.11-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565938" comment="libfreebl3-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565939" comment="libfreebl3-32bit-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565940" comment="mozilla-nss-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565941" comment="mozilla-nss-32bit-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565942" comment="mozilla-nss-tools-3.14-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4206</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4206" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4206" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4206" ref_url="https://www.suse.com/security/cve/CVE-2012-4206" source="SUSE CVE"/>
    <description>
    Untrusted search path vulnerability in the installer in Mozilla Firefox before 17.0 and Firefox ESR 10.x before 10.0.11 on Windows allows local users to gain privileges via a Trojan horse DLL in the default downloads directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4206/">CVE-2012-4206</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565936" comment="MozillaFirefox-10.0.11-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565937" comment="MozillaFirefox-translations-10.0.11-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565938" comment="libfreebl3-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565939" comment="libfreebl3-32bit-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565940" comment="mozilla-nss-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565941" comment="mozilla-nss-32bit-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565942" comment="mozilla-nss-tools-3.14-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4207</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4207" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4207" ref_url="https://www.suse.com/security/cve/CVE-2012-4207" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The HZ-GB-2312 character-set implementation in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 does not properly handle a ~ (tilde) character in proximity to a chunk delimiter, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4207/">CVE-2012-4207</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565936" comment="MozillaFirefox-10.0.11-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565937" comment="MozillaFirefox-translations-10.0.11-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565938" comment="libfreebl3-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565939" comment="libfreebl3-32bit-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565940" comment="mozilla-nss-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565941" comment="mozilla-nss-32bit-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565942" comment="mozilla-nss-tools-3.14-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4208</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4208" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4208" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4208" ref_url="https://www.suse.com/security/cve/CVE-2012-4208" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The XrayWrapper implementation in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 does not consider the compartment during property filtering, which allows remote attackers to bypass intended chrome-only restrictions on reading DOM object properties via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4208/">CVE-2012-4208</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565936" comment="MozillaFirefox-10.0.11-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565937" comment="MozillaFirefox-translations-10.0.11-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565938" comment="libfreebl3-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565939" comment="libfreebl3-32bit-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565940" comment="mozilla-nss-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565941" comment="mozilla-nss-32bit-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565942" comment="mozilla-nss-tools-3.14-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4209</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4209" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4209" ref_url="https://www.suse.com/security/cve/CVE-2012-4209" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 do not prevent use of a "top" frame name-attribute value to access the location property, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via vectors involving a binary plugin.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4209/">CVE-2012-4209</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565936" comment="MozillaFirefox-10.0.11-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565937" comment="MozillaFirefox-translations-10.0.11-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565938" comment="libfreebl3-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565939" comment="libfreebl3-32bit-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565940" comment="mozilla-nss-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565941" comment="mozilla-nss-32bit-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565942" comment="mozilla-nss-tools-3.14-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4210</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4210" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4210" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4210" ref_url="https://www.suse.com/security/cve/CVE-2012-4210" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
    <description>
    The Style Inspector in Mozilla Firefox before 17.0 and Firefox ESR 10.x before 10.0.11 does not properly restrict the context of HTML markup and Cascading Style Sheets (CSS) token sequences, which allows user-assisted remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted stylesheet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4210/">CVE-2012-4210</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565936" comment="MozillaFirefox-10.0.11-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565937" comment="MozillaFirefox-translations-10.0.11-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565938" comment="libfreebl3-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565939" comment="libfreebl3-32bit-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565940" comment="mozilla-nss-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565941" comment="mozilla-nss-32bit-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565942" comment="mozilla-nss-tools-3.14-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4212</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4212" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4212" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4212" ref_url="https://www.suse.com/security/cve/CVE-2012-4212" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the XPCWrappedNative::Mark function in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4212/">CVE-2012-4212</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565936" comment="MozillaFirefox-10.0.11-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565937" comment="MozillaFirefox-translations-10.0.11-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565938" comment="libfreebl3-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565939" comment="libfreebl3-32bit-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565940" comment="mozilla-nss-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565941" comment="mozilla-nss-32bit-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565942" comment="mozilla-nss-tools-3.14-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4213</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4213" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4213" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4213" ref_url="https://www.suse.com/security/cve/CVE-2012-4213" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsEditor::FindNextLeafNode function in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4213/">CVE-2012-4213</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565936" comment="MozillaFirefox-10.0.11-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565937" comment="MozillaFirefox-translations-10.0.11-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565938" comment="libfreebl3-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565939" comment="libfreebl3-32bit-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565940" comment="mozilla-nss-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565941" comment="mozilla-nss-32bit-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565942" comment="mozilla-nss-tools-3.14-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4214</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4214" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4214" ref_url="https://www.suse.com/security/cve/CVE-2012-4214" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsTextEditorState::PrepareEditor function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-5840.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4214/">CVE-2012-4214</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565936" comment="MozillaFirefox-10.0.11-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565937" comment="MozillaFirefox-translations-10.0.11-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565938" comment="libfreebl3-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565939" comment="libfreebl3-32bit-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565940" comment="mozilla-nss-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565941" comment="mozilla-nss-32bit-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565942" comment="mozilla-nss-tools-3.14-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4215</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4215" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4215" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4215" ref_url="https://www.suse.com/security/cve/CVE-2012-4215" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsPlaintextEditor::FireClipboardEvent function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4215/">CVE-2012-4215</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565936" comment="MozillaFirefox-10.0.11-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565937" comment="MozillaFirefox-translations-10.0.11-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565938" comment="libfreebl3-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565939" comment="libfreebl3-32bit-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565940" comment="mozilla-nss-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565941" comment="mozilla-nss-32bit-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565942" comment="mozilla-nss-tools-3.14-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4216</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4216" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4216" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4216" ref_url="https://www.suse.com/security/cve/CVE-2012-4216" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the gfxFont::GetFontEntry function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4216/">CVE-2012-4216</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565936" comment="MozillaFirefox-10.0.11-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565937" comment="MozillaFirefox-translations-10.0.11-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565938" comment="libfreebl3-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565939" comment="libfreebl3-32bit-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565940" comment="mozilla-nss-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565941" comment="mozilla-nss-32bit-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565942" comment="mozilla-nss-tools-3.14-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4217</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4217" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4217" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4217" ref_url="https://www.suse.com/security/cve/CVE-2012-4217" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsViewManager::ProcessPendingUpdates function in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4217/">CVE-2012-4217</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565936" comment="MozillaFirefox-10.0.11-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565937" comment="MozillaFirefox-translations-10.0.11-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565938" comment="libfreebl3-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565939" comment="libfreebl3-32bit-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565940" comment="mozilla-nss-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565941" comment="mozilla-nss-32bit-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565942" comment="mozilla-nss-tools-3.14-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4218</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4218" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4218" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4218" ref_url="https://www.suse.com/security/cve/CVE-2012-4218" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the BuildTextRunsScanner::BreakSink::SetBreaks function in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4218/">CVE-2012-4218</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565936" comment="MozillaFirefox-10.0.11-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565937" comment="MozillaFirefox-translations-10.0.11-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565938" comment="libfreebl3-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565939" comment="libfreebl3-32bit-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565940" comment="mozilla-nss-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565941" comment="mozilla-nss-32bit-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565942" comment="mozilla-nss-tools-3.14-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4233</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4233" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4233" ref_url="https://www.suse.com/security/cve/CVE-2012-4233" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-October/000288.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1523-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1686-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-12/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00064.html" source="SUSE-SU"/>
    <description>
    LibreOffice 3.5.x before 3.5.7.2 and 3.6.x before 3.6.1, and OpenOffice.org (OOo), allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted (1) odt file to vcllo.dll, (2) ODG (Drawing document) file to svxcorelo.dll, (3) PolyPolygon record in a .wmf (Window Meta File) file embedded in a ppt (PowerPoint) file to tllo.dll, or (4) xls (Excel) file to scfiltlo.dll.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4233/">CVE-2012-4233</cve>
	<bugzilla href="https://bugzilla.suse.com/778669">SUSE bug 778669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009563017" comment="libreoffice-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563018" comment="libreoffice-base-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563019" comment="libreoffice-base-drivers-postgresql-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563020" comment="libreoffice-base-extensions-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563022" comment="libreoffice-calc-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563023" comment="libreoffice-calc-extensions-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563024" comment="libreoffice-draw-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563025" comment="libreoffice-draw-extensions-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563026" comment="libreoffice-filters-optional-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563027" comment="libreoffice-gnome-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563028" comment="libreoffice-help-cs-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563029" comment="libreoffice-help-da-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563030" comment="libreoffice-help-de-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563031" comment="libreoffice-help-en-GB-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563032" comment="libreoffice-help-en-US-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563033" comment="libreoffice-help-es-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563034" comment="libreoffice-help-fr-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563035" comment="libreoffice-help-gu-IN-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563036" comment="libreoffice-help-hi-IN-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563037" comment="libreoffice-help-hu-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563038" comment="libreoffice-help-it-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563039" comment="libreoffice-help-ja-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563040" comment="libreoffice-help-ko-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563041" comment="libreoffice-help-nl-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563042" comment="libreoffice-help-pl-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563043" comment="libreoffice-help-pt-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563044" comment="libreoffice-help-pt-BR-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563045" comment="libreoffice-help-ru-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563046" comment="libreoffice-help-sv-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563047" comment="libreoffice-help-zh-CN-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563048" comment="libreoffice-help-zh-TW-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563049" comment="libreoffice-icon-themes-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563050" comment="libreoffice-impress-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563051" comment="libreoffice-impress-extensions-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563052" comment="libreoffice-kde-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563053" comment="libreoffice-kde4-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563054" comment="libreoffice-l10n-af-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563055" comment="libreoffice-l10n-ar-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563056" comment="libreoffice-l10n-ca-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563057" comment="libreoffice-l10n-cs-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563058" comment="libreoffice-l10n-da-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563059" comment="libreoffice-l10n-de-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563061" comment="libreoffice-l10n-en-GB-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563062" comment="libreoffice-l10n-es-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563063" comment="libreoffice-l10n-fi-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563064" comment="libreoffice-l10n-fr-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563065" comment="libreoffice-l10n-gu-IN-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563066" comment="libreoffice-l10n-hi-IN-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563067" comment="libreoffice-l10n-hu-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563068" comment="libreoffice-l10n-it-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563069" comment="libreoffice-l10n-ja-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563070" comment="libreoffice-l10n-ko-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563071" comment="libreoffice-l10n-nb-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563072" comment="libreoffice-l10n-nl-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563073" comment="libreoffice-l10n-nn-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563074" comment="libreoffice-l10n-pl-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563076" comment="libreoffice-l10n-pt-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563077" comment="libreoffice-l10n-pt-BR-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563078" comment="libreoffice-l10n-ru-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563079" comment="libreoffice-l10n-sk-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563080" comment="libreoffice-l10n-sv-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563081" comment="libreoffice-l10n-xh-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563082" comment="libreoffice-l10n-zh-CN-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563083" comment="libreoffice-l10n-zh-TW-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563084" comment="libreoffice-l10n-zu-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563085" comment="libreoffice-mailmerge-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563086" comment="libreoffice-math-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563087" comment="libreoffice-mono-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563088" comment="libreoffice-officebean-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563089" comment="libreoffice-pyuno-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563091" comment="libreoffice-writer-3.5.4.13-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563092" comment="libreoffice-writer-extensions-3.5.4.13-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4244</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4244" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4244" ref_url="https://www.suse.com/security/cve/CVE-2012-4244" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1199-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0605-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00035.html" source="SUSE-SU"/>
    <description>
    ISC BIND 9.x before 9.7.6-P3, 9.8.x before 9.8.3-P3, 9.9.x before 9.9.1-P3, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P3 allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query for a long resource record.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-4244/">CVE-2012-4244</cve>
	<bugzilla href="https://bugzilla.suse.com/780157">SUSE bug 780157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/792926">SUSE bug 792926</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590028" comment="bind-libs-9.6ESVR7P3-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590029" comment="bind-libs-32bit-9.6ESVR7P3-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590030" comment="bind-utils-9.6ESVR7P3-0.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4285</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4285" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4285" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4285" ref_url="https://www.suse.com/security/cve/CVE-2012-4285" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-September/000256.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1035-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1067-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00047.html" source="SUSE-SU"/>
    <description>
    The dissect_pft function in epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a zero-length message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4285/">CVE-2012-4285</cve>
	<bugzilla href="https://bugzilla.suse.com/776083">SUSE bug 776083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590025" comment="wireshark-1.4.15-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4288</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4288" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4288" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4288" ref_url="https://www.suse.com/security/cve/CVE-2012-4288" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-September/000256.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1035-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1067-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00047.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the dissect_xtp_ecntl function in epan/dissectors/packet-xtp.c in the XTP dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (loop or application crash) via a large value for a span length.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4288/">CVE-2012-4288</cve>
	<bugzilla href="https://bugzilla.suse.com/776083">SUSE bug 776083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590025" comment="wireshark-1.4.15-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4289</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4289" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4289" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4289" ref_url="https://www.suse.com/security/cve/CVE-2012-4289" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-September/000256.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1035-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1067-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00047.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-afp.c in the AFP dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (loop and CPU consumption) via a large number of ACL entries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4289/">CVE-2012-4289</cve>
	<bugzilla href="https://bugzilla.suse.com/776083">SUSE bug 776083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590025" comment="wireshark-1.4.15-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124290" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4290</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4290" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4290" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4290" ref_url="https://www.suse.com/security/cve/CVE-2012-4290" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-September/000256.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1035-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1067-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00047.html" source="SUSE-SU"/>
    <description>
    The CTDB dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (loop and CPU consumption) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4290/">CVE-2012-4290</cve>
	<bugzilla href="https://bugzilla.suse.com/776083">SUSE bug 776083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590025" comment="wireshark-1.4.15-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4291</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4291" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4291" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4291" ref_url="https://www.suse.com/security/cve/CVE-2012-4291" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-September/000256.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1035-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1067-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00047.html" source="SUSE-SU"/>
    <description>
    The CIP dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (memory consumption) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4291/">CVE-2012-4291</cve>
	<bugzilla href="https://bugzilla.suse.com/776083">SUSE bug 776083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590025" comment="wireshark-1.4.15-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4292</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4292" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4292" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4292" ref_url="https://www.suse.com/security/cve/CVE-2012-4292" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-September/000256.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1035-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1067-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00047.html" source="SUSE-SU"/>
    <description>
    The dissect_stun_message function in epan/dissectors/packet-stun.c in the STUN dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 does not properly interact with key-destruction behavior in a certain tree library, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4292/">CVE-2012-4292</cve>
	<bugzilla href="https://bugzilla.suse.com/776083">SUSE bug 776083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590025" comment="wireshark-1.4.15-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124293" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4293</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4293" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4293" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4293" ref_url="https://www.suse.com/security/cve/CVE-2012-4293" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-September/000256.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1035-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1067-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00047.html" source="SUSE-SU"/>
    <description>
    plugins/ethercat/packet-ecatmb.c in the EtherCAT Mailbox dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 does not properly handle certain integer fields, which allows remote attackers to cause a denial of service (application exit) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4293/">CVE-2012-4293</cve>
	<bugzilla href="https://bugzilla.suse.com/776083">SUSE bug 776083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590025" comment="wireshark-1.4.15-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4296</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4296" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4296" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4296" ref_url="https://www.suse.com/security/cve/CVE-2012-4296" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-September/000256.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1035-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1067-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00047.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in epan/dissectors/packet-rtps2.c in the RTPS2 dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (CPU consumption) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4296/">CVE-2012-4296</cve>
	<bugzilla href="https://bugzilla.suse.com/776083">SUSE bug 776083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590025" comment="wireshark-1.4.15-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124398" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4398</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4398" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4398" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4398" ref_url="https://www.suse.com/security/cve/CVE-2012-4398" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    The __request_module function in kernel/kmod.c in the Linux kernel before 3.4 does not set a certain killable attribute, which allows local users to cause a denial of service (memory consumption) via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4398/">CVE-2012-4398</cve>
	<bugzilla href="https://bugzilla.suse.com/778463">SUSE bug 778463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/779488">SUSE bug 779488</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590044" comment="kernel-bigsmp-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590045" comment="kernel-default-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590046" comment="kernel-default-base-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590047" comment="kernel-default-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590048" comment="kernel-default-extra-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590049" comment="kernel-pae-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590050" comment="kernel-pae-base-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590051" comment="kernel-pae-devel-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590052" comment="kernel-pae-extra-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590053" comment="kernel-source-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590054" comment="kernel-syms-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590055" comment="kernel-trace-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590056" comment="kernel-xen-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590057" comment="kernel-xen-base-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590058" comment="kernel-xen-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590059" comment="kernel-xen-extra-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590060" comment="xen-kmp-default-4.2.5_02_3.0.101_0.46-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590061" comment="xen-kmp-pae-4.2.5_02_3.0.101_0.42-0.7.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4405</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4405" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4405" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4405" ref_url="https://www.suse.com/security/cve/CVE-2012-4405" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1290-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-10/msg00015.html" source="SUSE-SU"/>
    <description>
    Multiple integer underflows in the icmLut_allocate function in International Color Consortium (ICC) Format library (icclib), as used in Ghostscript 9.06 and Argyll Color Management System, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted (1) PostScript or (2) PDF file with embedded images, which triggers a heap-based buffer overflow.  NOTE: this issue is also described as an array index error.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4405/">CVE-2012-4405</cve>
	<bugzilla href="https://bugzilla.suse.com/726092">SUSE bug 726092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/774185">SUSE bug 774185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/779700">SUSE bug 779700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939342">SUSE bug 939342</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565993" comment="ghostscript-fonts-other-8.62-32.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565994" comment="ghostscript-fonts-rus-8.62-32.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565995" comment="ghostscript-fonts-std-8.62-32.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565996" comment="ghostscript-library-8.62-32.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565997" comment="ghostscript-omni-8.62-32.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565998" comment="ghostscript-x11-8.62-32.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565999" comment="libgimpprint-4.2.7-32.34.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4411</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4411" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4411" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4411" ref_url="https://www.suse.com/security/cve/CVE-2012-4411" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1487-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1572-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1573-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html" source="SUSE-SU"/>
    <description>
    The graphical console in Xen 4.0, 4.1 and 4.2 allows local OS guest administrators to obtain sensitive host resource information via the qemu monitor.  NOTE: this might be a duplicate of CVE-2007-0998.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-4411/">CVE-2012-4411</cve>
	<bugzilla href="https://bugzilla.suse.com/779212">SUSE bug 779212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786516">SUSE bug 786516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786518">SUSE bug 786518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786519">SUSE bug 786519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786520">SUSE bug 786520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/787163">SUSE bug 787163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566138" comment="libvirt-0.9.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566139" comment="libvirt-client-0.9.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566140" comment="libvirt-client-32bit-0.9.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566141" comment="libvirt-doc-0.9.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566142" comment="libvirt-python-0.9.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589917" comment="vm-install-0.5.14-0.5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566229" comment="xen-4.1.3_04-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566230" comment="xen-doc-html-4.1.3_04-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566231" comment="xen-doc-pdf-4.1.3_04-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566232" comment="xen-kmp-default-4.1.3_04_3.0.42_0.7-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566233" comment="xen-kmp-pae-4.1.3_04_3.0.42_0.7-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566234" comment="xen-kmp-trace-4.1.3_04_3.0.42_0.7-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566235" comment="xen-libs-4.1.3_04-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566236" comment="xen-libs-32bit-4.1.3_04-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566237" comment="xen-tools-4.1.3_04-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566238" comment="xen-tools-domU-4.1.3_04-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4412</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4412" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4412" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4412" ref_url="https://www.suse.com/security/cve/CVE-2012-4412" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1122-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1128-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1510-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00072.html" source="SUSE-SU"/>
    <description>
    Integer overflow in string/strcoll_l.c in the GNU C Library (aka glibc or libc6) 2.17 and earlier allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4412/">CVE-2012-4412</cve>
	<bugzilla href="https://bugzilla.suse.com/779320">SUSE bug 779320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/848783">SUSE bug 848783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882910">SUSE bug 882910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920169">SUSE bug 920169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920338">SUSE bug 920338</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566000" comment="glibc-2.11.3-17.45.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566001" comment="glibc-32bit-2.11.3-17.45.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566002" comment="glibc-devel-2.11.3-17.45.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566003" comment="glibc-devel-32bit-2.11.3-17.45.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566004" comment="glibc-i18ndata-2.11.3-17.45.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566005" comment="glibc-locale-2.11.3-17.45.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566006" comment="glibc-locale-32bit-2.11.3-17.45.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566007" comment="nscd-2.11.3-17.45.49.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590138" comment="glibc-2.11.3-17.56.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590139" comment="glibc-32bit-2.11.3-17.56.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590140" comment="glibc-devel-2.11.3-17.56.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590141" comment="glibc-devel-32bit-2.11.3-17.56.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590142" comment="glibc-i18ndata-2.11.3-17.56.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590143" comment="glibc-locale-2.11.3-17.56.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590144" comment="glibc-locale-32bit-2.11.3-17.56.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590145" comment="nscd-2.11.3-17.56.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4416</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4416" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4416" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4416" ref_url="https://www.suse.com/security/cve/CVE-2012-4416" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1423-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00024.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality and integrity via unknown vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4416/">CVE-2012-4416</cve>
	<bugzilla href="https://bugzilla.suse.com/779714">SUSE bug 779714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589382" comment="java-1_6_0-openjdk-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589383" comment="java-1_6_0-openjdk-demo-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589384" comment="java-1_6_0-openjdk-devel-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4428</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4428" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4428" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4428" ref_url="https://www.suse.com/security/cve/CVE-2012-4428" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001397.html" source="SUSE-SU"/>
    <description>
    openslp: SLPIntersectStringList()' Function has a DoS vulnerability
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-23"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2012-4428/">CVE-2012-4428</cve>
	<bugzilla href="https://bugzilla.suse.com/778508">SUSE bug 778508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979093">SUSE bug 979093</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567013" comment="openslp-1.2.0-172.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567014" comment="openslp-32bit-1.2.0-172.24.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4447</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4447" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4447" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4447" ref_url="https://www.suse.com/security/cve/CVE-2012-4447" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-January/000333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000623.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0187-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00076.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in tif_pixarlog.c in LibTIFF before 4.0.3 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted TIFF image using the PixarLog Compression format.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4447/">CVE-2012-4447</cve>
	<bugzilla href="https://bugzilla.suse.com/781995">SUSE bug 781995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/791607">SUSE bug 791607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854393">SUSE bug 854393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590180" comment="libtiff3-3.8.2-141.150.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590181" comment="libtiff3-32bit-3.8.2-141.150.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4461</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4461" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4461" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4461" ref_url="https://www.suse.com/security/cve/CVE-2012-4461" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-December/000318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-March/000365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0925-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0927-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00064.html" source="SUSE-SU"/>
    <description>
    The KVM subsystem in the Linux kernel before 3.6.9, when running on hosts that use qemu userspace without XSAVE, allows local users to cause a denial of service (kernel OOPS) by using the KVM_SET_SREGS ioctl to set the X86_CR4_OSXSAVE bit in the guest cr4 register, then calling the KVM_RUN ioctl.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-19"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4461/">CVE-2012-4461</cve>
	<bugzilla href="https://bugzilla.suse.com/787821">SUSE bug 787821</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589408" comment="kernel-default-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589409" comment="kernel-default-base-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589410" comment="kernel-default-devel-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589411" comment="kernel-default-extra-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589412" comment="kernel-source-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589413" comment="kernel-syms-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589414" comment="kernel-trace-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589415" comment="kernel-trace-base-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589416" comment="kernel-trace-devel-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589417" comment="kernel-trace-extra-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589418" comment="kernel-xen-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589419" comment="kernel-xen-base-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589420" comment="kernel-xen-devel-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589421" comment="kernel-xen-extra-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566052" comment="xen-kmp-default-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566054" comment="xen-kmp-trace-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4505</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4505" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4505" ref_url="https://www.suse.com/security/cve/CVE-2012-4505" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-December/000319.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1375-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-10/msg00065.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the px_pac_reload function in lib/pac.c in libproxy 0.2.x and 0.3.x allows remote servers to have an unspecified impact via a crafted Content-Length size in an HTTP response header for a proxy.pac file request, a different vulnerability than CVE-2012-4504.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4505/">CVE-2012-4505</cve>
	<bugzilla href="https://bugzilla.suse.com/784523">SUSE bug 784523</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566123" comment="libproxy0-0.3.1-2.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566124" comment="libproxy0-32bit-0.3.1-2.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566125" comment="libproxy0-config-gnome-0.3.1-2.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566126" comment="libproxy0-config-gnome-32bit-0.3.1-2.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566127" comment="libproxy0-config-kde4-0.3.1-2.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566128" comment="libproxy0-networkmanager-0.3.1-2.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566129" comment="libproxy0-networkmanager-32bit-0.3.1-2.6.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4508</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4508" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4508" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4508" ref_url="https://www.suse.com/security/cve/CVE-2012-4508" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-December/000318.html" source="SUSE-SU"/>
    <description>
    Race condition in fs/ext4/extents.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from a deleted file by reading an extent that was not properly marked as uninitialized.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4508/">CVE-2012-4508</cve>
	<bugzilla href="https://bugzilla.suse.com/784192">SUSE bug 784192</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589408" comment="kernel-default-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589409" comment="kernel-default-base-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589410" comment="kernel-default-devel-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589411" comment="kernel-default-extra-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589412" comment="kernel-source-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589413" comment="kernel-syms-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589414" comment="kernel-trace-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589415" comment="kernel-trace-base-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589416" comment="kernel-trace-devel-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589417" comment="kernel-trace-extra-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589418" comment="kernel-xen-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589419" comment="kernel-xen-base-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589420" comment="kernel-xen-devel-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589421" comment="kernel-xen-extra-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566052" comment="xen-kmp-default-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566054" comment="xen-kmp-trace-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4512</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4512" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4512" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4512" ref_url="https://www.suse.com/security/cve/CVE-2012-4512" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000609.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1581-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00088.html" source="SUSE-SU"/>
    <description>
    The CSS parser (khtml/css/cssparser.cpp) in Konqueror in KDE 4.7.3 allows remote attackers to cause a denial of service (crash) and possibly read memory via a crafted font face source, related to "type confusion."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4512/">CVE-2012-4512</cve>
	<bugzilla href="https://bugzilla.suse.com/787520">SUSE bug 787520</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566030" comment="kdelibs4-4.3.5-0.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566031" comment="kdelibs4-core-4.3.5-0.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566032" comment="libkde4-4.3.5-0.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562953" comment="libkde4-32bit-4.3.5-0.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566033" comment="libkdecore4-4.3.5-0.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562955" comment="libkdecore4-32bit-4.3.5-0.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4513</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4513" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4513" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4513" ref_url="https://www.suse.com/security/cve/CVE-2012-4513" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000609.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1581-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00088.html" source="SUSE-SU"/>
    <description>
    khtml/imload/scaledimageplane.h in Konqueror in KDE 4.7.3 allows remote attackers to cause a denial of service (crash) and possibly read memory via large canvas dimensions, which leads to an unexpected sign extension and a heap-based buffer over-read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4513/">CVE-2012-4513</cve>
	<bugzilla href="https://bugzilla.suse.com/787520">SUSE bug 787520</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566030" comment="kdelibs4-4.3.5-0.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566031" comment="kdelibs4-core-4.3.5-0.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566032" comment="libkde4-4.3.5-0.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562953" comment="libkde4-32bit-4.3.5-0.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566033" comment="libkdecore4-4.3.5-0.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562955" comment="libkdecore4-32bit-4.3.5-0.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4515</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4515" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4515" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4515" ref_url="https://www.suse.com/security/cve/CVE-2012-4515" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000609.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1581-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00088.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in khtml/rendering/render_replaced.cpp in Konqueror in KDE 4.7.3, when the context menu is shown, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by accessing an iframe when it is being updated.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-4515/">CVE-2012-4515</cve>
	<bugzilla href="https://bugzilla.suse.com/787520">SUSE bug 787520</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566030" comment="kdelibs4-4.3.5-0.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566031" comment="kdelibs4-core-4.3.5-0.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566032" comment="libkde4-4.3.5-0.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562953" comment="libkde4-32bit-4.3.5-0.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566033" comment="libkdecore4-4.3.5-0.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562955" comment="libkdecore4-32bit-4.3.5-0.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4522</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4522" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4522" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4522" ref_url="https://www.suse.com/security/cve/CVE-2012-4522" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-March/000371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000409.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0376-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00002.html" source="SUSE-SU"/>
    <description>
    The rb_get_path_check function in file.c in Ruby 1.9.3 before patchlevel 286 and Ruby 2.0.0 before r37163 allows context-dependent attackers to create files in unexpected locations or with unexpected names via a NUL byte in a file path.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4522/">CVE-2012-4522</cve>
	<bugzilla href="https://bugzilla.suse.com/791199">SUSE bug 791199</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590195" comment="ruby-1.8.7.p357-0.9.9.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4530</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4530" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4530" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4530" ref_url="https://www.suse.com/security/cve/CVE-2012-4530" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-February/000339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0674-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0396-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00005.html" source="SUSE-SU"/>
    <description>
    The load_script function in fs/binfmt_script.c in the Linux kernel before 3.7.2 does not properly handle recursion, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4530/">CVE-2012-4530</cve>
	<bugzilla href="https://bugzilla.suse.com/786013">SUSE bug 786013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/841063">SUSE bug 841063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589222" comment="kernel-default-3.0.58-0.6.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589223" comment="kernel-default-base-3.0.58-0.6.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589224" comment="kernel-default-devel-3.0.58-0.6.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589225" comment="kernel-default-extra-3.0.58-0.6.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589226" comment="kernel-source-3.0.58-0.6.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589227" comment="kernel-syms-3.0.58-0.6.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589228" comment="kernel-trace-3.0.58-0.6.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589229" comment="kernel-trace-base-3.0.58-0.6.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589230" comment="kernel-trace-devel-3.0.58-0.6.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589231" comment="kernel-trace-extra-3.0.58-0.6.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589232" comment="kernel-xen-3.0.58-0.6.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589233" comment="kernel-xen-base-3.0.58-0.6.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589234" comment="kernel-xen-devel-3.0.58-0.6.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589235" comment="kernel-xen-extra-3.0.58-0.6.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589236" comment="xen-kmp-default-4.1.3_06_3.0.58_0.6.2-0.7.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589237" comment="xen-kmp-trace-4.1.3_06_3.0.58_0.6.2-0.7.16 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4535</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4535" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4535" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4535" ref_url="https://www.suse.com/security/cve/CVE-2012-4535" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1487-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1572-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1573-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html" source="SUSE-SU"/>
    <description>
    Xen 3.4 through 4.2, and possibly earlier versions, allows local guest OS administrators to cause a denial of service (Xen infinite loop and physical CPU consumption) by setting a VCPU with an "inappropriate deadline."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4535/">CVE-2012-4535</cve>
	<bugzilla href="https://bugzilla.suse.com/779212">SUSE bug 779212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786516">SUSE bug 786516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786518">SUSE bug 786518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786519">SUSE bug 786519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786520">SUSE bug 786520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/787163">SUSE bug 787163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566138" comment="libvirt-0.9.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566139" comment="libvirt-client-0.9.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566140" comment="libvirt-client-32bit-0.9.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566141" comment="libvirt-doc-0.9.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566142" comment="libvirt-python-0.9.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589917" comment="vm-install-0.5.14-0.5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566229" comment="xen-4.1.3_04-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566230" comment="xen-doc-html-4.1.3_04-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566231" comment="xen-doc-pdf-4.1.3_04-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566232" comment="xen-kmp-default-4.1.3_04_3.0.42_0.7-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566233" comment="xen-kmp-pae-4.1.3_04_3.0.42_0.7-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566234" comment="xen-kmp-trace-4.1.3_04_3.0.42_0.7-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566235" comment="xen-libs-4.1.3_04-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566236" comment="xen-libs-32bit-4.1.3_04-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566237" comment="xen-tools-4.1.3_04-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566238" comment="xen-tools-domU-4.1.3_04-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4536</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4536" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4536" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4536" ref_url="https://www.suse.com/security/cve/CVE-2012-4536" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1487-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1572-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1573-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html" source="SUSE-SU"/>
    <description>
    The (1) domain_pirq_to_emuirq and (2) physdev_unmap_pirq functions in Xen 2.2 allows local guest OS administrators to cause a denial of service (Xen crash) via a crafted pirq value that triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4536/">CVE-2012-4536</cve>
	<bugzilla href="https://bugzilla.suse.com/779212">SUSE bug 779212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786516">SUSE bug 786516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786518">SUSE bug 786518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786519">SUSE bug 786519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786520">SUSE bug 786520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/787163">SUSE bug 787163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566138" comment="libvirt-0.9.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566139" comment="libvirt-client-0.9.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566140" comment="libvirt-client-32bit-0.9.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566141" comment="libvirt-doc-0.9.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566142" comment="libvirt-python-0.9.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589917" comment="vm-install-0.5.14-0.5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566229" comment="xen-4.1.3_04-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566230" comment="xen-doc-html-4.1.3_04-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566231" comment="xen-doc-pdf-4.1.3_04-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566232" comment="xen-kmp-default-4.1.3_04_3.0.42_0.7-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566233" comment="xen-kmp-pae-4.1.3_04_3.0.42_0.7-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566234" comment="xen-kmp-trace-4.1.3_04_3.0.42_0.7-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566235" comment="xen-libs-4.1.3_04-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566236" comment="xen-libs-32bit-4.1.3_04-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566237" comment="xen-tools-4.1.3_04-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566238" comment="xen-tools-domU-4.1.3_04-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4537</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4537" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4537" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4537" ref_url="https://www.suse.com/security/cve/CVE-2012-4537" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1487-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1572-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1573-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html" source="SUSE-SU"/>
    <description>
    Xen 3.4 through 4.2, and possibly earlier versions, does not properly synchronize the p2m and m2p tables when the set_p2m_entry function fails, which allows local HVM guest OS administrators to cause a denial of service (memory consumption and assertion failure), aka "Memory mapping failure DoS vulnerability."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4537/">CVE-2012-4537</cve>
	<bugzilla href="https://bugzilla.suse.com/779212">SUSE bug 779212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786516">SUSE bug 786516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786517">SUSE bug 786517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786518">SUSE bug 786518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786519">SUSE bug 786519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786520">SUSE bug 786520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/787163">SUSE bug 787163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566138" comment="libvirt-0.9.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566139" comment="libvirt-client-0.9.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566140" comment="libvirt-client-32bit-0.9.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566141" comment="libvirt-doc-0.9.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566142" comment="libvirt-python-0.9.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589917" comment="vm-install-0.5.14-0.5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566229" comment="xen-4.1.3_04-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566230" comment="xen-doc-html-4.1.3_04-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566231" comment="xen-doc-pdf-4.1.3_04-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566232" comment="xen-kmp-default-4.1.3_04_3.0.42_0.7-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566233" comment="xen-kmp-pae-4.1.3_04_3.0.42_0.7-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566234" comment="xen-kmp-trace-4.1.3_04_3.0.42_0.7-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566235" comment="xen-libs-4.1.3_04-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566236" comment="xen-libs-32bit-4.1.3_04-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566237" comment="xen-tools-4.1.3_04-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566238" comment="xen-tools-domU-4.1.3_04-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4538</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4538" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4538" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4538" ref_url="https://www.suse.com/security/cve/CVE-2012-4538" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1487-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1572-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1573-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html" source="SUSE-SU"/>
    <description>
    The HVMOP_pagetable_dying hypercall in Xen 4.0, 4.1, and 4.2 does not properly check the pagetable state when running on shadow pagetables, which allows a local HVM guest OS to cause a denial of service (hypervisor crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4538/">CVE-2012-4538</cve>
	<bugzilla href="https://bugzilla.suse.com/779212">SUSE bug 779212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786516">SUSE bug 786516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786518">SUSE bug 786518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786519">SUSE bug 786519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786520">SUSE bug 786520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/787163">SUSE bug 787163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566138" comment="libvirt-0.9.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566139" comment="libvirt-client-0.9.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566140" comment="libvirt-client-32bit-0.9.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566141" comment="libvirt-doc-0.9.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566142" comment="libvirt-python-0.9.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589917" comment="vm-install-0.5.14-0.5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566229" comment="xen-4.1.3_04-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566230" comment="xen-doc-html-4.1.3_04-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566231" comment="xen-doc-pdf-4.1.3_04-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566232" comment="xen-kmp-default-4.1.3_04_3.0.42_0.7-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566233" comment="xen-kmp-pae-4.1.3_04_3.0.42_0.7-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566234" comment="xen-kmp-trace-4.1.3_04_3.0.42_0.7-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566235" comment="xen-libs-4.1.3_04-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566236" comment="xen-libs-32bit-4.1.3_04-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566237" comment="xen-tools-4.1.3_04-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566238" comment="xen-tools-domU-4.1.3_04-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4539</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4539" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4539" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4539" ref_url="https://www.suse.com/security/cve/CVE-2012-4539" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1487-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1572-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1573-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html" source="SUSE-SU"/>
    <description>
    Xen 4.0 through 4.2, when running 32-bit x86 PV guests on 64-bit hypervisors, allows local guest OS administrators to cause a denial of service (infinite loop and hang or crash) via invalid arguments to GNTTABOP_get_status_frames, aka "Grant table hypercall infinite loop DoS vulnerability."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4539/">CVE-2012-4539</cve>
	<bugzilla href="https://bugzilla.suse.com/779212">SUSE bug 779212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786516">SUSE bug 786516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786518">SUSE bug 786518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786519">SUSE bug 786519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786520">SUSE bug 786520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/787163">SUSE bug 787163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566138" comment="libvirt-0.9.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566139" comment="libvirt-client-0.9.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566140" comment="libvirt-client-32bit-0.9.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566141" comment="libvirt-doc-0.9.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566142" comment="libvirt-python-0.9.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589917" comment="vm-install-0.5.14-0.5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566229" comment="xen-4.1.3_04-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566230" comment="xen-doc-html-4.1.3_04-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566231" comment="xen-doc-pdf-4.1.3_04-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566232" comment="xen-kmp-default-4.1.3_04_3.0.42_0.7-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566233" comment="xen-kmp-pae-4.1.3_04_3.0.42_0.7-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566234" comment="xen-kmp-trace-4.1.3_04_3.0.42_0.7-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566235" comment="xen-libs-4.1.3_04-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566236" comment="xen-libs-32bit-4.1.3_04-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566237" comment="xen-tools-4.1.3_04-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566238" comment="xen-tools-domU-4.1.3_04-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4540</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4540" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4540" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4540" ref_url="https://www.suse.com/security/cve/CVE-2012-4540" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-November/000301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1520-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1524-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0174-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1509-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1511-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00019.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in the invoke function in IcedTeaScriptablePluginObject.cc in IcedTea-Web 1.1.x before 1.1.7, 1.2.x before 1.2.2, 1.3.x before 1.3.1, and 1.4.x before 1.4.1 allows remote attackers to obtain sensitive information, cause a denial of service (crash), or possibly execute arbitrary code via a crafted webpage that triggers a heap-based buffer overflow, related to an error message and a "triggering event attached to applet." NOTE: the 1.4.x versions were originally associated with CVE-2013-4349, but that entry has been MERGED with this one.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4540/">CVE-2012-4540</cve>
	<bugzilla href="https://bugzilla.suse.com/787846">SUSE bug 787846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840572">SUSE bug 840572</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566019" comment="icedtea-web-1.4.1-0.8.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590204" comment="icedtea-web-1.4.1-0.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4544</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4544" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4544" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4544" ref_url="https://www.suse.com/security/cve/CVE-2012-4544" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1487-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1572-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1573-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html" source="SUSE-SU"/>
    <description>
    The PV domain builder in Xen 4.2 and earlier does not validate the size of the kernel or ramdisk (1) before or (2) after decompression, which allows local guest administrators to cause a denial of service (domain 0 memory consumption) via a crafted (a) kernel or (b) ramdisk.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4544/">CVE-2012-4544</cve>
	<bugzilla href="https://bugzilla.suse.com/779212">SUSE bug 779212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786516">SUSE bug 786516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786518">SUSE bug 786518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786519">SUSE bug 786519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786520">SUSE bug 786520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/787163">SUSE bug 787163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566138" comment="libvirt-0.9.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566139" comment="libvirt-client-0.9.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566140" comment="libvirt-client-32bit-0.9.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566141" comment="libvirt-doc-0.9.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566142" comment="libvirt-python-0.9.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589917" comment="vm-install-0.5.14-0.5.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566229" comment="xen-4.1.3_04-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566230" comment="xen-doc-html-4.1.3_04-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566231" comment="xen-doc-pdf-4.1.3_04-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566232" comment="xen-kmp-default-4.1.3_04_3.0.42_0.7-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566233" comment="xen-kmp-pae-4.1.3_04_3.0.42_0.7-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566234" comment="xen-kmp-trace-4.1.3_04_3.0.42_0.7-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566235" comment="xen-libs-4.1.3_04-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566236" comment="xen-libs-32bit-4.1.3_04-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566237" comment="xen-tools-4.1.3_04-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566238" comment="xen-tools-domU-4.1.3_04-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4562</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4562" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4562" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4562" ref_url="https://www.suse.com/security/cve/CVE-2012-4562" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1520-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1622-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-12/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0130-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00021.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in libssh before 0.5.3 allow remote attackers to cause a denial of service (infinite loop or crash) and possibly execute arbitrary code via unspecified vectors, which triggers a buffer overflow, infinite loop, or possibly some other unspecified vulnerabilities.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4562/">CVE-2012-4562</cve>
	<bugzilla href="https://bugzilla.suse.com/789827">SUSE bug 789827</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566130" comment="libssh2-0.2-5.18.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4564</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4564" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4564" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4564" ref_url="https://www.suse.com/security/cve/CVE-2012-4564" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-January/000333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000623.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0187-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00076.html" source="SUSE-SU"/>
    <description>
    ppm2tiff does not check the return value of the TIFFScanlineSize function, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PPM image that triggers an integer overflow, a zero-memory allocation, and a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4564/">CVE-2012-4564</cve>
	<bugzilla href="https://bugzilla.suse.com/781995">SUSE bug 781995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/787892">SUSE bug 787892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/791607">SUSE bug 791607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854393">SUSE bug 854393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590180" comment="libtiff3-3.8.2-141.150.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590181" comment="libtiff3-32bit-3.8.2-141.150.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4565</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4565" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4565" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4565" ref_url="https://www.suse.com/security/cve/CVE-2012-4565" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-February/000339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
    <description>
    The tcp_illinois_info function in net/ipv4/tcp_illinois.c in the Linux kernel before 3.4.19, when the net.ipv4.tcp_congestion_control illinois setting is enabled, allows local users to cause a denial of service (divide-by-zero error and OOPS) by reading TCP stats.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4565/">CVE-2012-4565</cve>
	<bugzilla href="https://bugzilla.suse.com/787576">SUSE bug 787576</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589222" comment="kernel-default-3.0.58-0.6.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589223" comment="kernel-default-base-3.0.58-0.6.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589224" comment="kernel-default-devel-3.0.58-0.6.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589225" comment="kernel-default-extra-3.0.58-0.6.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589226" comment="kernel-source-3.0.58-0.6.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589227" comment="kernel-syms-3.0.58-0.6.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589228" comment="kernel-trace-3.0.58-0.6.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589229" comment="kernel-trace-base-3.0.58-0.6.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589230" comment="kernel-trace-devel-3.0.58-0.6.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589231" comment="kernel-trace-extra-3.0.58-0.6.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589232" comment="kernel-xen-3.0.58-0.6.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589233" comment="kernel-xen-base-3.0.58-0.6.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589234" comment="kernel-xen-devel-3.0.58-0.6.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589235" comment="kernel-xen-extra-3.0.58-0.6.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589236" comment="xen-kmp-default-4.1.3_06_3.0.58_0.6.2-0.7.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589237" comment="xen-kmp-trace-4.1.3_06_3.0.58_0.6.2-0.7.16 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4681</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4681" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4681" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4681" ref_url="https://www.suse.com/security/cve/CVE-2012-4681" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1231-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00008.html" source="SUSE-SU"/>
    <description>
    Multiple vulnerabilities in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 6 and earlier allow remote attackers to execute arbitrary code via a crafted applet that bypasses SecurityManager restrictions by (1) using com.sun.beans.finder.ClassFinder.findClass and leveraging an exception with the forName method to access restricted classes from arbitrary packages such as sun.awt.SunToolkit, then (2) using "reflection with a trusted immediate caller" to leverage the getField method to access and modify private fields, as exploited in the wild in August 2012 using Gondzz.class and Gondvv.class.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-4681/">CVE-2012-4681</cve>
	<bugzilla href="https://bugzilla.suse.com/777499">SUSE bug 777499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/778629">SUSE bug 778629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/780897">SUSE bug 780897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/798324">SUSE bug 798324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589382" comment="java-1_6_0-openjdk-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589383" comment="java-1_6_0-openjdk-demo-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589384" comment="java-1_6_0-openjdk-devel-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4929</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4929" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4929" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4929" ref_url="https://www.suse.com/security/cve/CVE-2012-4929" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-October/000289.html" source="SUSE-SU"/>
		<reference ref_id="TID7014254" ref_url="https://www.suse.com/support/kb/doc/?id=7014254" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1420-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-10/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0143-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0157-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1630-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00005.html" source="SUSE-SU"/>
    <description>
    The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google Chrome, Qt, and other products, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a "CRIME" attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4929/">CVE-2012-4929</cve>
	<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/779952">SUSE bug 779952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/793420">SUSE bug 793420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803004">SUSE bug 803004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/847895">SUSE bug 847895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590205" comment="libQtWebKit4-4.6.3-5.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590206" comment="libQtWebKit4-32bit-4.6.3-5.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590207" comment="libqt4-4.6.3-5.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590208" comment="libqt4-32bit-4.6.3-5.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590209" comment="libqt4-qt3support-4.6.3-5.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590210" comment="libqt4-qt3support-32bit-4.6.3-5.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590211" comment="libqt4-sql-4.6.3-5.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590212" comment="libqt4-sql-32bit-4.6.3-5.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590213" comment="libqt4-sql-mysql-4.6.3-5.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590214" comment="libqt4-sql-mysql-32bit-4.6.3-5.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590215" comment="libqt4-sql-postgresql-4.6.3-5.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590216" comment="libqt4-sql-postgresql-32bit-4.6.3-5.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590217" comment="libqt4-sql-sqlite-4.6.3-5.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590218" comment="libqt4-sql-sqlite-32bit-4.6.3-5.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590219" comment="libqt4-sql-unixODBC-4.6.3-5.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590220" comment="libqt4-sql-unixODBC-32bit-4.6.3-5.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590221" comment="libqt4-x11-4.6.3-5.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590222" comment="libqt4-x11-32bit-4.6.3-5.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5067</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5067" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5067" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5067" ref_url="https://www.suse.com/security/cve/CVE-2012-5067" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier allows remote attackers to affect confidentiality via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5067/">CVE-2012-5067</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589382" comment="java-1_6_0-openjdk-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589383" comment="java-1_6_0-openjdk-demo-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589384" comment="java-1_6_0-openjdk-devel-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5068</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5068" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5068" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5068" ref_url="https://www.suse.com/security/cve/CVE-2012-5068" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1423-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00024.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5068/">CVE-2012-5068</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589382" comment="java-1_6_0-openjdk-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589383" comment="java-1_6_0-openjdk-demo-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589384" comment="java-1_6_0-openjdk-devel-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5069</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5069" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5069" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5069" ref_url="https://www.suse.com/security/cve/CVE-2012-5069" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1423-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00024.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, and 5.0 Update 36 and earlier allows remote attackers to affect confidentiality and integrity via unknown vectors related to Concurrency.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5069/">CVE-2012-5069</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589382" comment="java-1_6_0-openjdk-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589383" comment="java-1_6_0-openjdk-demo-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589384" comment="java-1_6_0-openjdk-devel-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5070</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5070" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5070" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5070" ref_url="https://www.suse.com/security/cve/CVE-2012-5070" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier allows remote attackers to affect confidentiality, related to JMX.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5070/">CVE-2012-5070</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589382" comment="java-1_6_0-openjdk-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589383" comment="java-1_6_0-openjdk-demo-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589384" comment="java-1_6_0-openjdk-devel-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5071</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5071" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5071" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5071" ref_url="https://www.suse.com/security/cve/CVE-2012-5071" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1423-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00024.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, and 5.0 Update 36 and earlier allows remote attackers to affect confidentiality and integrity, related to JMX.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5071/">CVE-2012-5071</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589382" comment="java-1_6_0-openjdk-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589383" comment="java-1_6_0-openjdk-demo-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589384" comment="java-1_6_0-openjdk-devel-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5072</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5072" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5072" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5072" ref_url="https://www.suse.com/security/cve/CVE-2012-5072" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1423-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00024.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality via unknown vectors related to Security.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5072/">CVE-2012-5072</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589382" comment="java-1_6_0-openjdk-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589383" comment="java-1_6_0-openjdk-demo-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589384" comment="java-1_6_0-openjdk-devel-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5073</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5073" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5073" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5073" ref_url="https://www.suse.com/security/cve/CVE-2012-5073" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1423-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00024.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect integrity via unknown vectors related to Libraries, a different vulnerability than CVE-2012-5079.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5073/">CVE-2012-5073</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589382" comment="java-1_6_0-openjdk-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589383" comment="java-1_6_0-openjdk-demo-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589384" comment="java-1_6_0-openjdk-devel-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5074</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5074" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5074" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5074" ref_url="https://www.suse.com/security/cve/CVE-2012-5074" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier allows remote attackers to affect confidentiality and integrity, related to JAX-WS.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5074/">CVE-2012-5074</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589382" comment="java-1_6_0-openjdk-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589383" comment="java-1_6_0-openjdk-demo-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589384" comment="java-1_6_0-openjdk-devel-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5075</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5075" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5075" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5075" ref_url="https://www.suse.com/security/cve/CVE-2012-5075" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1423-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00024.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, and 5.0 Update 36 and earlier allows remote attackers to affect confidentiality, related to JMX.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5075/">CVE-2012-5075</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589382" comment="java-1_6_0-openjdk-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589383" comment="java-1_6_0-openjdk-demo-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589384" comment="java-1_6_0-openjdk-devel-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5076</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5076" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5076" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5076" ref_url="https://www.suse.com/security/cve/CVE-2012-5076" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to JAX-WS.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5076/">CVE-2012-5076</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589382" comment="java-1_6_0-openjdk-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589383" comment="java-1_6_0-openjdk-demo-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589384" comment="java-1_6_0-openjdk-devel-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5077</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5077" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5077" ref_url="https://www.suse.com/security/cve/CVE-2012-5077" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1423-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00024.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect confidentiality via unknown vectors related to Security.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-5077/">CVE-2012-5077</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589382" comment="java-1_6_0-openjdk-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589383" comment="java-1_6_0-openjdk-demo-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589384" comment="java-1_6_0-openjdk-devel-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5078</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5078" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5078" ref_url="https://www.suse.com/security/cve/CVE-2012-5078" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the JavaFX component in Oracle Java SE JavaFX 2.2 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2012-5080.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5078/">CVE-2012-5078</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589382" comment="java-1_6_0-openjdk-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589383" comment="java-1_6_0-openjdk-demo-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589384" comment="java-1_6_0-openjdk-devel-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5079</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5079" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5079" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5079" ref_url="https://www.suse.com/security/cve/CVE-2012-5079" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1423-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00024.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect integrity via unknown vectors related to Libraries, a different vulnerability than CVE-2012-5073.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5079/">CVE-2012-5079</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589382" comment="java-1_6_0-openjdk-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589383" comment="java-1_6_0-openjdk-demo-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589384" comment="java-1_6_0-openjdk-devel-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5080</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5080" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5080" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5080" ref_url="https://www.suse.com/security/cve/CVE-2012-5080" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the JavaFX component in Oracle Java SE JavaFX 2.2 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2012-5078.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5080/">CVE-2012-5080</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589382" comment="java-1_6_0-openjdk-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589383" comment="java-1_6_0-openjdk-demo-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589384" comment="java-1_6_0-openjdk-devel-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5081</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5081" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5081" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5081" ref_url="https://www.suse.com/security/cve/CVE-2012-5081" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1423-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00024.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect availability, related to JSSE.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5081/">CVE-2012-5081</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589382" comment="java-1_6_0-openjdk-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589383" comment="java-1_6_0-openjdk-demo-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589384" comment="java-1_6_0-openjdk-devel-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125082" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5082</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5082" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5082" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5082" ref_url="https://www.suse.com/security/cve/CVE-2012-5082" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the JavaFX component in Oracle Java SE JavaFX 2.2 and earlier allows remote attackers to affect availability via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5082/">CVE-2012-5082</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589382" comment="java-1_6_0-openjdk-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589383" comment="java-1_6_0-openjdk-demo-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589384" comment="java-1_6_0-openjdk-devel-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5083</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5083" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5083" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5083" ref_url="https://www.suse.com/security/cve/CVE-2012-5083" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, 1.4.2_38 and earlier, and JavaFX 2.2 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5083/">CVE-2012-5083</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589382" comment="java-1_6_0-openjdk-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589383" comment="java-1_6_0-openjdk-demo-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589384" comment="java-1_6_0-openjdk-devel-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125084" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5084</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5084" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5084" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5084" ref_url="https://www.suse.com/security/cve/CVE-2012-5084" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1423-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00024.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Swing.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5084/">CVE-2012-5084</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589382" comment="java-1_6_0-openjdk-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589383" comment="java-1_6_0-openjdk-demo-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589384" comment="java-1_6_0-openjdk-devel-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5085</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5085" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5085" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5085" ref_url="https://www.suse.com/security/cve/CVE-2012-5085" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1423-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00024.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote authenticated users to have an unspecified impact via unknown vectors related to Networking.  NOTE: the Oracle CPU states that this issue has a 0.0 CVSS score. If so, then this is not a vulnerability and this issue should not be included in CVE.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-5085/">CVE-2012-5085</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589382" comment="java-1_6_0-openjdk-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589383" comment="java-1_6_0-openjdk-demo-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589384" comment="java-1_6_0-openjdk-devel-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5086</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5086" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5086" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5086" ref_url="https://www.suse.com/security/cve/CVE-2012-5086" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1423-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00024.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Beans.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5086/">CVE-2012-5086</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589382" comment="java-1_6_0-openjdk-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589383" comment="java-1_6_0-openjdk-demo-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589384" comment="java-1_6_0-openjdk-devel-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5087</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5087" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5087" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5087" ref_url="https://www.suse.com/security/cve/CVE-2012-5087" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Beans.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5087/">CVE-2012-5087</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589382" comment="java-1_6_0-openjdk-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589383" comment="java-1_6_0-openjdk-demo-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589384" comment="java-1_6_0-openjdk-devel-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5088</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5088" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5088" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5088" ref_url="https://www.suse.com/security/cve/CVE-2012-5088" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5088/">CVE-2012-5088</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589382" comment="java-1_6_0-openjdk-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589383" comment="java-1_6_0-openjdk-demo-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589384" comment="java-1_6_0-openjdk-devel-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5089</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5089" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5089" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5089" ref_url="https://www.suse.com/security/cve/CVE-2012-5089" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1423-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00024.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, and 5.0 Update 36 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to JMX, a different vulnerability than CVE-2012-3143.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5089/">CVE-2012-5089</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589382" comment="java-1_6_0-openjdk-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589383" comment="java-1_6_0-openjdk-demo-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589384" comment="java-1_6_0-openjdk-devel-1.6.0.0_b24.1.11.5-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5134</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5134" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5134" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5134" ref_url="https://www.suse.com/security/cve/CVE-2012-5134" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1636-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1627-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1637-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1647-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0178-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00023.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer underflow in the xmlParseAttValueComplex function in parser.c in libxml2 2.9.0 and earlier, as used in Google Chrome before 23.0.1271.91 and other products, allows remote attackers to cause a denial of service or possibly execute arbitrary code via crafted entities in an XML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5134/">CVE-2012-5134</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/791234">SUSE bug 791234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/793334">SUSE bug 793334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/795039">SUSE bug 795039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/804033">SUSE bug 804033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590245" comment="libxml2-2.7.6-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590246" comment="libxml2-32bit-2.7.6-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590247" comment="libxml2-python-2.7.6-0.21.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5166</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5166" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5166" ref_url="https://www.suse.com/security/cve/CVE-2012-5166" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1390-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1390-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1372-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0605-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00035.html" source="SUSE-SU"/>
    <description>
    ISC BIND 9.x before 9.7.6-P4, 9.8.x before 9.8.3-P4, 9.9.x before 9.9.1-P4, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P4 allows remote attackers to cause a denial of service (named daemon hang) via unspecified combinations of resource records.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5166/">CVE-2012-5166</cve>
	<bugzilla href="https://bugzilla.suse.com/784602">SUSE bug 784602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/792926">SUSE bug 792926</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590255" comment="bind-libs-9.6ESVR7P4-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590256" comment="bind-libs-32bit-9.6ESVR7P4-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590257" comment="bind-utils-9.6ESVR7P4-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5248</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5248" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5248" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5248" ref_url="https://www.suse.com/security/cve/CVE-2012-5248" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1326-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0370-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5248/">CVE-2012-5248</cve>
	<bugzilla href="https://bugzilla.suse.com/784168">SUSE bug 784168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590270" comment="flash-player-11.2.202.243-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565987" comment="flash-player-gnome-11.2.202.336-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565988" comment="flash-player-kde4-11.2.202.336-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125249" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5249</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5249" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5249" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5249" ref_url="https://www.suse.com/security/cve/CVE-2012-5249" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1326-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0370-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5249/">CVE-2012-5249</cve>
	<bugzilla href="https://bugzilla.suse.com/784168">SUSE bug 784168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590270" comment="flash-player-11.2.202.243-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565987" comment="flash-player-gnome-11.2.202.336-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565988" comment="flash-player-kde4-11.2.202.336-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125250" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5250</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5250" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5250" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5250" ref_url="https://www.suse.com/security/cve/CVE-2012-5250" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1326-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0370-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5250/">CVE-2012-5250</cve>
	<bugzilla href="https://bugzilla.suse.com/784168">SUSE bug 784168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590270" comment="flash-player-11.2.202.243-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565987" comment="flash-player-gnome-11.2.202.336-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565988" comment="flash-player-kde4-11.2.202.336-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5251</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5251" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5251" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5251" ref_url="https://www.suse.com/security/cve/CVE-2012-5251" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1326-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0370-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5251/">CVE-2012-5251</cve>
	<bugzilla href="https://bugzilla.suse.com/784168">SUSE bug 784168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590270" comment="flash-player-11.2.202.243-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565987" comment="flash-player-gnome-11.2.202.336-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565988" comment="flash-player-kde4-11.2.202.336-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5252</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5252" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5252" ref_url="https://www.suse.com/security/cve/CVE-2012-5252" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1326-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0370-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5252/">CVE-2012-5252</cve>
	<bugzilla href="https://bugzilla.suse.com/784168">SUSE bug 784168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590270" comment="flash-player-11.2.202.243-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565987" comment="flash-player-gnome-11.2.202.336-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565988" comment="flash-player-kde4-11.2.202.336-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125253" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5253</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5253" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5253" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5253" ref_url="https://www.suse.com/security/cve/CVE-2012-5253" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1326-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0370-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5253/">CVE-2012-5253</cve>
	<bugzilla href="https://bugzilla.suse.com/784168">SUSE bug 784168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590270" comment="flash-player-11.2.202.243-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565987" comment="flash-player-gnome-11.2.202.336-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565988" comment="flash-player-kde4-11.2.202.336-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5254</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5254" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5254" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5254" ref_url="https://www.suse.com/security/cve/CVE-2012-5254" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1326-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0370-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5254/">CVE-2012-5254</cve>
	<bugzilla href="https://bugzilla.suse.com/784168">SUSE bug 784168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590270" comment="flash-player-11.2.202.243-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565987" comment="flash-player-gnome-11.2.202.336-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565988" comment="flash-player-kde4-11.2.202.336-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5255</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5255" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5255" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5255" ref_url="https://www.suse.com/security/cve/CVE-2012-5255" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1326-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0370-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5255/">CVE-2012-5255</cve>
	<bugzilla href="https://bugzilla.suse.com/784168">SUSE bug 784168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590270" comment="flash-player-11.2.202.243-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565987" comment="flash-player-gnome-11.2.202.336-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565988" comment="flash-player-kde4-11.2.202.336-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125256" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5256</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5256" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5256" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5256" ref_url="https://www.suse.com/security/cve/CVE-2012-5256" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1326-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0370-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5256/">CVE-2012-5256</cve>
	<bugzilla href="https://bugzilla.suse.com/784168">SUSE bug 784168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590270" comment="flash-player-11.2.202.243-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565987" comment="flash-player-gnome-11.2.202.336-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565988" comment="flash-player-kde4-11.2.202.336-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125257" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5257</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5257" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5257" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5257" ref_url="https://www.suse.com/security/cve/CVE-2012-5257" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1326-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0370-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5257/">CVE-2012-5257</cve>
	<bugzilla href="https://bugzilla.suse.com/784168">SUSE bug 784168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590270" comment="flash-player-11.2.202.243-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565987" comment="flash-player-gnome-11.2.202.336-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565988" comment="flash-player-kde4-11.2.202.336-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125258" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5258</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5258" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5258" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5258" ref_url="https://www.suse.com/security/cve/CVE-2012-5258" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1326-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0370-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5258/">CVE-2012-5258</cve>
	<bugzilla href="https://bugzilla.suse.com/784168">SUSE bug 784168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590270" comment="flash-player-11.2.202.243-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565987" comment="flash-player-gnome-11.2.202.336-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565988" comment="flash-player-kde4-11.2.202.336-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125259" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5259</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5259" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5259" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5259" ref_url="https://www.suse.com/security/cve/CVE-2012-5259" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1326-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0370-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5259/">CVE-2012-5259</cve>
	<bugzilla href="https://bugzilla.suse.com/784168">SUSE bug 784168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590270" comment="flash-player-11.2.202.243-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565987" comment="flash-player-gnome-11.2.202.336-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565988" comment="flash-player-kde4-11.2.202.336-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125260" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5260</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5260" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5260" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5260" ref_url="https://www.suse.com/security/cve/CVE-2012-5260" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1326-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0370-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5260/">CVE-2012-5260</cve>
	<bugzilla href="https://bugzilla.suse.com/784168">SUSE bug 784168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590270" comment="flash-player-11.2.202.243-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565987" comment="flash-player-gnome-11.2.202.336-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565988" comment="flash-player-kde4-11.2.202.336-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5261</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5261" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5261" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5261" ref_url="https://www.suse.com/security/cve/CVE-2012-5261" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1326-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0370-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5261/">CVE-2012-5261</cve>
	<bugzilla href="https://bugzilla.suse.com/784168">SUSE bug 784168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590270" comment="flash-player-11.2.202.243-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565987" comment="flash-player-gnome-11.2.202.336-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565988" comment="flash-player-kde4-11.2.202.336-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125262" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5262</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5262" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5262" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5262" ref_url="https://www.suse.com/security/cve/CVE-2012-5262" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1326-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0370-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5262/">CVE-2012-5262</cve>
	<bugzilla href="https://bugzilla.suse.com/784168">SUSE bug 784168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590270" comment="flash-player-11.2.202.243-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565987" comment="flash-player-gnome-11.2.202.336-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565988" comment="flash-player-kde4-11.2.202.336-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125263" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5263</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5263" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5263" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5263" ref_url="https://www.suse.com/security/cve/CVE-2012-5263" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1326-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0370-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5263/">CVE-2012-5263</cve>
	<bugzilla href="https://bugzilla.suse.com/784168">SUSE bug 784168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590270" comment="flash-player-11.2.202.243-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565987" comment="flash-player-gnome-11.2.202.336-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565988" comment="flash-player-kde4-11.2.202.336-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125264" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5264</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5264" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5264" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5264" ref_url="https://www.suse.com/security/cve/CVE-2012-5264" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1326-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0370-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5264/">CVE-2012-5264</cve>
	<bugzilla href="https://bugzilla.suse.com/784168">SUSE bug 784168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590270" comment="flash-player-11.2.202.243-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565987" comment="flash-player-gnome-11.2.202.336-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565988" comment="flash-player-kde4-11.2.202.336-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5265</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5265" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5265" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5265" ref_url="https://www.suse.com/security/cve/CVE-2012-5265" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1326-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0370-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5265/">CVE-2012-5265</cve>
	<bugzilla href="https://bugzilla.suse.com/784168">SUSE bug 784168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590270" comment="flash-player-11.2.202.243-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565987" comment="flash-player-gnome-11.2.202.336-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565988" comment="flash-player-kde4-11.2.202.336-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125266" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5266</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5266" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5266" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5266" ref_url="https://www.suse.com/security/cve/CVE-2012-5266" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1326-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0370-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5266/">CVE-2012-5266</cve>
	<bugzilla href="https://bugzilla.suse.com/784168">SUSE bug 784168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590270" comment="flash-player-11.2.202.243-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565987" comment="flash-player-gnome-11.2.202.336-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565988" comment="flash-player-kde4-11.2.202.336-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125267" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5267</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5267" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5267" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5267" ref_url="https://www.suse.com/security/cve/CVE-2012-5267" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1326-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0370-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5267/">CVE-2012-5267</cve>
	<bugzilla href="https://bugzilla.suse.com/784168">SUSE bug 784168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590270" comment="flash-player-11.2.202.243-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565987" comment="flash-player-gnome-11.2.202.336-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565988" comment="flash-player-kde4-11.2.202.336-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5268</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5268" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5268" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5268" ref_url="https://www.suse.com/security/cve/CVE-2012-5268" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1326-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0370-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5268/">CVE-2012-5268</cve>
	<bugzilla href="https://bugzilla.suse.com/784168">SUSE bug 784168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590270" comment="flash-player-11.2.202.243-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565987" comment="flash-player-gnome-11.2.202.336-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565988" comment="flash-player-kde4-11.2.202.336-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5269</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5269" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5269" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5269" ref_url="https://www.suse.com/security/cve/CVE-2012-5269" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1326-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0370-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5269/">CVE-2012-5269</cve>
	<bugzilla href="https://bugzilla.suse.com/784168">SUSE bug 784168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590270" comment="flash-player-11.2.202.243-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565987" comment="flash-player-gnome-11.2.202.336-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565988" comment="flash-player-kde4-11.2.202.336-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125270" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5270</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5270" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5270" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5270" ref_url="https://www.suse.com/security/cve/CVE-2012-5270" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1326-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0370-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5270/">CVE-2012-5270</cve>
	<bugzilla href="https://bugzilla.suse.com/784168">SUSE bug 784168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590270" comment="flash-player-11.2.202.243-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565987" comment="flash-player-gnome-11.2.202.336-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565988" comment="flash-player-kde4-11.2.202.336-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5271</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5271" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5271" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5271" ref_url="https://www.suse.com/security/cve/CVE-2012-5271" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1326-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0370-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5271/">CVE-2012-5271</cve>
	<bugzilla href="https://bugzilla.suse.com/784168">SUSE bug 784168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590270" comment="flash-player-11.2.202.243-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565987" comment="flash-player-gnome-11.2.202.336-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565988" comment="flash-player-kde4-11.2.202.336-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5272</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5272" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5272" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5272" ref_url="https://www.suse.com/security/cve/CVE-2012-5272" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1326-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0370-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5272/">CVE-2012-5272</cve>
	<bugzilla href="https://bugzilla.suse.com/784168">SUSE bug 784168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590270" comment="flash-player-11.2.202.243-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565987" comment="flash-player-gnome-11.2.202.336-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565988" comment="flash-player-kde4-11.2.202.336-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5274</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5274" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5274" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5274" ref_url="https://www.suse.com/security/cve/CVE-2012-5274" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1485-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1480-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0134-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0367-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00030.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.43 and 11.x before 11.5.502.110 on Windows and Mac OS X, before 10.3.183.43 and 11.x before 11.2.202.251 on Linux, before 11.1.111.24 on Android 2.x and 3.x, and before 11.1.115.27 on Android 4.x; Adobe AIR before 3.5.0.600; and Adobe AIR SDK before 3.5.0.600 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-5275, CVE-2012-5276, CVE-2012-5277, and CVE-2012-5280.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5274/">CVE-2012-5274</cve>
	<bugzilla href="https://bugzilla.suse.com/788450">SUSE bug 788450</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590271" comment="flash-player-11.2.202.251-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565987" comment="flash-player-gnome-11.2.202.336-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565988" comment="flash-player-kde4-11.2.202.336-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5275</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5275" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5275" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5275" ref_url="https://www.suse.com/security/cve/CVE-2012-5275" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1485-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1480-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0134-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0367-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00030.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.43 and 11.x before 11.5.502.110 on Windows and Mac OS X, before 10.3.183.43 and 11.x before 11.2.202.251 on Linux, before 11.1.111.24 on Android 2.x and 3.x, and before 11.1.115.27 on Android 4.x; Adobe AIR before 3.5.0.600; and Adobe AIR SDK before 3.5.0.600 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-5274, CVE-2012-5276, CVE-2012-5277, and CVE-2012-5280.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5275/">CVE-2012-5275</cve>
	<bugzilla href="https://bugzilla.suse.com/788450">SUSE bug 788450</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590271" comment="flash-player-11.2.202.251-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565987" comment="flash-player-gnome-11.2.202.336-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565988" comment="flash-player-kde4-11.2.202.336-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125276" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5276</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5276" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5276" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5276" ref_url="https://www.suse.com/security/cve/CVE-2012-5276" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1485-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1480-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0134-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0367-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00030.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.43 and 11.x before 11.5.502.110 on Windows and Mac OS X, before 10.3.183.43 and 11.x before 11.2.202.251 on Linux, before 11.1.111.24 on Android 2.x and 3.x, and before 11.1.115.27 on Android 4.x; Adobe AIR before 3.5.0.600; and Adobe AIR SDK before 3.5.0.600 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-5274, CVE-2012-5275, CVE-2012-5277, and CVE-2012-5280.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5276/">CVE-2012-5276</cve>
	<bugzilla href="https://bugzilla.suse.com/788450">SUSE bug 788450</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590271" comment="flash-player-11.2.202.251-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565987" comment="flash-player-gnome-11.2.202.336-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565988" comment="flash-player-kde4-11.2.202.336-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5277</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5277" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5277" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5277" ref_url="https://www.suse.com/security/cve/CVE-2012-5277" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1485-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1480-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0134-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0367-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00030.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.43 and 11.x before 11.5.502.110 on Windows and Mac OS X, before 10.3.183.43 and 11.x before 11.2.202.251 on Linux, before 11.1.111.24 on Android 2.x and 3.x, and before 11.1.115.27 on Android 4.x; Adobe AIR before 3.5.0.600; and Adobe AIR SDK before 3.5.0.600 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-5274, CVE-2012-5275, CVE-2012-5276, and CVE-2012-5280.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5277/">CVE-2012-5277</cve>
	<bugzilla href="https://bugzilla.suse.com/788450">SUSE bug 788450</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590271" comment="flash-player-11.2.202.251-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565987" comment="flash-player-gnome-11.2.202.336-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565988" comment="flash-player-kde4-11.2.202.336-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125278" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5278</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5278" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5278" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5278" ref_url="https://www.suse.com/security/cve/CVE-2012-5278" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1485-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1480-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0134-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0367-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00030.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.43 and 11.x before 11.5.502.110 on Windows and Mac OS X, before 10.3.183.43 and 11.x before 11.2.202.251 on Linux, before 11.1.111.24 on Android 2.x and 3.x, and before 11.1.115.27 on Android 4.x; Adobe AIR before 3.5.0.600; and Adobe AIR SDK before 3.5.0.600 allow attackers to bypass intended access restrictions and execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5278/">CVE-2012-5278</cve>
	<bugzilla href="https://bugzilla.suse.com/788450">SUSE bug 788450</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590271" comment="flash-player-11.2.202.251-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565987" comment="flash-player-gnome-11.2.202.336-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565988" comment="flash-player-kde4-11.2.202.336-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125279" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5279</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5279" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5279" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5279" ref_url="https://www.suse.com/security/cve/CVE-2012-5279" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1485-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1480-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0134-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0367-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00030.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.43 and 11.x before 11.5.502.110 on Windows and Mac OS X, before 10.3.183.43 and 11.x before 11.2.202.251 on Linux, before 11.1.111.24 on Android 2.x and 3.x, and before 11.1.115.27 on Android 4.x; Adobe AIR before 3.5.0.600; and Adobe AIR SDK before 3.5.0.600 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5279/">CVE-2012-5279</cve>
	<bugzilla href="https://bugzilla.suse.com/788450">SUSE bug 788450</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590271" comment="flash-player-11.2.202.251-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565987" comment="flash-player-gnome-11.2.202.336-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565988" comment="flash-player-kde4-11.2.202.336-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125280" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5280</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5280" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5280" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5280" ref_url="https://www.suse.com/security/cve/CVE-2012-5280" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1485-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1480-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0134-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0367-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00030.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.43 and 11.x before 11.5.502.110 on Windows and Mac OS X, before 10.3.183.43 and 11.x before 11.2.202.251 on Linux, before 11.1.111.24 on Android 2.x and 3.x, and before 11.1.115.27 on Android 4.x; Adobe AIR before 3.5.0.600; and Adobe AIR SDK before 3.5.0.600 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-5274, CVE-2012-5275, CVE-2012-5276, and CVE-2012-5277.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5280/">CVE-2012-5280</cve>
	<bugzilla href="https://bugzilla.suse.com/788450">SUSE bug 788450</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590271" comment="flash-player-11.2.202.251-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565987" comment="flash-player-gnome-11.2.202.336-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565988" comment="flash-player-kde4-11.2.202.336-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5468</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5468" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5468" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5468" ref_url="https://www.suse.com/security/cve/CVE-2012-5468" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1652-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00017.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in iconvert.c in the bogolexer component in Bogofilter before 1.2.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an email containing a base64 string that is decoded to incomplete multibyte characters.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5468/">CVE-2012-5468</cve>
	<bugzilla href="https://bugzilla.suse.com/792939">SUSE bug 792939</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565858" comment="bogofilter-1.1.1-174.27.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5510</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5510" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5510" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5510" ref_url="https://www.suse.com/security/cve/CVE-2012-5510" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1615-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1685-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0133-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0636-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0637-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html" source="SUSE-SU"/>
    <description>
    Xen 4.x, when downgrading the grant table version, does not properly remove the status page from the tracking list when freeing the page, which allows local guest OS administrators to cause a denial of service (hypervisor crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5510/">CVE-2012-5510</cve>
	<bugzilla href="https://bugzilla.suse.com/789945">SUSE bug 789945</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590272" comment="xen-4.1.3_06-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590273" comment="xen-doc-html-4.1.3_06-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590274" comment="xen-doc-pdf-4.1.3_06-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590275" comment="xen-kmp-default-4.1.3_06_3.0.51_0.7.9-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566197" comment="xen-kmp-pae-4.1.4_02_3.0.58_0.6.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590276" comment="xen-kmp-trace-4.1.3_06_3.0.51_0.7.9-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590277" comment="xen-libs-4.1.3_06-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590278" comment="xen-libs-32bit-4.1.3_06-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590279" comment="xen-tools-4.1.3_06-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590280" comment="xen-tools-domU-4.1.3_06-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5511</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5511" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5511" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5511" ref_url="https://www.suse.com/security/cve/CVE-2012-5511" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1615-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1685-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0133-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0636-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0637-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the dirty video RAM tracking functionality in Xen 3.4 through 4.1 allows local HVM guest OS administrators to cause a denial of service (crash) via a large bitmap image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5511/">CVE-2012-5511</cve>
	<bugzilla href="https://bugzilla.suse.com/789944">SUSE bug 789944</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590272" comment="xen-4.1.3_06-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590273" comment="xen-doc-html-4.1.3_06-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590274" comment="xen-doc-pdf-4.1.3_06-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590275" comment="xen-kmp-default-4.1.3_06_3.0.51_0.7.9-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566197" comment="xen-kmp-pae-4.1.4_02_3.0.58_0.6.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590276" comment="xen-kmp-trace-4.1.3_06_3.0.51_0.7.9-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590277" comment="xen-libs-4.1.3_06-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590278" comment="xen-libs-32bit-4.1.3_06-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590279" comment="xen-tools-4.1.3_06-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590280" comment="xen-tools-domU-4.1.3_06-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5512</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5512" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5512" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5512" ref_url="https://www.suse.com/security/cve/CVE-2012-5512" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1615-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1685-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0133-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00011.html" source="SUSE-SU"/>
    <description>
    Array index error in the HVMOP_set_mem_access handler in Xen 4.1 allows local HVM guest OS administrators to cause a denial of service (crash) or obtain sensitive information via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5512/">CVE-2012-5512</cve>
	<bugzilla href="https://bugzilla.suse.com/789940">SUSE bug 789940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590272" comment="xen-4.1.3_06-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590273" comment="xen-doc-html-4.1.3_06-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590274" comment="xen-doc-pdf-4.1.3_06-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590275" comment="xen-kmp-default-4.1.3_06_3.0.51_0.7.9-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566197" comment="xen-kmp-pae-4.1.4_02_3.0.58_0.6.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590276" comment="xen-kmp-trace-4.1.3_06_3.0.51_0.7.9-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590277" comment="xen-libs-4.1.3_06-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590278" comment="xen-libs-32bit-4.1.3_06-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590279" comment="xen-tools-4.1.3_06-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590280" comment="xen-tools-domU-4.1.3_06-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5513</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5513" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5513" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5513" ref_url="https://www.suse.com/security/cve/CVE-2012-5513" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1606-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1615-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1685-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0133-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0636-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0637-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html" source="SUSE-SU"/>
    <description>
    The XENMEM_exchange handler in Xen 4.2 and earlier does not properly check the memory address, which allows local PV guest OS administrators to cause a denial of service (crash) or possibly gain privileges via unspecified vectors that overwrite memory in the hypervisor reserved range.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5513/">CVE-2012-5513</cve>
	<bugzilla href="https://bugzilla.suse.com/789951">SUSE bug 789951</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590272" comment="xen-4.1.3_06-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590273" comment="xen-doc-html-4.1.3_06-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590274" comment="xen-doc-pdf-4.1.3_06-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590275" comment="xen-kmp-default-4.1.3_06_3.0.51_0.7.9-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566197" comment="xen-kmp-pae-4.1.4_02_3.0.58_0.6.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590276" comment="xen-kmp-trace-4.1.3_06_3.0.51_0.7.9-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590277" comment="xen-libs-4.1.3_06-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590278" comment="xen-libs-32bit-4.1.3_06-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590279" comment="xen-tools-4.1.3_06-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590280" comment="xen-tools-domU-4.1.3_06-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125514" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5514</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5514" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5514" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5514" ref_url="https://www.suse.com/security/cve/CVE-2012-5514" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1615-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1685-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0133-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0636-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0637-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html" source="SUSE-SU"/>
    <description>
    The guest_physmap_mark_populate_on_demand function in Xen 4.2 and earlier does not properly unlock the subject GFNs when checking if they are in use, which allows local guest HVM administrators to cause a denial of service (hang) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5514/">CVE-2012-5514</cve>
	<bugzilla href="https://bugzilla.suse.com/789948">SUSE bug 789948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/789988">SUSE bug 789988</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590272" comment="xen-4.1.3_06-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590273" comment="xen-doc-html-4.1.3_06-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590274" comment="xen-doc-pdf-4.1.3_06-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590275" comment="xen-kmp-default-4.1.3_06_3.0.51_0.7.9-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566197" comment="xen-kmp-pae-4.1.4_02_3.0.58_0.6.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590276" comment="xen-kmp-trace-4.1.3_06_3.0.51_0.7.9-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590277" comment="xen-libs-4.1.3_06-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590278" comment="xen-libs-32bit-4.1.3_06-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590279" comment="xen-tools-4.1.3_06-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590280" comment="xen-tools-domU-4.1.3_06-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5515</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5515" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5515" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5515" ref_url="https://www.suse.com/security/cve/CVE-2012-5515" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1606-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1615-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1685-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0133-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0636-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0637-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html" source="SUSE-SU"/>
    <description>
    The (1) XENMEM_decrease_reservation, (2) XENMEM_populate_physmap, and (3) XENMEM_exchange hypercalls in Xen 4.2 and earlier allow local guest administrators to cause a denial of service (long loop and hang) via a crafted extent_order value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5515/">CVE-2012-5515</cve>
	<bugzilla href="https://bugzilla.suse.com/789950">SUSE bug 789950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590272" comment="xen-4.1.3_06-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590273" comment="xen-doc-html-4.1.3_06-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590274" comment="xen-doc-pdf-4.1.3_06-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590275" comment="xen-kmp-default-4.1.3_06_3.0.51_0.7.9-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566197" comment="xen-kmp-pae-4.1.4_02_3.0.58_0.6.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590276" comment="xen-kmp-trace-4.1.3_06_3.0.51_0.7.9-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590277" comment="xen-libs-4.1.3_06-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590278" comment="xen-libs-32bit-4.1.3_06-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590279" comment="xen-tools-4.1.3_06-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590280" comment="xen-tools-domU-4.1.3_06-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5517</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5517" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5517" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5517" ref_url="https://www.suse.com/security/cve/CVE-2012-5517" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-December/000318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-March/000365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0925-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0927-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00064.html" source="SUSE-SU"/>
    <description>
    The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-19"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5517/">CVE-2012-5517</cve>
	<bugzilla href="https://bugzilla.suse.com/789235">SUSE bug 789235</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589408" comment="kernel-default-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589409" comment="kernel-default-base-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589410" comment="kernel-default-devel-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589411" comment="kernel-default-extra-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589412" comment="kernel-source-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589413" comment="kernel-syms-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589414" comment="kernel-trace-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589415" comment="kernel-trace-base-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589416" comment="kernel-trace-devel-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589417" comment="kernel-trace-extra-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589418" comment="kernel-xen-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589419" comment="kernel-xen-base-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589420" comment="kernel-xen-devel-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589421" comment="kernel-xen-extra-3.0.51-0.7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566052" comment="xen-kmp-default-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566054" comment="xen-kmp-trace-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5519</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5519" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5519" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5519" ref_url="https://www.suse.com/security/cve/CVE-2012-5519" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1041-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1044-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00010.html" source="SUSE-SU"/>
    <description>
    CUPS 1.4.4, when running in certain Linux distributions such as Debian GNU/Linux, stores the web interface administrator key in /var/run/cups/certs/0 using certain permissions, which allows local users in the lpadmin group to read or write arbitrary files as root by leveraging the web interface.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5519/">CVE-2012-5519</cve>
	<bugzilla href="https://bugzilla.suse.com/1180148">SUSE bug 1180148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/789566">SUSE bug 789566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882905">SUSE bug 882905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924208">SUSE bug 924208</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565904" comment="cups-1.3.9-8.46.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565905" comment="cups-client-1.3.9-8.46.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565906" comment="cups-libs-1.3.9-8.46.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565907" comment="cups-libs-32bit-1.3.9-8.46.48.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5576</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5576" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5576" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5576" ref_url="https://www.suse.com/security/cve/CVE-2012-5576" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000719.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1623-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-12/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0123-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00014.html" source="SUSE-SU"/>
    <description>
    Multiple stack-based buffer overflows in file-xwd.c in the X Window Dump (XWD) plug-in in GIMP 2.8.2 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large (1) red, (2) green, or (3) blue color mask in an XWD file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5576/">CVE-2012-5576</cve>
	<bugzilla href="https://bugzilla.suse.com/791372">SUSE bug 791372</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566574" comment="gimp-2.6.2-3.34.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566575" comment="gimp-lang-2.6.2-3.34.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566576" comment="gimp-plugins-python-2.6.2-3.34.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5581</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5581" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5581" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5581" ref_url="https://www.suse.com/security/cve/CVE-2012-5581" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-January/000333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000623.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0187-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00076.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in tif_dir.c in LibTIFF before 4.0.2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted DOTRANGE tag in a TIFF image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5581/">CVE-2012-5581</cve>
	<bugzilla href="https://bugzilla.suse.com/791607">SUSE bug 791607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854393">SUSE bug 854393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590180" comment="libtiff3-3.8.2-141.150.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590181" comment="libtiff3-32bit-3.8.2-141.150.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5592</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5592" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5592" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5592" ref_url="https://www.suse.com/security/cve/CVE-2012-5592" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-February/000338.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1633-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0151-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00042.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6052.  Reason: This candidate is a reservation duplicate of CVE-2012-6052.  Notes: All CVE users should reference CVE-2012-6052 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5592/">CVE-2012-5592</cve>
	<bugzilla href="https://bugzilla.suse.com/792005">SUSE bug 792005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590290" comment="wireshark-1.8.4-0.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5593</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5593" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5593" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5593" ref_url="https://www.suse.com/security/cve/CVE-2012-5593" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-February/000338.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1633-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0151-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00042.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6053.  Reason: This candidate is a reservation duplicate of CVE-2012-6053.  Notes: All CVE users should reference CVE-2012-6053 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5593/">CVE-2012-5593</cve>
	<bugzilla href="https://bugzilla.suse.com/792005">SUSE bug 792005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590290" comment="wireshark-1.8.4-0.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5594</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5594" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5594" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5594" ref_url="https://www.suse.com/security/cve/CVE-2012-5594" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-February/000338.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1633-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0151-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00042.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6054.  Reason: This candidate is a reservation duplicate of CVE-2012-6054.  Notes: All CVE users should reference CVE-2012-6054 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5594/">CVE-2012-5594</cve>
	<bugzilla href="https://bugzilla.suse.com/792005">SUSE bug 792005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590290" comment="wireshark-1.8.4-0.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5595</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5595" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5595" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5595" ref_url="https://www.suse.com/security/cve/CVE-2012-5595" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-February/000338.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1633-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0151-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00042.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6056.  Reason: This candidate is a reservation duplicate of CVE-2012-6056.  Notes: All CVE users should reference CVE-2012-6056 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5595/">CVE-2012-5595</cve>
	<bugzilla href="https://bugzilla.suse.com/792005">SUSE bug 792005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590290" comment="wireshark-1.8.4-0.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5596</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5596" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5596" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5596" ref_url="https://www.suse.com/security/cve/CVE-2012-5596" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-February/000338.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1633-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0151-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00042.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6057.  Reason: This candidate is a reservation duplicate of CVE-2012-6057.  Notes: All CVE users should reference CVE-2012-6057 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5596/">CVE-2012-5596</cve>
	<bugzilla href="https://bugzilla.suse.com/792005">SUSE bug 792005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590290" comment="wireshark-1.8.4-0.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5597</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5597" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5597" ref_url="https://www.suse.com/security/cve/CVE-2012-5597" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-February/000338.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1633-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0151-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00042.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6059.  Reason: This candidate is a reservation duplicate of CVE-2012-6059.  Notes: All CVE users should reference CVE-2012-6059 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5597/">CVE-2012-5597</cve>
	<bugzilla href="https://bugzilla.suse.com/792005">SUSE bug 792005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590290" comment="wireshark-1.8.4-0.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5598</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5598" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5598" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5598" ref_url="https://www.suse.com/security/cve/CVE-2012-5598" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-February/000338.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1633-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0151-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00042.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6060.  Reason: This candidate is a reservation duplicate of CVE-2012-6060.  Notes: All CVE users should reference CVE-2012-6060 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5598/">CVE-2012-5598</cve>
	<bugzilla href="https://bugzilla.suse.com/792005">SUSE bug 792005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590290" comment="wireshark-1.8.4-0.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5599</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5599" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5599" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5599" ref_url="https://www.suse.com/security/cve/CVE-2012-5599" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-February/000338.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1633-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0151-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00042.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6061.  Reason: This candidate is a reservation duplicate of CVE-2012-6061.  Notes: All CVE users should reference CVE-2012-6061 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5599/">CVE-2012-5599</cve>
	<bugzilla href="https://bugzilla.suse.com/792005">SUSE bug 792005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590290" comment="wireshark-1.8.4-0.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5600</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5600" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5600" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5600" ref_url="https://www.suse.com/security/cve/CVE-2012-5600" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-February/000338.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1633-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0151-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00042.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6062.  Reason: This candidate is a reservation duplicate of CVE-2012-6062.  Notes: All CVE users should reference CVE-2012-6062 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5600/">CVE-2012-5600</cve>
	<bugzilla href="https://bugzilla.suse.com/792005">SUSE bug 792005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590290" comment="wireshark-1.8.4-0.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5601</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5601" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5601" ref_url="https://www.suse.com/security/cve/CVE-2012-5601" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-February/000338.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1633-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0151-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00042.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6055.  Reason: This candidate is a reservation duplicate of CVE-2012-6055.  Notes: All CVE users should reference CVE-2012-6055 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5601/">CVE-2012-5601</cve>
	<bugzilla href="https://bugzilla.suse.com/792005">SUSE bug 792005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590290" comment="wireshark-1.8.4-0.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5602</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5602" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5602" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5602" ref_url="https://www.suse.com/security/cve/CVE-2012-5602" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-February/000338.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1633-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0151-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00042.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6058.  Reason: This candidate is a reservation duplicate of CVE-2012-6058.  Notes: All CVE users should reference CVE-2012-6058 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5602/">CVE-2012-5602</cve>
	<bugzilla href="https://bugzilla.suse.com/792005">SUSE bug 792005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590290" comment="wireshark-1.8.4-0.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5611</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5611" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5611" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5611" ref_url="https://www.suse.com/security/cve/CVE-2012-5611" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0262-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0013-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0014-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0135-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1412-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00010.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the acl_get function in Oracle MySQL 5.5.19 and other versions through 5.5.28, and 5.1.53 and other versions through 5.1.66, and MariaDB 5.5.2.x before 5.5.28a, 5.3.x before 5.3.11, 5.2.x before 5.2.13 and 5.1.x before 5.1.66, allows remote authenticated users to execute arbitrary code via a long argument to the GRANT FILE command.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5611/">CVE-2012-5611</cve>
	<bugzilla href="https://bugzilla.suse.com/792362">SUSE bug 792362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/792444">SUSE bug 792444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/798753">SUSE bug 798753</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566106" comment="libmysqlclient15-5.0.96-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566107" comment="libmysqlclient15-32bit-5.0.96-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566108" comment="libmysqlclient_r15-5.0.96-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566109" comment="libmysqlclient_r15-32bit-5.0.96-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566110" comment="mysql-5.0.96-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566111" comment="mysql-client-5.0.96-0.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5612</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5612" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5612" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5612" ref_url="https://www.suse.com/security/cve/CVE-2012-5612" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0262-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Oracle MySQL 5.5.19 and other versions through 5.5.28, and MariaDB 5.5.28a and possibly other versions, allows remote authenticated users to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code, as demonstrated using certain variations of the (1) USE, (2) SHOW TABLES, (3) DESCRIBE, (4) SHOW FIELDS FROM, (5) SHOW COLUMNS FROM, (6) SHOW INDEX FROM, (7) CREATE TABLE, (8) DROP TABLE, (9) ALTER TABLE, (10) DELETE FROM, (11) UPDATE, and (12) SET PASSWORD commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5612/">CVE-2012-5612</cve>
	<bugzilla href="https://bugzilla.suse.com/792443">SUSE bug 792443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/798753">SUSE bug 798753</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566106" comment="libmysqlclient15-5.0.96-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566107" comment="libmysqlclient15-32bit-5.0.96-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566108" comment="libmysqlclient_r15-5.0.96-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566109" comment="libmysqlclient_r15-32bit-5.0.96-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566110" comment="mysql-5.0.96-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566111" comment="mysql-client-5.0.96-0.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5613</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5613" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5613" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5613" ref_url="https://www.suse.com/security/cve/CVE-2012-5613" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0262-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00000.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED **  MySQL 5.5.19 and possibly other versions, and MariaDB 5.5.28a and possibly other versions, when configured to assign the FILE privilege to users who should not have administrative privileges, allows remote authenticated users to gain privileges by leveraging the FILE privilege to create files as the MySQL administrator.  NOTE: the vendor disputes this issue, stating that this is only a vulnerability when the administrator does not follow recommendations in the product's installation documentation.  NOTE: it could be argued that this should not be included in CVE because it is a configuration issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5613/">CVE-2012-5613</cve>
	<bugzilla href="https://bugzilla.suse.com/792442">SUSE bug 792442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566106" comment="libmysqlclient15-5.0.96-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566107" comment="libmysqlclient15-32bit-5.0.96-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566108" comment="libmysqlclient_r15-5.0.96-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566109" comment="libmysqlclient_r15-32bit-5.0.96-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566110" comment="mysql-5.0.96-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566111" comment="mysql-client-5.0.96-0.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5615</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5615" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5615" ref_url="https://www.suse.com/security/cve/CVE-2012-5615" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0262-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
    <description>
    Oracle MySQL 5.5.38 and earlier, 5.6.19 and earlier, and MariaDB 5.5.28a, 5.3.11, 5.2.13, 5.1.66, and possibly other versions, generates different error messages with different time delays depending on whether a user name exists, which allows remote attackers to enumerate valid usernames.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5615/">CVE-2012-5615</cve>
	<bugzilla href="https://bugzilla.suse.com/792440">SUSE bug 792440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566106" comment="libmysqlclient15-5.0.96-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566107" comment="libmysqlclient15-32bit-5.0.96-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566108" comment="libmysqlclient_r15-5.0.96-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566109" comment="libmysqlclient_r15-32bit-5.0.96-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566110" comment="mysql-5.0.96-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566111" comment="mysql-client-5.0.96-0.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590293" comment="libmysql55client18-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590294" comment="libmysql55client18-32bit-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590295" comment="libmysql55client_r18-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590296" comment="libmysql55client_r18-32bit-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590297" comment="libmysqlclient15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590298" comment="libmysqlclient15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590299" comment="libmysqlclient_r15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590300" comment="libmysqlclient_r15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590301" comment="mysql-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590302" comment="mysql-client-5.5.42-0.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5634</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5634" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5634" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5634" ref_url="https://www.suse.com/security/cve/CVE-2012-5634" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0636-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0637-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0912-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00049.html" source="SUSE-SU"/>
    <description>
    Xen 4.2.x, 4.1.x, and 4.0, when using Intel VT-d for PCI passthrough, does not properly configure VT-d when supporting a device that is behind a legacy PCI Bridge, which allows local guests to cause a denial of service to other guests by injecting an interrupt.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5634/">CVE-2012-5634</cve>
	<bugzilla href="https://bugzilla.suse.com/794316">SUSE bug 794316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/800275">SUSE bug 800275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566193" comment="xen-4.1.4_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566194" comment="xen-doc-html-4.1.4_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566195" comment="xen-doc-pdf-4.1.4_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566196" comment="xen-kmp-default-4.1.4_02_3.0.58_0.6.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566197" comment="xen-kmp-pae-4.1.4_02_3.0.58_0.6.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566198" comment="xen-kmp-trace-4.1.4_02_3.0.58_0.6.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566199" comment="xen-libs-4.1.4_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566200" comment="xen-libs-32bit-4.1.4_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566201" comment="xen-tools-4.1.4_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566202" comment="xen-tools-domU-4.1.4_02-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5656</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5656" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5656" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5656" ref_url="https://www.suse.com/security/cve/CVE-2012-5656" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-February/000355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-February/000356.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0294-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0297-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00043.html" source="SUSE-SU"/>
    <description>
    The rasterization process in Inkscape before 0.48.4 allows local users to read arbitrary files via an external entity in a SVG file, aka an XML external entity (XXE) injection attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5656/">CVE-2012-5656</cve>
	<bugzilla href="https://bugzilla.suse.com/794958">SUSE bug 794958</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566021" comment="inkscape-0.46-62.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566022" comment="inkscape-extensions-dia-0.46-62.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566023" comment="inkscape-extensions-extra-0.46-62.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566024" comment="inkscape-extensions-fig-0.46-62.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566025" comment="inkscape-extensions-gimp-0.46-62.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566026" comment="inkscape-lang-0.46-62.38.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5668</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5668" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5668" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5668" ref_url="https://www.suse.com/security/cve/CVE-2012-5668" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-January/000331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-January/000332.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0165-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0177-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0189-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00078.html" source="SUSE-SU"/>
    <description>
    FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to BDF fonts and the improper handling of an "allocation error" in the bdf_free_font function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5668/">CVE-2012-5668</cve>
	<bugzilla href="https://bugzilla.suse.com/795826">SUSE bug 795826</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565989" comment="freetype2-2.3.7-25.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565990" comment="freetype2-32bit-2.3.7-25.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565991" comment="freetype2-devel-2.3.7-25.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565992" comment="ft2demos-2.3.7-25.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5669</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5669" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5669" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5669" ref_url="https://www.suse.com/security/cve/CVE-2012-5669" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-January/000331.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0165-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0177-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0189-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00078.html" source="SUSE-SU"/>
    <description>
    The _bdf_parse_glyphs function in FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to BDF fonts and an incorrect calculation that triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5669/">CVE-2012-5669</cve>
	<bugzilla href="https://bugzilla.suse.com/795826">SUSE bug 795826</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565989" comment="freetype2-2.3.7-25.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565990" comment="freetype2-32bit-2.3.7-25.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565991" comment="freetype2-devel-2.3.7-25.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565992" comment="ft2demos-2.3.7-25.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5676</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5676" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5676" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5676" ref_url="https://www.suse.com/security/cve/CVE-2012-5676" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1643-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0139-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0368-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00033.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.48 and 11.x before 11.5.502.135 on Windows, before 10.3.183.48 and 11.x before 11.5.502.136 on Mac OS X, before 10.3.183.48 and 11.x before 11.2.202.258 on Linux, before 11.1.111.29 on Android 2.x and 3.x, and before 11.1.115.34 on Android 4.x; Adobe AIR before 3.5.0.880 on Windows and before 3.5.0.890 on Mac OS X; and Adobe AIR SDK before 3.5.0.880 on Windows and before 3.5.0.890 on Mac OS X allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5676/">CVE-2012-5676</cve>
	<bugzilla href="https://bugzilla.suse.com/794062">SUSE bug 794062</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590324" comment="flash-player-11.2.202.258-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565987" comment="flash-player-gnome-11.2.202.336-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565988" comment="flash-player-kde4-11.2.202.336-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5677</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5677" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5677" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5677" ref_url="https://www.suse.com/security/cve/CVE-2012-5677" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1643-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0139-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0368-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00033.html" source="SUSE-SU"/>
    <description>
    Integer overflow in Adobe Flash Player before 10.3.183.48 and 11.x before 11.5.502.135 on Windows, before 10.3.183.48 and 11.x before 11.5.502.136 on Mac OS X, before 10.3.183.48 and 11.x before 11.2.202.258 on Linux, before 11.1.111.29 on Android 2.x and 3.x, and before 11.1.115.34 on Android 4.x; Adobe AIR before 3.5.0.880 on Windows and before 3.5.0.890 on Mac OS X; and Adobe AIR SDK before 3.5.0.880 on Windows and before 3.5.0.890 on Mac OS X allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5677/">CVE-2012-5677</cve>
	<bugzilla href="https://bugzilla.suse.com/794062">SUSE bug 794062</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590324" comment="flash-player-11.2.202.258-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565987" comment="flash-player-gnome-11.2.202.336-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565988" comment="flash-player-kde4-11.2.202.336-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5678</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5678" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5678" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5678" ref_url="https://www.suse.com/security/cve/CVE-2012-5678" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1643-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0139-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0368-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00033.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.48 and 11.x before 11.5.502.135 on Windows, before 10.3.183.48 and 11.x before 11.5.502.136 on Mac OS X, before 10.3.183.48 and 11.x before 11.2.202.258 on Linux, before 11.1.111.29 on Android 2.x and 3.x, and before 11.1.115.34 on Android 4.x; Adobe AIR before 3.5.0.880 on Windows and before 3.5.0.890 on Mac OS X; and Adobe AIR SDK before 3.5.0.880 on Windows and before 3.5.0.890 on Mac OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5678/">CVE-2012-5678</cve>
	<bugzilla href="https://bugzilla.suse.com/794062">SUSE bug 794062</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590324" comment="flash-player-11.2.202.258-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565987" comment="flash-player-gnome-11.2.202.336-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565988" comment="flash-player-kde4-11.2.202.336-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5829</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5829" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5829" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5829" ref_url="https://www.suse.com/security/cve/CVE-2012-5829" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the nsWindow::OnExposeEvent function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5829/">CVE-2012-5829</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565943" comment="MozillaFirefox-10.0.12-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565944" comment="MozillaFirefox-translations-10.0.12-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565945" comment="libfreebl3-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565946" comment="libfreebl3-32bit-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565947" comment="mozilla-nspr-4.9.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565948" comment="mozilla-nspr-32bit-4.9.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565949" comment="mozilla-nss-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565950" comment="mozilla-nss-32bit-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565951" comment="mozilla-nss-tools-3.14.1-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5830</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5830" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5830" ref_url="https://www.suse.com/security/cve/CVE-2012-5830" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 on Mac OS X allows remote attackers to execute arbitrary code via an HTML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5830/">CVE-2012-5830</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565936" comment="MozillaFirefox-10.0.11-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565937" comment="MozillaFirefox-translations-10.0.11-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565938" comment="libfreebl3-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565939" comment="libfreebl3-32bit-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565940" comment="mozilla-nss-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565941" comment="mozilla-nss-32bit-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565942" comment="mozilla-nss-tools-3.14-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5833</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5833" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5833" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5833" ref_url="https://www.suse.com/security/cve/CVE-2012-5833" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The texImage2D implementation in the WebGL subsystem in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 does not properly interact with Mesa drivers, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via function calls involving certain values of the level parameter.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5833/">CVE-2012-5833</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565936" comment="MozillaFirefox-10.0.11-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565937" comment="MozillaFirefox-translations-10.0.11-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565938" comment="libfreebl3-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565939" comment="libfreebl3-32bit-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565940" comment="mozilla-nss-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565941" comment="mozilla-nss-32bit-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565942" comment="mozilla-nss-tools-3.14-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5835</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5835" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5835" ref_url="https://www.suse.com/security/cve/CVE-2012-5835" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the WebGL subsystem in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (invalid write operation) via crafted data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5835/">CVE-2012-5835</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565936" comment="MozillaFirefox-10.0.11-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565937" comment="MozillaFirefox-translations-10.0.11-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565938" comment="libfreebl3-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565939" comment="libfreebl3-32bit-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565940" comment="mozilla-nss-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565941" comment="mozilla-nss-32bit-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565942" comment="mozilla-nss-tools-3.14-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5836</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5836" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5836" ref_url="https://www.suse.com/security/cve/CVE-2012-5836" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving the setting of Cascading Style Sheets (CSS) properties in conjunction with SVG text.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5836/">CVE-2012-5836</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565936" comment="MozillaFirefox-10.0.11-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565937" comment="MozillaFirefox-translations-10.0.11-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565938" comment="libfreebl3-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565939" comment="libfreebl3-32bit-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565940" comment="mozilla-nss-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565941" comment="mozilla-nss-32bit-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565942" comment="mozilla-nss-tools-3.14-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5837</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5837" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5837" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5837" ref_url="https://www.suse.com/security/cve/CVE-2012-5837" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The Web Developer Toolbar in Mozilla Firefox before 17.0 executes script with chrome privileges, which allows user-assisted remote attackers to conduct cross-site scripting (XSS) attacks via a crafted string.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5837/">CVE-2012-5837</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565936" comment="MozillaFirefox-10.0.11-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565937" comment="MozillaFirefox-translations-10.0.11-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565938" comment="libfreebl3-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565939" comment="libfreebl3-32bit-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565940" comment="mozilla-nss-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565941" comment="mozilla-nss-32bit-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565942" comment="mozilla-nss-tools-3.14-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5838</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5838" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5838" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5838" ref_url="https://www.suse.com/security/cve/CVE-2012-5838" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The copyTexImage2D implementation in the WebGL subsystem in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via large image dimensions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5838/">CVE-2012-5838</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565936" comment="MozillaFirefox-10.0.11-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565937" comment="MozillaFirefox-translations-10.0.11-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565938" comment="libfreebl3-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565939" comment="libfreebl3-32bit-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565940" comment="mozilla-nss-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565941" comment="mozilla-nss-32bit-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565942" comment="mozilla-nss-tools-3.14-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5839</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5839" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5839" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5839" ref_url="https://www.suse.com/security/cve/CVE-2012-5839" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the gfxShapedWord::CompressedGlyph::IsClusterStart function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5839/">CVE-2012-5839</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565936" comment="MozillaFirefox-10.0.11-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565937" comment="MozillaFirefox-translations-10.0.11-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565938" comment="libfreebl3-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565939" comment="libfreebl3-32bit-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565940" comment="mozilla-nss-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565941" comment="mozilla-nss-32bit-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565942" comment="mozilla-nss-tools-3.14-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5840</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5840" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5840" ref_url="https://www.suse.com/security/cve/CVE-2012-5840" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsTextEditorState::PrepareEditor function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-4214.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5840/">CVE-2012-5840</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565936" comment="MozillaFirefox-10.0.11-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565937" comment="MozillaFirefox-translations-10.0.11-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565938" comment="libfreebl3-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565939" comment="libfreebl3-32bit-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565940" comment="mozilla-nss-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565941" comment="mozilla-nss-32bit-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565942" comment="mozilla-nss-tools-3.14-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5841</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5841" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5841" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5841" ref_url="https://www.suse.com/security/cve/CVE-2012-5841" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 implement cross-origin wrappers with a filtering behavior that does not properly restrict write actions, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5841/">CVE-2012-5841</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565936" comment="MozillaFirefox-10.0.11-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565937" comment="MozillaFirefox-translations-10.0.11-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565938" comment="libfreebl3-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565939" comment="libfreebl3-32bit-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565940" comment="mozilla-nss-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565941" comment="mozilla-nss-32bit-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565942" comment="mozilla-nss-tools-3.14-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5842</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5842" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5842" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5842" ref_url="https://www.suse.com/security/cve/CVE-2012-5842" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5842/">CVE-2012-5842</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565936" comment="MozillaFirefox-10.0.11-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565937" comment="MozillaFirefox-translations-10.0.11-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565938" comment="libfreebl3-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565939" comment="libfreebl3-32bit-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565940" comment="mozilla-nss-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565941" comment="mozilla-nss-32bit-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565942" comment="mozilla-nss-tools-3.14-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5843</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5843" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5843" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5843" ref_url="https://www.suse.com/security/cve/CVE-2012-5843" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5843/">CVE-2012-5843</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565936" comment="MozillaFirefox-10.0.11-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565937" comment="MozillaFirefox-translations-10.0.11-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565938" comment="libfreebl3-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565939" comment="libfreebl3-32bit-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565940" comment="mozilla-nss-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565941" comment="mozilla-nss-32bit-3.14-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565942" comment="mozilla-nss-tools-3.14-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6075</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-6075" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6075" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-6075" ref_url="https://www.suse.com/security/cve/CVE-2012-6075" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0636-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0637-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1404-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00007.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the e1000_receive function in the e1000 device driver (hw/e1000.c) in QEMU 1.3.0-rc2 and other versions, when the SBP and LPE flags are disabled, allows remote attackers to cause a denial of service (guest OS crash) and possibly execute arbitrary guest code via a large packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6075/">CVE-2012-6075</cve>
	<bugzilla href="https://bugzilla.suse.com/797523">SUSE bug 797523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/800275">SUSE bug 800275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566193" comment="xen-4.1.4_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566194" comment="xen-doc-html-4.1.4_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566195" comment="xen-doc-pdf-4.1.4_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566196" comment="xen-kmp-default-4.1.4_02_3.0.58_0.6.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566197" comment="xen-kmp-pae-4.1.4_02_3.0.58_0.6.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566198" comment="xen-kmp-trace-4.1.4_02_3.0.58_0.6.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566199" comment="xen-libs-4.1.4_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566200" comment="xen-libs-32bit-4.1.4_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566201" comment="xen-tools-4.1.4_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566202" comment="xen-tools-domU-4.1.4_02-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6076</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-6076" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6076" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-6076" ref_url="https://www.suse.com/security/cve/CVE-2012-6076" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-February/000356.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0294-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0297-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00043.html" source="SUSE-SU"/>
    <description>
    Inkscape before 0.48.4 reads .eps files from /tmp instead of the current directory, which might cause Inkspace to process unintended files, allow local users to obtain sensitive information, and possibly have other unspecified impacts.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-6076/">CVE-2012-6076</cve>
	<bugzilla href="https://bugzilla.suse.com/796306">SUSE bug 796306</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566021" comment="inkscape-0.46-62.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566022" comment="inkscape-extensions-dia-0.46-62.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566023" comment="inkscape-extensions-extra-0.46-62.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566024" comment="inkscape-extensions-fig-0.46-62.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566025" comment="inkscape-extensions-gimp-0.46-62.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566026" comment="inkscape-lang-0.46-62.38.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6085</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-6085" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6085" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-6085" ref_url="https://www.suse.com/security/cve/CVE-2012-6085" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1058-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000611.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0849-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0880-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0957-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00092.html" source="SUSE-SU"/>
    <description>
    The read_block function in g10/import.c in GnuPG 1.4.x before 1.4.13 and 2.0.x through 2.0.19, when importing a key, allows remote attackers to corrupt the public keyring database or cause a denial of service (application crash) via a crafted length field of an OpenPGP packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6085/">CVE-2012-6085</cve>
	<bugzilla href="https://bugzilla.suse.com/798465">SUSE bug 798465</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590327" comment="gpg2-2.0.9-25.33.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590328" comment="gpg2-lang-2.0.9-25.33.33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590329" comment="gpg2-2.0.9-25.33.33.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590330" comment="gpg2-lang-2.0.9-25.33.33.5 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6139</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-6139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6139" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-6139" ref_url="https://www.suse.com/security/cve/CVE-2012-6139" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000629.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0593-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00028.html" source="SUSE-SU"/>
    <description>
    libxslt before 1.1.28 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via an (1) empty match attribute in a XSL key to the xsltAddKey function in keys.c or (2) uninitialized variable to the xsltDocumentFunction function in functions.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6139/">CVE-2012-6139</cve>
	<bugzilla href="https://bugzilla.suse.com/811686">SUSE bug 811686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566146" comment="libxslt-1.1.24-19.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566147" comment="libxslt-32bit-1.1.24-19.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6150</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-6150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6150" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-6150" ref_url="https://www.suse.com/security/cve/CVE-2012-6150" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0024-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000831.html" source="SUSE-SU"/>
		<reference ref_id="TID7014420" ref_url="https://www.suse.com/support/kb/doc/?id=7014420" source="SUSE-SU"/>
		<reference ref_id="TID7016875" ref_url="https://www.suse.com/support/kb/doc/?id=7016875" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1921-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0405-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1106-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" source="SUSE-SU"/>
    <description>
    The winbind_name_list_to_sid_string_list function in nsswitch/pam_winbind.c in Samba through 4.1.2 handles invalid require_membership_of group names by accepting authentication by any user, which allows remote authenticated users to bypass intended access restrictions in opportunistic circumstances by leveraging an administrator's pam_winbind configuration-file mistake.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-6150/">CVE-2012-6150</cve>
	<bugzilla href="https://bugzilla.suse.com/844720">SUSE bug 844720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853347">SUSE bug 853347</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565877" comment="libldb1-3.6.3-0.33.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565878" comment="libldb1-32bit-3.6.3-0.33.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565879" comment="libsmbclient0-3.6.3-0.33.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565880" comment="libsmbclient0-32bit-3.6.3-0.33.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565881" comment="libtalloc1-3.4.3-1.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565882" comment="libtalloc1-32bit-3.4.3-1.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565883" comment="libtalloc2-3.6.3-0.33.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565884" comment="libtalloc2-32bit-3.6.3-0.33.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565885" comment="libtdb1-3.6.3-0.33.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565886" comment="libtdb1-32bit-3.6.3-0.33.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565887" comment="libtevent0-3.6.3-0.33.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565888" comment="libtevent0-32bit-3.6.3-0.33.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565889" comment="libwbclient0-3.6.3-0.33.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565890" comment="libwbclient0-32bit-3.6.3-0.33.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565891" comment="samba-3.6.3-0.33.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565892" comment="samba-32bit-3.6.3-0.33.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565893" comment="samba-client-3.6.3-0.33.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565894" comment="samba-client-32bit-3.6.3-0.33.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565895" comment="samba-doc-3.6.3-0.33.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565896" comment="samba-krb-printing-3.6.3-0.33.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565897" comment="samba-winbind-3.6.3-0.33.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565898" comment="samba-winbind-32bit-3.6.3-0.33.39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590340" comment="libldb1-3.6.3-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590341" comment="libldb1-32bit-3.6.3-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590342" comment="libsmbclient0-3.6.3-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590343" comment="libsmbclient0-32bit-3.6.3-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590344" comment="libtalloc2-3.6.3-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590345" comment="libtalloc2-32bit-3.6.3-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590346" comment="libtdb1-3.6.3-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590347" comment="libtdb1-32bit-3.6.3-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590348" comment="libtevent0-3.6.3-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590349" comment="libtevent0-32bit-3.6.3-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590350" comment="libwbclient0-3.6.3-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590351" comment="libwbclient0-32bit-3.6.3-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590352" comment="samba-3.6.3-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590353" comment="samba-32bit-3.6.3-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590354" comment="samba-client-3.6.3-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590355" comment="samba-client-32bit-3.6.3-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590356" comment="samba-doc-3.6.3-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590357" comment="samba-krb-printing-3.6.3-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590358" comment="samba-winbind-3.6.3-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590359" comment="samba-winbind-32bit-3.6.3-0.46.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6152</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-6152" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6152" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-6152" ref_url="https://www.suse.com/security/cve/CVE-2012-6152" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000828.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0239-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0326-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00005.html" source="SUSE-SU"/>
    <description>
    The Yahoo! protocol plugin in libpurple in Pidgin before 2.10.8 does not properly validate UTF-8 data, which allows remote attackers to cause a denial of service (application crash) via crafted byte sequences.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-6152/">CVE-2012-6152</cve>
	<bugzilla href="https://bugzilla.suse.com/861019">SUSE bug 861019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566424" comment="finch-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566425" comment="libpurple-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566426" comment="libpurple-lang-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566427" comment="libpurple-meanwhile-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566428" comment="libpurple-tcl-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566429" comment="pidgin-2.6.6-0.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6548</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-6548" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6548" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-6548" ref_url="https://www.suse.com/security/cve/CVE-2012-6548" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0759-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0759-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1187-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00018.html" source="SUSE-SU"/>
    <description>
    The udf_encode_fh function in fs/udf/namei.c in the Linux kernel before 3.6 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel heap memory via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6548/">CVE-2012-6548</cve>
	<bugzilla href="https://bugzilla.suse.com/809902">SUSE bug 809902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589566" comment="kernel-default-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589567" comment="kernel-default-base-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589568" comment="kernel-default-devel-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589569" comment="kernel-default-extra-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589570" comment="kernel-source-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589571" comment="kernel-syms-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589572" comment="kernel-trace-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589573" comment="kernel-trace-base-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589574" comment="kernel-trace-devel-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589575" comment="kernel-trace-extra-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589576" comment="kernel-xen-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589577" comment="kernel-xen-base-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589578" comment="kernel-xen-devel-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589579" comment="kernel-xen-extra-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589580" comment="xen-kmp-default-4.1.4_02_3.0.74_0.6.6-0.5.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589581" comment="xen-kmp-trace-4.1.4_02_3.0.74_0.6.6-0.5.22 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6549</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-6549" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6549" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-6549" ref_url="https://www.suse.com/security/cve/CVE-2012-6549" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0759-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0759-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1187-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00018.html" source="SUSE-SU"/>
    <description>
    The isofs_export_encode_fh function in fs/isofs/export.c in the Linux kernel before 3.6 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel heap memory via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6549/">CVE-2012-6549</cve>
	<bugzilla href="https://bugzilla.suse.com/809903">SUSE bug 809903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589566" comment="kernel-default-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589567" comment="kernel-default-base-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589568" comment="kernel-default-devel-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589569" comment="kernel-default-extra-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589570" comment="kernel-source-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589571" comment="kernel-syms-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589572" comment="kernel-trace-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589573" comment="kernel-trace-base-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589574" comment="kernel-trace-devel-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589575" comment="kernel-trace-extra-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589576" comment="kernel-xen-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589577" comment="kernel-xen-base-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589578" comment="kernel-xen-devel-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589579" comment="kernel-xen-extra-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589580" comment="xen-kmp-default-4.1.4_02_3.0.74_0.6.6-0.5.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589581" comment="xen-kmp-trace-4.1.4_02_3.0.74_0.6.6-0.5.22 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6656</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-6656" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6656" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-6656" ref_url="https://www.suse.com/security/cve/CVE-2012-6656" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1129-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001214.html" source="SUSE-SU"/>
    <description>
    iconvdata/ibm930.c in GNU C Library (aka glibc) before 2.16 allows context-dependent attackers to cause a denial of service (out-of-bounds read) via a multibyte character value of "0xffff" to the iconv function when converting IBM930 encoded data to UTF-8.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6656/">CVE-2012-6656</cve>
	<bugzilla href="https://bugzilla.suse.com/894556">SUSE bug 894556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903057">SUSE bug 903057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590449" comment="glibc-2.11.3-17.80.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590450" comment="glibc-32bit-2.11.3-17.80.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590451" comment="glibc-devel-2.11.3-17.80.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590452" comment="glibc-devel-32bit-2.11.3-17.80.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590453" comment="glibc-i18ndata-2.11.3-17.80.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590454" comment="glibc-locale-2.11.3-17.80.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590455" comment="glibc-locale-32bit-2.11.3-17.80.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590456" comment="nscd-2.11.3-17.80.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6698</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-6698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6698" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-6698" ref_url="https://www.suse.com/security/cve/CVE-2012-6698" source="SUSE CVE"/>
    <description>
    The decode_search function in dhcp.c in dhcpcd 3.x allows remote DHCP servers to cause a denial of service (out-of-bounds write) via a crafted response.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-6698/">CVE-2012-6698</cve>
	<bugzilla href="https://bugzilla.suse.com/955762">SUSE bug 955762</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566398" comment="dhcpcd-3.2.3-45.5.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6699</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-6699" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6699" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-6699" ref_url="https://www.suse.com/security/cve/CVE-2012-6699" source="SUSE CVE"/>
    <description>
    The decode_search function in dhcp.c in dhcpcd 3.x allows remote DHCP servers to cause a denial of service (out-of-bounds read) via a crafted response.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-6699/">CVE-2012-6699</cve>
	<bugzilla href="https://bugzilla.suse.com/955762">SUSE bug 955762</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566398" comment="dhcpcd-3.2.3-45.5.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126700" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6700</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-6700" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6700" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-6700" ref_url="https://www.suse.com/security/cve/CVE-2012-6700" source="SUSE CVE"/>
    <description>
    The decode_search function in dhcp.c in dhcpcd 3.x does not properly free allocated memory, which allows remote DHCP servers to cause a denial of service via a crafted response.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-6700/">CVE-2012-6700</cve>
	<bugzilla href="https://bugzilla.suse.com/955762">SUSE bug 955762</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566398" comment="dhcpcd-3.2.3-45.5.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0153</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0153" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0153" ref_url="https://www.suse.com/security/cve/CVE-2013-0153" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0636-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0637-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0912-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00049.html" source="SUSE-SU"/>
    <description>
    The AMD IOMMU support in Xen 4.2.x, 4.1.x, 3.3, and other versions, when using AMD-Vi for PCI passthrough, uses the same interrupt remapping table for the host and all guests, which allows guests to cause a denial of service by injecting an interrupt into other guests.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0153/">CVE-2013-0153</cve>
	<bugzilla href="https://bugzilla.suse.com/800275">SUSE bug 800275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/800802">SUSE bug 800802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566193" comment="xen-4.1.4_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566194" comment="xen-doc-html-4.1.4_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566195" comment="xen-doc-pdf-4.1.4_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566196" comment="xen-kmp-default-4.1.4_02_3.0.58_0.6.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566197" comment="xen-kmp-pae-4.1.4_02_3.0.58_0.6.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566198" comment="xen-kmp-trace-4.1.4_02_3.0.58_0.6.6-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566199" comment="xen-libs-4.1.4_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566200" comment="xen-libs-32bit-4.1.4_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566201" comment="xen-tools-4.1.4_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566202" comment="xen-tools-domU-4.1.4_02-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0160</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0160" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0160" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0160" ref_url="https://www.suse.com/security/cve/CVE-2013-0160" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0674-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0759-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0759-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1022-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1022-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1182-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005470.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0395-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0396-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0925-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1187-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00018.html" source="SUSE-SU"/>
    <description>
    The Linux kernel through 3.7.9 allows local users to obtain sensitive information about keystroke timing by using the inotify API on the /dev/ptmx device.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-0160/">CVE-2013-0160</cve>
	<bugzilla href="https://bugzilla.suse.com/797175">SUSE bug 797175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/841063">SUSE bug 841063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590523" comment="kernel-default-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590524" comment="kernel-default-base-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590525" comment="kernel-default-devel-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590526" comment="kernel-default-extra-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590527" comment="kernel-source-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590528" comment="kernel-syms-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590529" comment="kernel-trace-devel-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590530" comment="kernel-xen-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590531" comment="kernel-xen-base-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590532" comment="kernel-xen-devel-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590533" comment="kernel-xen-extra-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590534" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590535" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590507" comment="kernel-default-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590508" comment="kernel-default-base-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590509" comment="kernel-default-devel-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590510" comment="kernel-default-extra-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590511" comment="kernel-source-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590512" comment="kernel-syms-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590513" comment="kernel-trace-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590514" comment="kernel-trace-base-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590515" comment="kernel-trace-devel-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590516" comment="kernel-trace-extra-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590517" comment="kernel-xen-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590518" comment="kernel-xen-base-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590519" comment="kernel-xen-devel-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590520" comment="kernel-xen-extra-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590521" comment="xen-kmp-default-4.1.5_02_3.0.80_0.5-0.5.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590522" comment="xen-kmp-trace-4.1.5_02_3.0.80_0.5-0.5.5 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0166</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0166" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0166" ref_url="https://www.suse.com/security/cve/CVE-2013-0166" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-March/000399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0549-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0549-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-March/000400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1557-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001094.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0336-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0337-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0339-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before 1.0.1d does not properly perform signature verification for OCSP responses, which allows remote OCSP servers to cause a denial of service (NULL pointer dereference and application crash) via an invalid key.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0166/">CVE-2013-0166</cve>
	<bugzilla href="https://bugzilla.suse.com/802648">SUSE bug 802648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802746">SUSE bug 802746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813366">SUSE bug 813366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821818">SUSE bug 821818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833408">SUSE bug 833408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566112" comment="libopenssl0_9_8-0.9.8j-0.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566113" comment="libopenssl0_9_8-32bit-0.9.8j-0.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566114" comment="openssl-0.9.8j-0.50.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590584" comment="compat-openssl097g-0.9.7g-146.22.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590585" comment="compat-openssl097g-32bit-0.9.7g-146.22.25.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0169</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0169" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0169" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0169" ref_url="https://www.suse.com/security/cve/CVE-2013-0169" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-March/000399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0549-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0549-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-March/000400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1557-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001094.html" source="SUSE-SU"/>
		<reference ref_id="TID7017793" ref_url="https://www.suse.com/support/kb/doc/?id=7017793" source="SUSE-SU"/>
		<reference ref_id="TID7021300" ref_url="https://www.suse.com/support/kb/doc/?id=7021300" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0336-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0337-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0339-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the "Lucky Thirteen" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0169/">CVE-2013-0169</cve>
	<bugzilla href="https://bugzilla.suse.com/1070148">SUSE bug 1070148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103036">SUSE bug 1103036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103597">SUSE bug 1103597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802184">SUSE bug 802184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802648">SUSE bug 802648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802746">SUSE bug 802746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/804654">SUSE bug 804654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/809839">SUSE bug 809839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813366">SUSE bug 813366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813939">SUSE bug 813939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821818">SUSE bug 821818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977584">SUSE bug 977584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977616">SUSE bug 977616</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590584" comment="compat-openssl097g-0.9.7g-146.22.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590585" comment="compat-openssl097g-32bit-0.9.7g-146.22.25.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590590" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.3-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590591" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.3-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590592" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.3-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566112" comment="libopenssl0_9_8-0.9.8j-0.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566113" comment="libopenssl0_9_8-32bit-0.9.8j-0.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566114" comment="openssl-0.9.8j-0.50.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0170</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0170" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0170" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0170" ref_url="https://www.suse.com/security/cve/CVE-2013-0170" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0274-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0275-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00002.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the virNetMessageFree function in rpc/virnetserverclient.c in libvirt 1.0.x before 1.0.2, 0.10.2 before 0.10.2.3, 0.9.11 before 0.9.11.9, and 0.9.6 before 0.9.6.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by triggering certain errors during an RPC connection, which causes a message to be freed without being removed from the message queue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0170/">CVE-2013-0170</cve>
	<bugzilla href="https://bugzilla.suse.com/800976">SUSE bug 800976</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590601" comment="libvirt-0.9.6-0.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590602" comment="libvirt-client-0.9.6-0.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590603" comment="libvirt-client-32bit-0.9.6-0.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590604" comment="libvirt-doc-0.9.6-0.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590605" comment="libvirt-python-0.9.6-0.25.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0200</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0200" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0200" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0200" ref_url="https://www.suse.com/security/cve/CVE-2013-0200" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0188-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000717.html" source="SUSE-SU"/>
    <description>
    HP Linux Imaging and Printing (HPLIP) through 3.12.4 allows local users to overwrite arbitrary files via a symlink attack on the (1) /tmp/hpcupsfilterc_#.bmp, (2) /tmp/hpcupsfilterk_#.bmp, (3) /tmp/hpcups_job#.out, (4) /tmp/hpijs_#####.out, or (5) /tmp/hpps_job#.out temporary file, a different vulnerability than CVE-2011-2722.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-0200/">CVE-2013-0200</cve>
	<bugzilla href="https://bugzilla.suse.com/808355">SUSE bug 808355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/836937">SUSE bug 836937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852368">SUSE bug 852368</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566017" comment="hplip-3.11.10-0.6.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566018" comment="hplip-hpijs-3.11.10-0.6.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0213</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0213" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0213" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0213" ref_url="https://www.suse.com/security/cve/CVE-2013-0213" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0325-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000831.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0277-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0281-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00033.html" source="SUSE-SU"/>
    <description>
    The Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.21, 3.6.x before 3.6.12, and 4.x before 4.0.2 allows remote attackers to conduct clickjacking attacks via a (1) FRAME or (2) IFRAME element.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0213/">CVE-2013-0213</cve>
	<bugzilla href="https://bugzilla.suse.com/799641">SUSE bug 799641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/800982">SUSE bug 800982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880220">SUSE bug 880220</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590613" comment="libldb1-3.6.3-0.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590614" comment="libldb1-32bit-3.6.3-0.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590615" comment="libsmbclient0-3.6.3-0.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590616" comment="libsmbclient0-32bit-3.6.3-0.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590617" comment="libtalloc1-3.4.3-1.42.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590618" comment="libtalloc1-32bit-3.4.3-1.42.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590619" comment="libtalloc2-3.6.3-0.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590620" comment="libtalloc2-32bit-3.6.3-0.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590621" comment="libtdb1-3.6.3-0.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590622" comment="libtdb1-32bit-3.6.3-0.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590623" comment="libtevent0-3.6.3-0.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590624" comment="libtevent0-32bit-3.6.3-0.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590625" comment="libwbclient0-3.6.3-0.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590626" comment="libwbclient0-32bit-3.6.3-0.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590627" comment="samba-3.6.3-0.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590628" comment="samba-32bit-3.6.3-0.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590629" comment="samba-client-3.6.3-0.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590630" comment="samba-client-32bit-3.6.3-0.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565895" comment="samba-doc-3.6.3-0.33.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590631" comment="samba-krb-printing-3.6.3-0.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590632" comment="samba-winbind-3.6.3-0.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590633" comment="samba-winbind-32bit-3.6.3-0.30.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0214</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0214" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0214" ref_url="https://www.suse.com/security/cve/CVE-2013-0214" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0325-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000831.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0277-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0281-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00033.html" source="SUSE-SU"/>
    <description>
    Cross-site request forgery (CSRF) vulnerability in the Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.21, 3.6.x before 3.6.12, and 4.x before 4.0.2 allows remote attackers to hijack the authentication of arbitrary users by leveraging knowledge of a password and composing requests that perform SWAT actions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0214/">CVE-2013-0214</cve>
	<bugzilla href="https://bugzilla.suse.com/799641">SUSE bug 799641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880220">SUSE bug 880220</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590613" comment="libldb1-3.6.3-0.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590614" comment="libldb1-32bit-3.6.3-0.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590615" comment="libsmbclient0-3.6.3-0.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590616" comment="libsmbclient0-32bit-3.6.3-0.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590617" comment="libtalloc1-3.4.3-1.42.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590618" comment="libtalloc1-32bit-3.4.3-1.42.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590619" comment="libtalloc2-3.6.3-0.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590620" comment="libtalloc2-32bit-3.6.3-0.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590621" comment="libtdb1-3.6.3-0.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590622" comment="libtdb1-32bit-3.6.3-0.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590623" comment="libtevent0-3.6.3-0.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590624" comment="libtevent0-32bit-3.6.3-0.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590625" comment="libwbclient0-3.6.3-0.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590626" comment="libwbclient0-32bit-3.6.3-0.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590627" comment="samba-3.6.3-0.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590628" comment="samba-32bit-3.6.3-0.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590629" comment="samba-client-3.6.3-0.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590630" comment="samba-client-32bit-3.6.3-0.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565895" comment="samba-doc-3.6.3-0.33.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590631" comment="samba-krb-printing-3.6.3-0.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590632" comment="samba-winbind-3.6.3-0.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590633" comment="samba-winbind-32bit-3.6.3-0.30.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0216</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0216" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0216" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0216" ref_url="https://www.suse.com/security/cve/CVE-2013-0216" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0674-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0759-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0759-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005470.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0395-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0396-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0925-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html" source="SUSE-SU"/>
    <description>
    The Xen netback functionality in the Linux kernel before 3.7.8 allows guest OS users to cause a denial of service (loop) by triggering ring pointer corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0216/">CVE-2013-0216</cve>
	<bugzilla href="https://bugzilla.suse.com/800280">SUSE bug 800280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/800801">SUSE bug 800801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801178">SUSE bug 801178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/841063">SUSE bug 841063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589566" comment="kernel-default-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589567" comment="kernel-default-base-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589568" comment="kernel-default-devel-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589569" comment="kernel-default-extra-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589570" comment="kernel-source-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589571" comment="kernel-syms-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589572" comment="kernel-trace-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589573" comment="kernel-trace-base-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589574" comment="kernel-trace-devel-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589575" comment="kernel-trace-extra-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589576" comment="kernel-xen-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589577" comment="kernel-xen-base-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589578" comment="kernel-xen-devel-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589579" comment="kernel-xen-extra-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589580" comment="xen-kmp-default-4.1.4_02_3.0.74_0.6.6-0.5.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589581" comment="xen-kmp-trace-4.1.4_02_3.0.74_0.6.6-0.5.22 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0221</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0221" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0221" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0221" ref_url="https://www.suse.com/security/cve/CVE-2013-0221" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-September/000600.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0232-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0233-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0237-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0930-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00032.html" source="SUSE-SU"/>
    <description>
    The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the sort command, when using the (1) -d or (2) -M switch, which triggers a stack-based buffer overflow in the alloca function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0221/">CVE-2013-0221</cve>
	<bugzilla href="https://bugzilla.suse.com/798538">SUSE bug 798538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565902" comment="coreutils-8.12-6.25.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565903" comment="coreutils-lang-8.12-6.25.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0222</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0222" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0222" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0222" ref_url="https://www.suse.com/security/cve/CVE-2013-0222" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-September/000600.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0232-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0233-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0237-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0930-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00032.html" source="SUSE-SU"/>
    <description>
    The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the uniq command, which triggers a stack-based buffer overflow in the alloca function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0222/">CVE-2013-0222</cve>
	<bugzilla href="https://bugzilla.suse.com/796243">SUSE bug 796243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/798538">SUSE bug 798538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/798541">SUSE bug 798541</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565902" comment="coreutils-8.12-6.25.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565903" comment="coreutils-lang-8.12-6.25.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0223</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0223" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0223" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0223" ref_url="https://www.suse.com/security/cve/CVE-2013-0223" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-September/000600.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0232-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0233-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0237-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0930-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00032.html" source="SUSE-SU"/>
    <description>
    The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the join command, when using the -i switch, which triggers a stack-based buffer overflow in the alloca function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0223/">CVE-2013-0223</cve>
	<bugzilla href="https://bugzilla.suse.com/798538">SUSE bug 798538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/798541">SUSE bug 798541</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565902" comment="coreutils-8.12-6.25.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565903" comment="coreutils-lang-8.12-6.25.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0231</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0231" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0231" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0231" ref_url="https://www.suse.com/security/cve/CVE-2013-0231" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0674-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0759-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0759-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005470.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0395-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0396-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0925-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1619-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00063.html" source="SUSE-SU"/>
    <description>
    The pciback_enable_msi function in the PCI backend driver (drivers/xen/pciback/conf_space_capability_msi.c) in Xen for the Linux kernel 2.6.18 and 3.8 allows guest OS users with PCI device access to cause a denial of service via a large number of kernel log messages. NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0231/">CVE-2013-0231</cve>
	<bugzilla href="https://bugzilla.suse.com/801178">SUSE bug 801178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/841063">SUSE bug 841063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589566" comment="kernel-default-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589567" comment="kernel-default-base-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589568" comment="kernel-default-devel-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589569" comment="kernel-default-extra-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589570" comment="kernel-source-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589571" comment="kernel-syms-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589572" comment="kernel-trace-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589573" comment="kernel-trace-base-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589574" comment="kernel-trace-devel-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589575" comment="kernel-trace-extra-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589576" comment="kernel-xen-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589577" comment="kernel-xen-base-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589578" comment="kernel-xen-devel-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589579" comment="kernel-xen-extra-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589580" comment="xen-kmp-default-4.1.4_02_3.0.74_0.6.6-0.5.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589581" comment="xen-kmp-trace-4.1.4_02_3.0.74_0.6.6-0.5.22 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0242</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0242" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0242" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0242" ref_url="https://www.suse.com/security/cve/CVE-2013-0242" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1122-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1128-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1510-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00072.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the extend_buffers function in the regular expression matcher (posix/regexec.c) in glibc, possibly 2.17 and earlier, allows context-dependent attackers to cause a denial of service (memory corruption and crash) via crafted multibyte characters.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0242/">CVE-2013-0242</cve>
	<bugzilla href="https://bugzilla.suse.com/801246">SUSE bug 801246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/848783">SUSE bug 848783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882910">SUSE bug 882910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566000" comment="glibc-2.11.3-17.45.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566001" comment="glibc-32bit-2.11.3-17.45.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566002" comment="glibc-devel-2.11.3-17.45.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566003" comment="glibc-devel-32bit-2.11.3-17.45.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566004" comment="glibc-i18ndata-2.11.3-17.45.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566005" comment="glibc-locale-2.11.3-17.45.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566006" comment="glibc-locale-32bit-2.11.3-17.45.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566007" comment="nscd-2.11.3-17.45.49.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590138" comment="glibc-2.11.3-17.56.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590139" comment="glibc-32bit-2.11.3-17.56.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590140" comment="glibc-devel-2.11.3-17.56.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590141" comment="glibc-devel-32bit-2.11.3-17.56.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590142" comment="glibc-i18ndata-2.11.3-17.56.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590143" comment="glibc-locale-2.11.3-17.56.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590144" comment="glibc-locale-32bit-2.11.3-17.56.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590145" comment="nscd-2.11.3-17.56.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0254</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0254" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0254" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0254" ref_url="https://www.suse.com/security/cve/CVE-2013-0254" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-March/000377.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0403-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0404-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0411-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00019.html" source="SUSE-SU"/>
    <description>
    The QSharedMemory class in Qt 5.0.0, 4.8.x before 4.8.5, 4.7.x before 4.7.6, and other versions including 4.4.0 uses weak permissions (world-readable and world-writable) for shared memory segments, which allows local users to read sensitive information or modify critical program data, as demonstrated by reading a pixmap being sent to an X server.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0254/">CVE-2013-0254</cve>
	<bugzilla href="https://bugzilla.suse.com/802634">SUSE bug 802634</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566082" comment="libQtWebKit4-4.6.3-5.20.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566083" comment="libQtWebKit4-32bit-4.6.3-5.20.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566084" comment="libqt4-4.6.3-5.20.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566085" comment="libqt4-32bit-4.6.3-5.20.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566086" comment="libqt4-qt3support-4.6.3-5.20.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566087" comment="libqt4-qt3support-32bit-4.6.3-5.20.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566088" comment="libqt4-sql-4.6.3-5.20.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566089" comment="libqt4-sql-32bit-4.6.3-5.20.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566090" comment="libqt4-sql-mysql-4.6.3-5.20.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566091" comment="libqt4-sql-mysql-32bit-4.6.3-5.20.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566092" comment="libqt4-sql-postgresql-4.6.3-5.20.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566093" comment="libqt4-sql-postgresql-32bit-4.6.3-5.20.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566094" comment="libqt4-sql-sqlite-4.6.3-5.20.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566095" comment="libqt4-sql-sqlite-32bit-4.6.3-5.20.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566096" comment="libqt4-sql-unixODBC-4.6.3-5.20.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566097" comment="libqt4-sql-unixODBC-32bit-4.6.3-5.20.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566098" comment="libqt4-x11-4.6.3-5.20.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566099" comment="libqt4-x11-32bit-4.6.3-5.20.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0255</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0255" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0255" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0255" ref_url="https://www.suse.com/security/cve/CVE-2013-0255" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-March/000395.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0318-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0319-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00060.html" source="SUSE-SU"/>
    <description>
    PostgreSQL 9.2.x before 9.2.3, 9.1.x before 9.1.8, 9.0.x before 9.0.12, 8.4.x before 8.4.16, and 8.3.x before 8.3.23 does not properly declare the enum_recv function in backend/utils/adt/enum.c, which causes it to be invoked with incorrect arguments and allows remote authenticated users to cause a denial of service (server crash) or read sensitive process memory via a crafted SQL command, which triggers an array index error and an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0255/">CVE-2013-0255</cve>
	<bugzilla href="https://bugzilla.suse.com/802679">SUSE bug 802679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803057">SUSE bug 803057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590679" comment="libecpg6-9.1.8-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590680" comment="libpq5-9.1.8-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590681" comment="libpq5-32bit-9.1.8-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566175" comment="postgresql-8.3.23-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590682" comment="postgresql91-9.1.8-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0268</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0268" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0268" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0268" ref_url="https://www.suse.com/security/cve/CVE-2013-0268" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0674-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0759-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0759-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0396-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1187-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00018.html" source="SUSE-SU"/>
    <description>
    The msr_open function in arch/x86/kernel/msr.c in the Linux kernel before 3.7.6 allows local users to bypass intended capability restrictions by executing a crafted application as root, as demonstrated by msr32.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0268/">CVE-2013-0268</cve>
	<bugzilla href="https://bugzilla.suse.com/802642">SUSE bug 802642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/841063">SUSE bug 841063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589566" comment="kernel-default-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589567" comment="kernel-default-base-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589568" comment="kernel-default-devel-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589569" comment="kernel-default-extra-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589570" comment="kernel-source-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589571" comment="kernel-syms-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589572" comment="kernel-trace-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589573" comment="kernel-trace-base-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589574" comment="kernel-trace-devel-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589575" comment="kernel-trace-extra-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589576" comment="kernel-xen-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589577" comment="kernel-xen-base-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589578" comment="kernel-xen-devel-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589579" comment="kernel-xen-extra-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589580" comment="xen-kmp-default-4.1.4_02_3.0.74_0.6.6-0.5.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589581" comment="xen-kmp-trace-4.1.4_02_3.0.74_0.6.6-0.5.22 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0271</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0271" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0271" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0271" ref_url="https://www.suse.com/security/cve/CVE-2013-0271" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0405-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0511-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00041.html" source="SUSE-SU"/>
    <description>
    The MXit protocol plugin in libpurple in Pidgin before 2.10.7 might allow remote attackers to create or overwrite files via a crafted (1) mxit or (2) mxit/imagestrips pathname.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0271/">CVE-2013-0271</cve>
	<bugzilla href="https://bugzilla.suse.com/804742">SUSE bug 804742</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565913" comment="finch-2.6.6-0.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565914" comment="libpurple-2.6.6-0.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565915" comment="libpurple-lang-2.6.6-0.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565916" comment="libpurple-meanwhile-2.6.6-0.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565917" comment="libpurple-tcl-2.6.6-0.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565918" comment="pidgin-2.6.6-0.19.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0272</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0272" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0272" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0272" ref_url="https://www.suse.com/security/cve/CVE-2013-0272" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0405-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0511-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00041.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in http.c in the MXit protocol plugin in libpurple in Pidgin before 2.10.7 allows remote servers to execute arbitrary code via a long HTTP header.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0272/">CVE-2013-0272</cve>
	<bugzilla href="https://bugzilla.suse.com/804742">SUSE bug 804742</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565913" comment="finch-2.6.6-0.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565914" comment="libpurple-2.6.6-0.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565915" comment="libpurple-lang-2.6.6-0.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565916" comment="libpurple-meanwhile-2.6.6-0.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565917" comment="libpurple-tcl-2.6.6-0.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565918" comment="pidgin-2.6.6-0.19.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0273</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0273" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0273" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0273" ref_url="https://www.suse.com/security/cve/CVE-2013-0273" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0405-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0511-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00041.html" source="SUSE-SU"/>
    <description>
    sametime.c in the Sametime protocol plugin in libpurple in Pidgin before 2.10.7 does not properly terminate long user IDs, which allows remote servers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0273/">CVE-2013-0273</cve>
	<bugzilla href="https://bugzilla.suse.com/804742">SUSE bug 804742</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565913" comment="finch-2.6.6-0.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565914" comment="libpurple-2.6.6-0.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565915" comment="libpurple-lang-2.6.6-0.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565916" comment="libpurple-meanwhile-2.6.6-0.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565917" comment="libpurple-tcl-2.6.6-0.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565918" comment="pidgin-2.6.6-0.19.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0274</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0274" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0274" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0274" ref_url="https://www.suse.com/security/cve/CVE-2013-0274" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0405-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0511-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00041.html" source="SUSE-SU"/>
    <description>
    upnp.c in libpurple in Pidgin before 2.10.7 does not properly terminate long strings in UPnP responses, which allows remote attackers to cause a denial of service (application crash) by leveraging access to the local network.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0274/">CVE-2013-0274</cve>
	<bugzilla href="https://bugzilla.suse.com/804742">SUSE bug 804742</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565913" comment="finch-2.6.6-0.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565914" comment="libpurple-2.6.6-0.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565915" comment="libpurple-lang-2.6.6-0.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565916" comment="libpurple-meanwhile-2.6.6-0.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565917" comment="libpurple-tcl-2.6.6-0.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565918" comment="pidgin-2.6.6-0.19.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0311</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0311" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0311" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0311" ref_url="https://www.suse.com/security/cve/CVE-2013-0311" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0759-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0759-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1187-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00018.html" source="SUSE-SU"/>
    <description>
    The translate_desc function in drivers/vhost/vhost.c in the Linux kernel before 3.7 does not properly handle cross-region descriptors, which allows guest OS users to obtain host OS privileges by leveraging KVM guest OS privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0311/">CVE-2013-0311</cve>
	<bugzilla href="https://bugzilla.suse.com/804656">SUSE bug 804656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589566" comment="kernel-default-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589567" comment="kernel-default-base-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589568" comment="kernel-default-devel-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589569" comment="kernel-default-extra-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589570" comment="kernel-source-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589571" comment="kernel-syms-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589572" comment="kernel-trace-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589573" comment="kernel-trace-base-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589574" comment="kernel-trace-devel-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589575" comment="kernel-trace-extra-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589576" comment="kernel-xen-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589577" comment="kernel-xen-base-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589578" comment="kernel-xen-devel-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589579" comment="kernel-xen-extra-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589580" comment="xen-kmp-default-4.1.4_02_3.0.74_0.6.6-0.5.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589581" comment="xen-kmp-trace-4.1.4_02_3.0.74_0.6.6-0.5.22 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130338" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0338</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0338" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0338" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0338" ref_url="https://www.suse.com/security/cve/CVE-2013-0338" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1627-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0552-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00112.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0555-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00114.html" source="SUSE-SU"/>
    <description>
    libxml2 2.9.0 and earlier allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via an XML file containing an entity declaration with long replacement text and many references to this entity, aka "internal entity expansion" with linear complexity.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0338/">CVE-2013-0338</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/805233">SUSE bug 805233</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590708" comment="libxml2-2.7.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590709" comment="libxml2-32bit-2.7.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590710" comment="libxml2-python-2.7.6-0.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0339</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0339" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0339" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0339" ref_url="https://www.suse.com/security/cve/CVE-2013-0339" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1627-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00002.html" source="SUSE-SU"/>
    <description>
    libxml2 through 2.9.1 does not properly handle external entities expansion unless an application developer uses the xmlSAX2ResolveEntity or xmlSetExternalEntityLoader function, which allows remote attackers to cause a denial of service (resource consumption), send HTTP requests to intranet servers, or read arbitrary files via a crafted XML document, aka an XML External Entity (XXE) issue.  NOTE: it could be argued that because libxml2 already provides the ability to disable external entity expansion, the responsibility for resolving this issue lies with application developers; according to this argument, this entry should be REJECTed and each affected application would need its own CVE.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0339/">CVE-2013-0339</cve>
	<bugzilla href="https://bugzilla.suse.com/805233">SUSE bug 805233</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590708" comment="libxml2-2.7.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590709" comment="libxml2-32bit-2.7.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590710" comment="libxml2-python-2.7.6-0.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0349</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0349" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0349" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0349" ref_url="https://www.suse.com/security/cve/CVE-2013-0349" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0759-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0759-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
    <description>
    The hidp_setup_hid function in net/bluetooth/hidp/core.c in the Linux kernel before 3.7.6 does not properly copy a certain name field, which allows local users to obtain sensitive information from kernel memory by setting a long name and making an HIDPCONNADD ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0349/">CVE-2013-0349</cve>
	<bugzilla href="https://bugzilla.suse.com/805227">SUSE bug 805227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589566" comment="kernel-default-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589567" comment="kernel-default-base-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589568" comment="kernel-default-devel-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589569" comment="kernel-default-extra-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589570" comment="kernel-source-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589571" comment="kernel-syms-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589572" comment="kernel-trace-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589573" comment="kernel-trace-base-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589574" comment="kernel-trace-devel-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589575" comment="kernel-trace-extra-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589576" comment="kernel-xen-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589577" comment="kernel-xen-base-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589578" comment="kernel-xen-devel-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589579" comment="kernel-xen-extra-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589580" comment="xen-kmp-default-4.1.4_02_3.0.74_0.6.6-0.5.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589581" comment="xen-kmp-trace-4.1.4_02_3.0.74_0.6.6-0.5.22 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0401</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0401" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0401" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0401" ref_url="https://www.suse.com/security/cve/CVE-2013-0401" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0745-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0777-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0964-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0993-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00129.html" source="SUSE-SU"/>
    <description>
    The Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to execute arbitrary code via vectors related to AWT, as demonstrated by Ben Murphy during a Pwn2Own competition at CanSecWest 2013.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to invocation of the system class loader by the sun.awt.datatransfer.ClassLoaderObjectInputStream class, which allows remote attackers to bypass Java sandbox restrictions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0401/">CVE-2013-0401</cve>
	<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590718" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590719" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590720" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.5-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0424</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0424" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0424" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0424" ref_url="https://www.suse.com/security/cve/CVE-2013-0424" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 7, allows remote attackers to affect integrity via vectors related to RMI. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to cross-site scripting (XSS) in the sun.rmi.transport.proxy CGIHandler class that does not properly handle error messages in a (1) command or (2) port number.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0424/">CVE-2013-0424</cve>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590731" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.2-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590732" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.2-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590733" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.2-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0425</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0425" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0425" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0425" ref_url="https://www.suse.com/security/cve/CVE-2013-0425" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0428 and CVE-2013-0426.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect "access control checks" in the logging API that allow remote attackers to bypass Java sandbox restrictions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0425/">CVE-2013-0425</cve>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590731" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.2-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590732" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.2-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590733" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.2-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0426</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0426" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0426" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0426" ref_url="https://www.suse.com/security/cve/CVE-2013-0426" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0425 and CVE-2013-0428.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect "access control checks" in the logging API that allow remote attackers to bypass Java sandbox restrictions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0426/">CVE-2013-0426</cve>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590731" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.2-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590732" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.2-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590733" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.2-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0427</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0427" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0427" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0427" ref_url="https://www.suse.com/security/cve/CVE-2013-0427" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect integrity via unknown vectors related to Libraries.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to interrupt certain threads that should not be interrupted.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0427/">CVE-2013-0427</cve>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590731" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.2-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590732" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.2-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590733" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.2-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0428</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0428" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0428" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0428" ref_url="https://www.suse.com/security/cve/CVE-2013-0428" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0425 and CVE-2013-0426.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "incorrect checks for proxy classes" in the Reflection API.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0428/">CVE-2013-0428</cve>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590731" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.2-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590732" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.2-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590733" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.2-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0429</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0429" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0429" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0429" ref_url="https://www.suse.com/security/cve/CVE-2013-0429" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue involves the creation of a single PresentationManager that is shared across multiple thread groups, which allows remote attackers to bypass Java sandbox restrictions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0429/">CVE-2013-0429</cve>
	<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590731" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.2-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590732" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.2-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590733" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.2-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0432</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0432" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0432" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0432" ref_url="https://www.suse.com/security/cve/CVE-2013-0432" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality and integrity via vectors related to AWT.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "insufficient clipboard access premission checks."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0432/">CVE-2013-0432</cve>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590731" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.2-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590732" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.2-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590733" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.2-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0433</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0433" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0433" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0433" ref_url="https://www.suse.com/security/cve/CVE-2013-0433" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect integrity via unknown vectors related to Networking.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to avoid triggering an exception during the deserialization of invalid InetSocketAddress data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0433/">CVE-2013-0433</cve>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590731" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.2-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590732" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.2-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590733" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.2-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0434</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0434" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0434" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0434" ref_url="https://www.suse.com/security/cve/CVE-2013-0434" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality via vectors related to JAXP.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to the public declaration of the loadPropertyFile method in the JAXP FuncSystemProperty class, which allows remote attackers to obtain sensitive information.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0434/">CVE-2013-0434</cve>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590731" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.2-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590732" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.2-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590733" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.2-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0435</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0435" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0435" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0435" ref_url="https://www.suse.com/security/cve/CVE-2013-0435" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality via vectors related to JAX-WS.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper restriction of com.sun.xml.internal packages and "Better handling of UI elements."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0435/">CVE-2013-0435</cve>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590731" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.2-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590732" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.2-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590733" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.2-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0440</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0440" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0440" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0440" ref_url="https://www.suse.com/security/cve/CVE-2013-0440" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 7, allows remote attackers to affect availability via vectors related to JSSE.  NOTE: the previous information is from the February 2013 CPU.  Oracle has not commented on claims from another vendor that this issue is related to CPU consumption in the SSL/TLS implementation via a large number of ClientHello packets that are not properly handled by (1) ClientHandshaker.java and (2) ServerHandshaker.java.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0440/">CVE-2013-0440</cve>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590731" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.2-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590732" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.2-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590733" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.2-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0441</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0441" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0441" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0441" ref_url="https://www.suse.com/security/cve/CVE-2013-0441" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2013-1476 and CVE-2013-1475.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass Java sandbox restrictions via certain methods that should not be serialized, aka "missing serialization restriction."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0441/">CVE-2013-0441</cve>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590731" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.2-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590732" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.2-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590733" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.2-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0442</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0442" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0442" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0442" ref_url="https://www.suse.com/security/cve/CVE-2013-0442" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to an improper check of "privileges of the code" that bypasses the sandbox.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0442/">CVE-2013-0442</cve>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590731" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.2-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590732" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.2-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590733" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.2-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0443</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0443" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0443" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0443" ref_url="https://www.suse.com/security/cve/CVE-2013-0443" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality and integrity via vectors related to JSSE.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect validation of Diffie-Hellman keys, which allows remote attackers to conduct a "small subgroup attack" to force the use of weak session keys or obtain sensitive information about the private key.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0443/">CVE-2013-0443</cve>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590731" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.2-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590732" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.2-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590733" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.2-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0450</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0450" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0450" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0450" ref_url="https://www.suse.com/security/cve/CVE-2013-0450" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper checks of "access control context" in the JMX RequiredModelMBean class.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0450/">CVE-2013-0450</cve>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590731" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.2-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590732" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.2-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590733" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.2-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0504</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0504" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0504" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0504" ref_url="https://www.suse.com/security/cve/CVE-2013-0504" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0359-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00012.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the broker service in Adobe Flash Player before 10.3.183.67 and 11.x before 11.6.602.171 on Windows and Mac OS X, and before 10.3.183.67 and 11.x before 11.2.202.273 on Linux, allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0504/">CVE-2013-0504</cve>
	<bugzilla href="https://bugzilla.suse.com/806415">SUSE bug 806415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/867808">SUSE bug 867808</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590738" comment="flash-player-11.2.202.273-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590739" comment="flash-player-gnome-11.2.202.273-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590740" comment="flash-player-kde4-11.2.202.273-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0601</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0601" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0601" ref_url="https://www.suse.com/security/cve/CVE-2013-0601" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0047-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0138-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0193-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0363-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00083.html" source="SUSE-SU"/>
    <description>
    Adobe Reader and Acrobat 9.x before 9.5.3, 10.x before 10.1.5, and 11.x before 11.0.1 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-1530, CVE-2013-0605, CVE-2013-0616, CVE-2013-0619, CVE-2013-0620, and CVE-2013-0623.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0601/">CVE-2013-0601</cve>
	<bugzilla href="https://bugzilla.suse.com/797529">SUSE bug 797529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589376" comment="acroread-9.5.3-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589377" comment="acroread-cmaps-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589378" comment="acroread-fonts-ja-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589379" comment="acroread-fonts-ko-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589380" comment="acroread-fonts-zh_CN-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589381" comment="acroread-fonts-zh_TW-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565854" comment="acroread_ja-9.4.2-0.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0602</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0602" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0602" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0602" ref_url="https://www.suse.com/security/cve/CVE-2013-0602" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0047-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0138-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0193-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0363-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00083.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Reader and Acrobat 9.x before 9.5.3, 10.x before 10.1.5, and 11.x before 11.0.1 allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0602/">CVE-2013-0602</cve>
	<bugzilla href="https://bugzilla.suse.com/797529">SUSE bug 797529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589376" comment="acroread-9.5.3-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589377" comment="acroread-cmaps-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589378" comment="acroread-fonts-ja-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589379" comment="acroread-fonts-ko-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589380" comment="acroread-fonts-zh_CN-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589381" comment="acroread-fonts-zh_TW-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565854" comment="acroread_ja-9.4.2-0.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130603" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0603</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0603" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0603" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0603" ref_url="https://www.suse.com/security/cve/CVE-2013-0603" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0047-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0138-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0193-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0363-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00083.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Adobe Reader and Acrobat 9.x before 9.5.3, 10.x before 10.1.5, and 11.x before 11.0.1 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-0604.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0603/">CVE-2013-0603</cve>
	<bugzilla href="https://bugzilla.suse.com/797529">SUSE bug 797529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589376" comment="acroread-9.5.3-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589377" comment="acroread-cmaps-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589378" comment="acroread-fonts-ja-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589379" comment="acroread-fonts-ko-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589380" comment="acroread-fonts-zh_CN-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589381" comment="acroread-fonts-zh_TW-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565854" comment="acroread_ja-9.4.2-0.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130604" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0604</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0604" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0604" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0604" ref_url="https://www.suse.com/security/cve/CVE-2013-0604" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0047-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0138-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0193-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0363-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00083.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Adobe Reader and Acrobat 9.x before 9.5.3, 10.x before 10.1.5, and 11.x before 11.0.1 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-0603.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0604/">CVE-2013-0604</cve>
	<bugzilla href="https://bugzilla.suse.com/797529">SUSE bug 797529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589376" comment="acroread-9.5.3-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589377" comment="acroread-cmaps-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589378" comment="acroread-fonts-ja-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589379" comment="acroread-fonts-ko-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589380" comment="acroread-fonts-zh_CN-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589381" comment="acroread-fonts-zh_TW-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565854" comment="acroread_ja-9.4.2-0.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0605</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0605" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0605" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0605" ref_url="https://www.suse.com/security/cve/CVE-2013-0605" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0047-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0138-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0193-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0363-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00083.html" source="SUSE-SU"/>
    <description>
    Adobe Reader and Acrobat 9.x before 9.5.3, 10.x before 10.1.5, and 11.x before 11.0.1 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-1530, CVE-2013-0601, CVE-2013-0616, CVE-2013-0619, CVE-2013-0620, and CVE-2013-0623.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0605/">CVE-2013-0605</cve>
	<bugzilla href="https://bugzilla.suse.com/797529">SUSE bug 797529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589376" comment="acroread-9.5.3-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589377" comment="acroread-cmaps-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589378" comment="acroread-fonts-ja-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589379" comment="acroread-fonts-ko-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589380" comment="acroread-fonts-zh_CN-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589381" comment="acroread-fonts-zh_TW-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565854" comment="acroread_ja-9.4.2-0.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130606" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0606</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0606" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0606" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0606" ref_url="https://www.suse.com/security/cve/CVE-2013-0606" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0047-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0138-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0193-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0363-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00083.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Reader and Acrobat 9.x before 9.5.3, 10.x before 10.1.5, and 11.x before 11.0.1 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-0612, CVE-2013-0615, CVE-2013-0617, and CVE-2013-0621.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0606/">CVE-2013-0606</cve>
	<bugzilla href="https://bugzilla.suse.com/797529">SUSE bug 797529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589376" comment="acroread-9.5.3-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589377" comment="acroread-cmaps-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589378" comment="acroread-fonts-ja-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589379" comment="acroread-fonts-ko-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589380" comment="acroread-fonts-zh_CN-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589381" comment="acroread-fonts-zh_TW-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565854" comment="acroread_ja-9.4.2-0.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0607</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0607" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0607" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0607" ref_url="https://www.suse.com/security/cve/CVE-2013-0607" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0047-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0138-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0193-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0363-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00083.html" source="SUSE-SU"/>
    <description>
    Adobe Reader and Acrobat 9.x before 9.5.3, 10.x before 10.1.5, and 11.x before 11.0.1 allow attackers to execute arbitrary code via unspecified vectors, related to a "logic error," a different vulnerability than CVE-2013-0608, CVE-2013-0611, CVE-2013-0614, and CVE-2013-0618.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0607/">CVE-2013-0607</cve>
	<bugzilla href="https://bugzilla.suse.com/797529">SUSE bug 797529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589376" comment="acroread-9.5.3-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589377" comment="acroread-cmaps-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589378" comment="acroread-fonts-ja-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589379" comment="acroread-fonts-ko-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589380" comment="acroread-fonts-zh_CN-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589381" comment="acroread-fonts-zh_TW-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565854" comment="acroread_ja-9.4.2-0.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0608</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0608" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0608" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0608" ref_url="https://www.suse.com/security/cve/CVE-2013-0608" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0047-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0138-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0193-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0363-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00083.html" source="SUSE-SU"/>
    <description>
    Adobe Reader and Acrobat 9.x before 9.5.3, 10.x before 10.1.5, and 11.x before 11.0.1 allow attackers to execute arbitrary code via unspecified vectors, related to a "logic error," a different vulnerability than CVE-2013-0607, CVE-2013-0611, CVE-2013-0614, and CVE-2013-0618.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0608/">CVE-2013-0608</cve>
	<bugzilla href="https://bugzilla.suse.com/797529">SUSE bug 797529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589376" comment="acroread-9.5.3-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589377" comment="acroread-cmaps-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589378" comment="acroread-fonts-ja-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589379" comment="acroread-fonts-ko-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589380" comment="acroread-fonts-zh_CN-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589381" comment="acroread-fonts-zh_TW-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565854" comment="acroread_ja-9.4.2-0.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0609</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0609" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0609" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0609" ref_url="https://www.suse.com/security/cve/CVE-2013-0609" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0047-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0138-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0193-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0363-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00083.html" source="SUSE-SU"/>
    <description>
    Integer overflow in Adobe Reader and Acrobat 9.x before 9.5.3, 10.x before 10.1.5, and 11.x before 11.0.1 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-0613.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0609/">CVE-2013-0609</cve>
	<bugzilla href="https://bugzilla.suse.com/797529">SUSE bug 797529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589376" comment="acroread-9.5.3-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589377" comment="acroread-cmaps-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589378" comment="acroread-fonts-ja-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589379" comment="acroread-fonts-ko-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589380" comment="acroread-fonts-zh_CN-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589381" comment="acroread-fonts-zh_TW-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565854" comment="acroread_ja-9.4.2-0.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0610</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0610" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0610" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0610" ref_url="https://www.suse.com/security/cve/CVE-2013-0610" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0047-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0138-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0193-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0363-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00083.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in Adobe Reader and Acrobat 9.x before 9.5.3, 10.x before 10.1.5, and 11.x before 11.0.1 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-0626.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0610/">CVE-2013-0610</cve>
	<bugzilla href="https://bugzilla.suse.com/797529">SUSE bug 797529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589376" comment="acroread-9.5.3-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589377" comment="acroread-cmaps-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589378" comment="acroread-fonts-ja-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589379" comment="acroread-fonts-ko-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589380" comment="acroread-fonts-zh_CN-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589381" comment="acroread-fonts-zh_TW-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565854" comment="acroread_ja-9.4.2-0.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0611</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0611" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0611" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0611" ref_url="https://www.suse.com/security/cve/CVE-2013-0611" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0047-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0138-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0193-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0363-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00083.html" source="SUSE-SU"/>
    <description>
    Adobe Reader and Acrobat 9.x before 9.5.3, 10.x before 10.1.5, and 11.x before 11.0.1 allow attackers to execute arbitrary code via unspecified vectors, related to a "logic error," a different vulnerability than CVE-2013-0607, CVE-2013-0608, CVE-2013-0614, and CVE-2013-0618.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0611/">CVE-2013-0611</cve>
	<bugzilla href="https://bugzilla.suse.com/797529">SUSE bug 797529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589376" comment="acroread-9.5.3-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589377" comment="acroread-cmaps-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589378" comment="acroread-fonts-ja-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589379" comment="acroread-fonts-ko-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589380" comment="acroread-fonts-zh_CN-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589381" comment="acroread-fonts-zh_TW-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565854" comment="acroread_ja-9.4.2-0.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0612</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0612" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0612" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0612" ref_url="https://www.suse.com/security/cve/CVE-2013-0612" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0047-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0138-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0193-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0363-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00083.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Reader and Acrobat 9.x before 9.5.3, 10.x before 10.1.5, and 11.x before 11.0.1 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-0606, CVE-2013-0615, CVE-2013-0617, and CVE-2013-0621.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0612/">CVE-2013-0612</cve>
	<bugzilla href="https://bugzilla.suse.com/797529">SUSE bug 797529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589376" comment="acroread-9.5.3-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589377" comment="acroread-cmaps-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589378" comment="acroread-fonts-ja-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589379" comment="acroread-fonts-ko-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589380" comment="acroread-fonts-zh_CN-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589381" comment="acroread-fonts-zh_TW-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565854" comment="acroread_ja-9.4.2-0.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0613</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0613" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0613" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0613" ref_url="https://www.suse.com/security/cve/CVE-2013-0613" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0047-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0138-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0193-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0363-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00083.html" source="SUSE-SU"/>
    <description>
    Integer overflow in Adobe Reader and Acrobat 9.x before 9.5.3, 10.x before 10.1.5, and 11.x before 11.0.1 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-0609.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0613/">CVE-2013-0613</cve>
	<bugzilla href="https://bugzilla.suse.com/797529">SUSE bug 797529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589376" comment="acroread-9.5.3-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589377" comment="acroread-cmaps-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589378" comment="acroread-fonts-ja-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589379" comment="acroread-fonts-ko-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589380" comment="acroread-fonts-zh_CN-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589381" comment="acroread-fonts-zh_TW-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565854" comment="acroread_ja-9.4.2-0.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0614</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0614" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0614" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0614" ref_url="https://www.suse.com/security/cve/CVE-2013-0614" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0047-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0138-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0193-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0363-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00083.html" source="SUSE-SU"/>
    <description>
    Adobe Reader and Acrobat 9.x before 9.5.3, 10.x before 10.1.5, and 11.x before 11.0.1 allow attackers to execute arbitrary code via unspecified vectors, related to a "logic error," a different vulnerability than CVE-2013-0607, CVE-2013-0608, CVE-2013-0611, and CVE-2013-0618.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0614/">CVE-2013-0614</cve>
	<bugzilla href="https://bugzilla.suse.com/797529">SUSE bug 797529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589376" comment="acroread-9.5.3-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589377" comment="acroread-cmaps-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589378" comment="acroread-fonts-ja-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589379" comment="acroread-fonts-ko-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589380" comment="acroread-fonts-zh_CN-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589381" comment="acroread-fonts-zh_TW-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565854" comment="acroread_ja-9.4.2-0.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0615</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0615" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0615" ref_url="https://www.suse.com/security/cve/CVE-2013-0615" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0047-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0138-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0193-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0363-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00083.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Reader and Acrobat 9.x before 9.5.3, 10.x before 10.1.5, and 11.x before 11.0.1 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-0606, CVE-2013-0612, CVE-2013-0617, and CVE-2013-0621.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0615/">CVE-2013-0615</cve>
	<bugzilla href="https://bugzilla.suse.com/797529">SUSE bug 797529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589376" comment="acroread-9.5.3-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589377" comment="acroread-cmaps-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589378" comment="acroread-fonts-ja-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589379" comment="acroread-fonts-ko-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589380" comment="acroread-fonts-zh_CN-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589381" comment="acroread-fonts-zh_TW-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565854" comment="acroread_ja-9.4.2-0.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0616</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0616" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0616" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0616" ref_url="https://www.suse.com/security/cve/CVE-2013-0616" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0047-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0138-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0193-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0363-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00083.html" source="SUSE-SU"/>
    <description>
    Adobe Reader and Acrobat 9.x before 9.5.3, 10.x before 10.1.5, and 11.x before 11.0.1 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-1530, CVE-2013-0601, CVE-2013-0605, CVE-2013-0619, CVE-2013-0620, and CVE-2013-0623.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0616/">CVE-2013-0616</cve>
	<bugzilla href="https://bugzilla.suse.com/797529">SUSE bug 797529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589376" comment="acroread-9.5.3-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589377" comment="acroread-cmaps-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589378" comment="acroread-fonts-ja-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589379" comment="acroread-fonts-ko-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589380" comment="acroread-fonts-zh_CN-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589381" comment="acroread-fonts-zh_TW-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565854" comment="acroread_ja-9.4.2-0.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0617</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0617" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0617" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0617" ref_url="https://www.suse.com/security/cve/CVE-2013-0617" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0047-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0138-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0193-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0363-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00083.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Reader and Acrobat 9.x before 9.5.3, 10.x before 10.1.5, and 11.x before 11.0.1 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-0606, CVE-2013-0612, CVE-2013-0615, and CVE-2013-0621.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0617/">CVE-2013-0617</cve>
	<bugzilla href="https://bugzilla.suse.com/797529">SUSE bug 797529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589376" comment="acroread-9.5.3-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589377" comment="acroread-cmaps-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589378" comment="acroread-fonts-ja-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589379" comment="acroread-fonts-ko-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589380" comment="acroread-fonts-zh_CN-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589381" comment="acroread-fonts-zh_TW-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565854" comment="acroread_ja-9.4.2-0.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0618</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0618" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0618" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0618" ref_url="https://www.suse.com/security/cve/CVE-2013-0618" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0047-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0138-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0193-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0363-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00083.html" source="SUSE-SU"/>
    <description>
    Adobe Reader and Acrobat 9.x before 9.5.3, 10.x before 10.1.5, and 11.x before 11.0.1 allow attackers to execute arbitrary code via unspecified vectors, related to a "logic error," a different vulnerability than CVE-2013-0607, CVE-2013-0608, CVE-2013-0611, and CVE-2013-0614.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0618/">CVE-2013-0618</cve>
	<bugzilla href="https://bugzilla.suse.com/797529">SUSE bug 797529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589376" comment="acroread-9.5.3-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589377" comment="acroread-cmaps-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589378" comment="acroread-fonts-ja-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589379" comment="acroread-fonts-ko-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589380" comment="acroread-fonts-zh_CN-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589381" comment="acroread-fonts-zh_TW-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565854" comment="acroread_ja-9.4.2-0.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0619</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0619" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0619" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0619" ref_url="https://www.suse.com/security/cve/CVE-2013-0619" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0047-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0138-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0193-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0363-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00083.html" source="SUSE-SU"/>
    <description>
    Adobe Reader and Acrobat 9.x before 9.5.3, 10.x before 10.1.5, and 11.x before 11.0.1 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-1530, CVE-2013-0601, CVE-2013-0605, CVE-2013-0616, CVE-2013-0620, and CVE-2013-0623.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0619/">CVE-2013-0619</cve>
	<bugzilla href="https://bugzilla.suse.com/797529">SUSE bug 797529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589376" comment="acroread-9.5.3-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589377" comment="acroread-cmaps-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589378" comment="acroread-fonts-ja-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589379" comment="acroread-fonts-ko-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589380" comment="acroread-fonts-zh_CN-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589381" comment="acroread-fonts-zh_TW-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565854" comment="acroread_ja-9.4.2-0.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0620</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0620" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0620" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0620" ref_url="https://www.suse.com/security/cve/CVE-2013-0620" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0047-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0138-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0193-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0363-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00083.html" source="SUSE-SU"/>
    <description>
    Adobe Reader and Acrobat 9.x before 9.5.3, 10.x before 10.1.5, and 11.x before 11.0.1 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-1530, CVE-2013-0601, CVE-2013-0605, CVE-2013-0616, CVE-2013-0619, and CVE-2013-0623.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0620/">CVE-2013-0620</cve>
	<bugzilla href="https://bugzilla.suse.com/797529">SUSE bug 797529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589376" comment="acroread-9.5.3-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589377" comment="acroread-cmaps-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589378" comment="acroread-fonts-ja-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589379" comment="acroread-fonts-ko-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589380" comment="acroread-fonts-zh_CN-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589381" comment="acroread-fonts-zh_TW-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565854" comment="acroread_ja-9.4.2-0.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0621</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0621" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0621" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0621" ref_url="https://www.suse.com/security/cve/CVE-2013-0621" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0047-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0138-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0193-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0363-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00083.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Reader and Acrobat 9.x before 9.5.3, 10.x before 10.1.5, and 11.x before 11.0.1 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-0606, CVE-2013-0612, CVE-2013-0615, and CVE-2013-0617.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0621/">CVE-2013-0621</cve>
	<bugzilla href="https://bugzilla.suse.com/797529">SUSE bug 797529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589376" comment="acroread-9.5.3-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589377" comment="acroread-cmaps-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589378" comment="acroread-fonts-ja-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589379" comment="acroread-fonts-ko-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589380" comment="acroread-fonts-zh_CN-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589381" comment="acroread-fonts-zh_TW-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565854" comment="acroread_ja-9.4.2-0.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0622</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0622" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0622" ref_url="https://www.suse.com/security/cve/CVE-2013-0622" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0047-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0138-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0193-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0363-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00083.html" source="SUSE-SU"/>
    <description>
    Adobe Reader and Acrobat 9.x before 9.5.3, 10.x before 10.1.5, and 11.x before 11.0.1 allow attackers to bypass intended access restrictions via unspecified vectors, a different vulnerability than CVE-2013-0624.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0622/">CVE-2013-0622</cve>
	<bugzilla href="https://bugzilla.suse.com/797529">SUSE bug 797529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589376" comment="acroread-9.5.3-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589377" comment="acroread-cmaps-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589378" comment="acroread-fonts-ja-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589379" comment="acroread-fonts-ko-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589380" comment="acroread-fonts-zh_CN-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589381" comment="acroread-fonts-zh_TW-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565854" comment="acroread_ja-9.4.2-0.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0623</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0623" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0623" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0623" ref_url="https://www.suse.com/security/cve/CVE-2013-0623" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0047-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0138-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0193-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0363-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00083.html" source="SUSE-SU"/>
    <description>
    Adobe Reader and Acrobat 9.x before 9.5.3, 10.x before 10.1.5, and 11.x before 11.0.1 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-1530, CVE-2013-0601, CVE-2013-0605, CVE-2013-0616, CVE-2013-0619, and CVE-2013-0620.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0623/">CVE-2013-0623</cve>
	<bugzilla href="https://bugzilla.suse.com/797529">SUSE bug 797529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589376" comment="acroread-9.5.3-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589377" comment="acroread-cmaps-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589378" comment="acroread-fonts-ja-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589379" comment="acroread-fonts-ko-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589380" comment="acroread-fonts-zh_CN-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589381" comment="acroread-fonts-zh_TW-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565854" comment="acroread_ja-9.4.2-0.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0624</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0624" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0624" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0624" ref_url="https://www.suse.com/security/cve/CVE-2013-0624" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0047-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0138-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0193-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0363-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00083.html" source="SUSE-SU"/>
    <description>
    Adobe Reader and Acrobat 9.x before 9.5.3, 10.x before 10.1.5, and 11.x before 11.0.1 allow attackers to bypass intended access restrictions via unspecified vectors, a different vulnerability than CVE-2013-0622.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0624/">CVE-2013-0624</cve>
	<bugzilla href="https://bugzilla.suse.com/797529">SUSE bug 797529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589376" comment="acroread-9.5.3-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589377" comment="acroread-cmaps-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589378" comment="acroread-fonts-ja-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589379" comment="acroread-fonts-ko-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589380" comment="acroread-fonts-zh_CN-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589381" comment="acroread-fonts-zh_TW-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565854" comment="acroread_ja-9.4.2-0.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0626</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0626" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0626" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0626" ref_url="https://www.suse.com/security/cve/CVE-2013-0626" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0047-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0138-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0193-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0363-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00083.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in Adobe Reader and Acrobat 9.x before 9.5.3, 10.x before 10.1.5, and 11.x before 11.0.1 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-0610.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0626/">CVE-2013-0626</cve>
	<bugzilla href="https://bugzilla.suse.com/797529">SUSE bug 797529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589376" comment="acroread-9.5.3-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589377" comment="acroread-cmaps-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589378" comment="acroread-fonts-ja-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589379" comment="acroread-fonts-ko-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589380" comment="acroread-fonts-zh_CN-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589381" comment="acroread-fonts-zh_TW-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565854" comment="acroread_ja-9.4.2-0.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0627</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0627" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0627" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0627" ref_url="https://www.suse.com/security/cve/CVE-2013-0627" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0047-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0138-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0193-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0363-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00083.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.5.3, 10.x before 10.1.5, and 11.x before 11.0.1 allows local users to gain privileges via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0627/">CVE-2013-0627</cve>
	<bugzilla href="https://bugzilla.suse.com/797529">SUSE bug 797529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589376" comment="acroread-9.5.3-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589377" comment="acroread-cmaps-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589378" comment="acroread-fonts-ja-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589379" comment="acroread-fonts-ko-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589380" comment="acroread-fonts-zh_CN-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589381" comment="acroread-fonts-zh_TW-9.4.6-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565854" comment="acroread_ja-9.4.2-0.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0630</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0630" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0630" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0630" ref_url="https://www.suse.com/security/cve/CVE-2013-0630" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0033-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0121-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0128-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0168-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0364-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00084.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.50 and 11.x before 11.5.502.146 on Windows and Mac OS X, before 10.3.183.50 and 11.x before 11.2.202.261 on Linux, before 11.1.111.31 on Android 2.x and 3.x, and before 11.1.115.36 on Android 4.x; Adobe AIR before 3.5.0.1060; and Adobe AIR SDK before 3.5.0.1060 allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0630/">CVE-2013-0630</cve>
	<bugzilla href="https://bugzilla.suse.com/797442">SUSE bug 797442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590741" comment="flash-player-11.2.202.261-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565987" comment="flash-player-gnome-11.2.202.336-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565988" comment="flash-player-kde4-11.2.202.336-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0633</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0633" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0633" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0633" ref_url="https://www.suse.com/security/cve/CVE-2013-0633" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0279-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0284-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00006.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.51 and 11.x before 11.5.502.149 on Windows and Mac OS X, before 10.3.183.51 and 11.x before 11.2.202.262 on Linux, before 11.1.111.32 on Android 2.x and 3.x, and before 11.1.115.37 on Android 4.x allows remote attackers to execute arbitrary code via crafted SWF content, as exploited in the wild in February 2013.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0633/">CVE-2013-0633</cve>
	<bugzilla href="https://bugzilla.suse.com/802809">SUSE bug 802809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590742" comment="flash-player-11.2.202.262-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590743" comment="flash-player-gnome-11.2.202.262-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590744" comment="flash-player-kde4-11.2.202.262-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0634</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0634" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0634" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0634" ref_url="https://www.suse.com/security/cve/CVE-2013-0634" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0279-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0284-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00006.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.51 and 11.x before 11.5.502.149 on Windows and Mac OS X, before 10.3.183.51 and 11.x before 11.2.202.262 on Linux, before 11.1.111.32 on Android 2.x and 3.x, and before 11.1.115.37 on Android 4.x allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted SWF content, as exploited in the wild in February 2013.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0634/">CVE-2013-0634</cve>
	<bugzilla href="https://bugzilla.suse.com/802809">SUSE bug 802809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933288">SUSE bug 933288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590742" comment="flash-player-11.2.202.262-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590743" comment="flash-player-gnome-11.2.202.262-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590744" comment="flash-player-kde4-11.2.202.262-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0637</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0637" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0637" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0637" ref_url="https://www.suse.com/security/cve/CVE-2013-0637" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0296-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00011.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on Windows, before 10.3.183.61 and 11.x before 11.6.602.167 on Mac OS X, before 10.3.183.61 and 11.x before 11.2.202.270 on Linux, before 11.1.111.43 on Android 2.x and 3.x, and before 11.1.115.47 on Android 4.x; Adobe AIR before 3.6.0.597; and Adobe AIR SDK before 3.6.0.599 allow attackers to obtain sensitive information via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0637/">CVE-2013-0637</cve>
	<bugzilla href="https://bugzilla.suse.com/803485">SUSE bug 803485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590745" comment="flash-player-11.2.202.270-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590746" comment="flash-player-gnome-11.2.202.270-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590747" comment="flash-player-kde4-11.2.202.270-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0638</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0638" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0638" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0638" ref_url="https://www.suse.com/security/cve/CVE-2013-0638" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0296-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00011.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on Windows, before 10.3.183.61 and 11.x before 11.6.602.167 on Mac OS X, before 10.3.183.61 and 11.x before 11.2.202.270 on Linux, before 11.1.111.43 on Android 2.x and 3.x, and before 11.1.115.47 on Android 4.x; Adobe AIR before 3.6.0.597; and Adobe AIR SDK before 3.6.0.599 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-0647.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0638/">CVE-2013-0638</cve>
	<bugzilla href="https://bugzilla.suse.com/803485">SUSE bug 803485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590745" comment="flash-player-11.2.202.270-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590746" comment="flash-player-gnome-11.2.202.270-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590747" comment="flash-player-kde4-11.2.202.270-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0639</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0639" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0639" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0639" ref_url="https://www.suse.com/security/cve/CVE-2013-0639" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0296-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00011.html" source="SUSE-SU"/>
    <description>
    Integer overflow in Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on Windows, before 10.3.183.61 and 11.x before 11.6.602.167 on Mac OS X, before 10.3.183.61 and 11.x before 11.2.202.270 on Linux, before 11.1.111.43 on Android 2.x and 3.x, and before 11.1.115.47 on Android 4.x; Adobe AIR before 3.6.0.597; and Adobe AIR SDK before 3.6.0.599 allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0639/">CVE-2013-0639</cve>
	<bugzilla href="https://bugzilla.suse.com/803485">SUSE bug 803485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590745" comment="flash-player-11.2.202.270-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590746" comment="flash-player-gnome-11.2.202.270-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590747" comment="flash-player-kde4-11.2.202.270-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0640</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0640" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0640" ref_url="https://www.suse.com/security/cve/CVE-2013-0640" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0349-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0335-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0335-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00023.html" source="SUSE-SU"/>
    <description>
    Adobe Reader and Acrobat 9.x before 9.5.4, 10.x before 10.1.6, and 11.x before 11.0.02 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted PDF document, as exploited in the wild in February 2013.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0640/">CVE-2013-0640</cve>
	<bugzilla href="https://bugzilla.suse.com/803939">SUSE bug 803939</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590748" comment="acroread-9.5.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590749" comment="acroread-cmaps-9.4.6-0.4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590750" comment="acroread-fonts-ja-9.4.6-0.4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590751" comment="acroread-fonts-ko-9.4.6-0.4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590752" comment="acroread-fonts-zh_CN-9.4.6-0.4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590753" comment="acroread-fonts-zh_TW-9.4.6-0.4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565854" comment="acroread_ja-9.4.2-0.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0641</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0641" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0641" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0641" ref_url="https://www.suse.com/security/cve/CVE-2013-0641" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0349-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0335-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0335-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00023.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Reader and Acrobat 9.x before 9.5.4, 10.x before 10.1.6, and 11.x before 11.0.02 allows remote attackers to execute arbitrary code via a crafted PDF document, as exploited in the wild in February 2013.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0641/">CVE-2013-0641</cve>
	<bugzilla href="https://bugzilla.suse.com/803939">SUSE bug 803939</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590748" comment="acroread-9.5.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590749" comment="acroread-cmaps-9.4.6-0.4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590750" comment="acroread-fonts-ja-9.4.6-0.4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590751" comment="acroread-fonts-ko-9.4.6-0.4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590752" comment="acroread-fonts-zh_CN-9.4.6-0.4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590753" comment="acroread-fonts-zh_TW-9.4.6-0.4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565854" comment="acroread_ja-9.4.2-0.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0642</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0642" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0642" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0642" ref_url="https://www.suse.com/security/cve/CVE-2013-0642" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0296-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00011.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on Windows, before 10.3.183.61 and 11.x before 11.6.602.167 on Mac OS X, before 10.3.183.61 and 11.x before 11.2.202.270 on Linux, before 11.1.111.43 on Android 2.x and 3.x, and before 11.1.115.47 on Android 4.x; Adobe AIR before 3.6.0.597; and Adobe AIR SDK before 3.6.0.599 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-0645, CVE-2013-1365, CVE-2013-1366, CVE-2013-1367, CVE-2013-1368, CVE-2013-1369, CVE-2013-1370, CVE-2013-1372, and CVE-2013-1373.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0642/">CVE-2013-0642</cve>
	<bugzilla href="https://bugzilla.suse.com/803485">SUSE bug 803485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590745" comment="flash-player-11.2.202.270-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590746" comment="flash-player-gnome-11.2.202.270-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590747" comment="flash-player-kde4-11.2.202.270-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0643</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0643" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0643" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0643" ref_url="https://www.suse.com/security/cve/CVE-2013-0643" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0359-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00026.html" source="SUSE-SU"/>
    <description>
    The Firefox sandbox in Adobe Flash Player before 10.3.183.67 and 11.x before 11.6.602.171 on Windows and Mac OS X, and before 10.3.183.67 and 11.x before 11.2.202.273 on Linux, does not properly restrict privileges, which makes it easier for remote attackers to execute arbitrary code via crafted SWF content, as exploited in the wild in February 2013.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0643/">CVE-2013-0643</cve>
	<bugzilla href="https://bugzilla.suse.com/806415">SUSE bug 806415</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590738" comment="flash-player-11.2.202.273-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590739" comment="flash-player-gnome-11.2.202.273-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590740" comment="flash-player-kde4-11.2.202.273-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130644" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0644</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0644" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0644" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0644" ref_url="https://www.suse.com/security/cve/CVE-2013-0644" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0296-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00011.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on Windows, before 10.3.183.61 and 11.x before 11.6.602.167 on Mac OS X, before 10.3.183.61 and 11.x before 11.2.202.270 on Linux, before 11.1.111.43 on Android 2.x and 3.x, and before 11.1.115.47 on Android 4.x; Adobe AIR before 3.6.0.597; and Adobe AIR SDK before 3.6.0.599 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-0649 and CVE-2013-1374.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0644/">CVE-2013-0644</cve>
	<bugzilla href="https://bugzilla.suse.com/803485">SUSE bug 803485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590745" comment="flash-player-11.2.202.270-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590746" comment="flash-player-gnome-11.2.202.270-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590747" comment="flash-player-kde4-11.2.202.270-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0645</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0645" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0645" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0645" ref_url="https://www.suse.com/security/cve/CVE-2013-0645" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0296-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00011.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on Windows, before 10.3.183.61 and 11.x before 11.6.602.167 on Mac OS X, before 10.3.183.61 and 11.x before 11.2.202.270 on Linux, before 11.1.111.43 on Android 2.x and 3.x, and before 11.1.115.47 on Android 4.x; Adobe AIR before 3.6.0.597; and Adobe AIR SDK before 3.6.0.599 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-0642, CVE-2013-1365, CVE-2013-1366, CVE-2013-1367, CVE-2013-1368, CVE-2013-1369, CVE-2013-1370, CVE-2013-1372, and CVE-2013-1373.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0645/">CVE-2013-0645</cve>
	<bugzilla href="https://bugzilla.suse.com/803485">SUSE bug 803485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590745" comment="flash-player-11.2.202.270-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590746" comment="flash-player-gnome-11.2.202.270-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590747" comment="flash-player-kde4-11.2.202.270-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0646</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0646" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0646" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0646" ref_url="https://www.suse.com/security/cve/CVE-2013-0646" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00021.html" source="SUSE-SU"/>
    <description>
    Integer overflow in Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK &amp; Compiler before 3.6.0.6090 allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0646/">CVE-2013-0646</cve>
	<bugzilla href="https://bugzilla.suse.com/808973">SUSE bug 808973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590754" comment="flash-player-11.2.202.275-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590755" comment="flash-player-gnome-11.2.202.275-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590756" comment="flash-player-kde4-11.2.202.275-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0647</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0647" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0647" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0647" ref_url="https://www.suse.com/security/cve/CVE-2013-0647" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0296-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00011.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on Windows, before 10.3.183.61 and 11.x before 11.6.602.167 on Mac OS X, before 10.3.183.61 and 11.x before 11.2.202.270 on Linux, before 11.1.111.43 on Android 2.x and 3.x, and before 11.1.115.47 on Android 4.x; Adobe AIR before 3.6.0.597; and Adobe AIR SDK before 3.6.0.599 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-0638.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0647/">CVE-2013-0647</cve>
	<bugzilla href="https://bugzilla.suse.com/803485">SUSE bug 803485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590745" comment="flash-player-11.2.202.270-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590746" comment="flash-player-gnome-11.2.202.270-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590747" comment="flash-player-kde4-11.2.202.270-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0648</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0648" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0648" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0648" ref_url="https://www.suse.com/security/cve/CVE-2013-0648" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0359-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00026.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the ExternalInterface ActionScript functionality in Adobe Flash Player before 10.3.183.67 and 11.x before 11.6.602.171 on Windows and Mac OS X, and before 10.3.183.67 and 11.x before 11.2.202.273 on Linux, allows remote attackers to execute arbitrary code via crafted SWF content, as exploited in the wild in February 2013.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0648/">CVE-2013-0648</cve>
	<bugzilla href="https://bugzilla.suse.com/806415">SUSE bug 806415</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590738" comment="flash-player-11.2.202.273-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590739" comment="flash-player-gnome-11.2.202.273-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590740" comment="flash-player-kde4-11.2.202.273-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130649" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0649</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0649" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0649" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0649" ref_url="https://www.suse.com/security/cve/CVE-2013-0649" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0296-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00011.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on Windows, before 10.3.183.61 and 11.x before 11.6.602.167 on Mac OS X, before 10.3.183.61 and 11.x before 11.2.202.270 on Linux, before 11.1.111.43 on Android 2.x and 3.x, and before 11.1.115.47 on Android 4.x; Adobe AIR before 3.6.0.597; and Adobe AIR SDK before 3.6.0.599 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-0644 and CVE-2013-1374.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0649/">CVE-2013-0649</cve>
	<bugzilla href="https://bugzilla.suse.com/803485">SUSE bug 803485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590745" comment="flash-player-11.2.202.270-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590746" comment="flash-player-gnome-11.2.202.270-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590747" comment="flash-player-kde4-11.2.202.270-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0650</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0650" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0650" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0650" ref_url="https://www.suse.com/security/cve/CVE-2013-0650" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00021.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK &amp; Compiler before 3.6.0.6090 allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0650/">CVE-2013-0650</cve>
	<bugzilla href="https://bugzilla.suse.com/808973">SUSE bug 808973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590754" comment="flash-player-11.2.202.275-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590755" comment="flash-player-gnome-11.2.202.275-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590756" comment="flash-player-kde4-11.2.202.275-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0743</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0743" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0743" ref_url="https://www.suse.com/security/cve/CVE-2013-0743" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: This candidate was withdrawn by its CNA at the suggestion of the CVE project team.  The candidate had been associated with a correct report of a security problem, but not a problem that is categorized as a vulnerability within CVE.  Compromised or unauthorized SSL certificates are not within CVE's scope.  Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0743/">CVE-2013-0743</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565943" comment="MozillaFirefox-10.0.12-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565944" comment="MozillaFirefox-translations-10.0.12-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565945" comment="libfreebl3-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565946" comment="libfreebl3-32bit-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565947" comment="mozilla-nspr-4.9.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565948" comment="mozilla-nspr-32bit-4.9.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565949" comment="mozilla-nss-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565950" comment="mozilla-nss-32bit-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565951" comment="mozilla-nss-tools-3.14.1-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0744</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0744" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0744" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0744" ref_url="https://www.suse.com/security/cve/CVE-2013-0744" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the TableBackgroundPainter::TableBackgroundData::Destroy function in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via an HTML document with a table containing many columns and column groups.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0744/">CVE-2013-0744</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565943" comment="MozillaFirefox-10.0.12-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565944" comment="MozillaFirefox-translations-10.0.12-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565945" comment="libfreebl3-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565946" comment="libfreebl3-32bit-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565947" comment="mozilla-nspr-4.9.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565948" comment="mozilla-nspr-32bit-4.9.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565949" comment="mozilla-nss-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565950" comment="mozilla-nss-32bit-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565951" comment="mozilla-nss-tools-3.14.1-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0745</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0745" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0745" ref_url="https://www.suse.com/security/cve/CVE-2013-0745" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The AutoWrapperChanger class in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 does not properly interact with garbage collection, which allows remote attackers to execute arbitrary code via a crafted HTML document referencing JavaScript objects.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0745/">CVE-2013-0745</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565943" comment="MozillaFirefox-10.0.12-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565944" comment="MozillaFirefox-translations-10.0.12-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565945" comment="libfreebl3-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565946" comment="libfreebl3-32bit-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565947" comment="mozilla-nspr-4.9.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565948" comment="mozilla-nspr-32bit-4.9.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565949" comment="mozilla-nss-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565950" comment="mozilla-nss-32bit-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565951" comment="mozilla-nss-tools-3.14.1-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0746</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0746" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0746" ref_url="https://www.suse.com/security/cve/CVE-2013-0746" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 do not properly implement quickstubs that use the jsval data type for their return values, which allows remote attackers to execute arbitrary code or cause a denial of service (compartment mismatch and application crash) via crafted JavaScript code that is not properly handled during garbage collection.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0746/">CVE-2013-0746</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565943" comment="MozillaFirefox-10.0.12-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565944" comment="MozillaFirefox-translations-10.0.12-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565945" comment="libfreebl3-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565946" comment="libfreebl3-32bit-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565947" comment="mozilla-nspr-4.9.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565948" comment="mozilla-nspr-32bit-4.9.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565949" comment="mozilla-nss-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565950" comment="mozilla-nss-32bit-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565951" comment="mozilla-nss-tools-3.14.1-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0747</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0747" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0747" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0747" ref_url="https://www.suse.com/security/cve/CVE-2013-0747" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The gPluginHandler.handleEvent function in the plugin handler in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 does not properly enforce the Same Origin Policy, which allows remote attackers to conduct clickjacking attacks via crafted JavaScript code that listens for a mutation event.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0747/">CVE-2013-0747</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565943" comment="MozillaFirefox-10.0.12-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565944" comment="MozillaFirefox-translations-10.0.12-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565945" comment="libfreebl3-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565946" comment="libfreebl3-32bit-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565947" comment="mozilla-nspr-4.9.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565948" comment="mozilla-nspr-32bit-4.9.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565949" comment="mozilla-nss-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565950" comment="mozilla-nss-32bit-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565951" comment="mozilla-nss-tools-3.14.1-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0748</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0748" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0748" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0748" ref_url="https://www.suse.com/security/cve/CVE-2013-0748" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The XBL.__proto__.toString implementation in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 makes it easier for remote attackers to bypass the ASLR protection mechanism by calling the toString function of an XBL object.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0748/">CVE-2013-0748</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565943" comment="MozillaFirefox-10.0.12-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565944" comment="MozillaFirefox-translations-10.0.12-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565945" comment="libfreebl3-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565946" comment="libfreebl3-32bit-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565947" comment="mozilla-nspr-4.9.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565948" comment="mozilla-nspr-32bit-4.9.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565949" comment="mozilla-nss-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565950" comment="mozilla-nss-32bit-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565951" comment="mozilla-nss-tools-3.14.1-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0749</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0749" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0749" ref_url="https://www.suse.com/security/cve/CVE-2013-0749" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.1, and SeaMonkey before 2.15 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0749/">CVE-2013-0749</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565943" comment="MozillaFirefox-10.0.12-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565944" comment="MozillaFirefox-translations-10.0.12-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565945" comment="libfreebl3-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565946" comment="libfreebl3-32bit-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565947" comment="mozilla-nspr-4.9.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565948" comment="mozilla-nspr-32bit-4.9.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565949" comment="mozilla-nss-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565950" comment="mozilla-nss-32bit-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565951" comment="mozilla-nss-tools-3.14.1-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0750</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0750" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0750" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0750" ref_url="https://www.suse.com/security/cve/CVE-2013-0750" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the JavaScript implementation in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via a crafted string concatenation, leading to improper memory allocation and a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0750/">CVE-2013-0750</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565943" comment="MozillaFirefox-10.0.12-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565944" comment="MozillaFirefox-translations-10.0.12-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565945" comment="libfreebl3-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565946" comment="libfreebl3-32bit-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565947" comment="mozilla-nspr-4.9.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565948" comment="mozilla-nspr-32bit-4.9.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565949" comment="mozilla-nss-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565950" comment="mozilla-nss-32bit-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565951" comment="mozilla-nss-tools-3.14.1-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0751</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0751" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0751" ref_url="https://www.suse.com/security/cve/CVE-2013-0751" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 18.0 on Android and SeaMonkey before 2.15 do not restrict a touch event to a single IFRAME element, which allows remote attackers to obtain sensitive information or possibly conduct cross-site scripting (XSS) attacks via a crafted HTML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0751/">CVE-2013-0751</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565943" comment="MozillaFirefox-10.0.12-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565944" comment="MozillaFirefox-translations-10.0.12-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565945" comment="libfreebl3-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565946" comment="libfreebl3-32bit-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565947" comment="mozilla-nspr-4.9.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565948" comment="mozilla-nspr-32bit-4.9.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565949" comment="mozilla-nss-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565950" comment="mozilla-nss-32bit-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565951" comment="mozilla-nss-tools-3.14.1-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0752</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0752" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0752" ref_url="https://www.suse.com/security/cve/CVE-2013-0752" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XBL file with multiple bindings that have SVG content.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0752/">CVE-2013-0752</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565943" comment="MozillaFirefox-10.0.12-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565944" comment="MozillaFirefox-translations-10.0.12-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565945" comment="libfreebl3-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565946" comment="libfreebl3-32bit-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565947" comment="mozilla-nspr-4.9.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565948" comment="mozilla-nspr-32bit-4.9.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565949" comment="mozilla-nss-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565950" comment="mozilla-nss-32bit-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565951" comment="mozilla-nss-tools-3.14.1-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0753</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0753" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0753" ref_url="https://www.suse.com/security/cve/CVE-2013-0753" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the serializeToStream implementation in the XMLSerializer component in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via crafted web content.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0753/">CVE-2013-0753</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565943" comment="MozillaFirefox-10.0.12-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565944" comment="MozillaFirefox-translations-10.0.12-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565945" comment="libfreebl3-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565946" comment="libfreebl3-32bit-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565947" comment="mozilla-nspr-4.9.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565948" comment="mozilla-nspr-32bit-4.9.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565949" comment="mozilla-nss-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565950" comment="mozilla-nss-32bit-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565951" comment="mozilla-nss-tools-3.14.1-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0754</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0754" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0754" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0754" ref_url="https://www.suse.com/security/cve/CVE-2013-0754" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the ListenerManager implementation in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via vectors involving the triggering of garbage collection after memory allocation for listener objects.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0754/">CVE-2013-0754</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565943" comment="MozillaFirefox-10.0.12-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565944" comment="MozillaFirefox-translations-10.0.12-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565945" comment="libfreebl3-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565946" comment="libfreebl3-32bit-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565947" comment="mozilla-nspr-4.9.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565948" comment="mozilla-nspr-32bit-4.9.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565949" comment="mozilla-nss-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565950" comment="mozilla-nss-32bit-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565951" comment="mozilla-nss-tools-3.14.1-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0755</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0755" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0755" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0755" ref_url="https://www.suse.com/security/cve/CVE-2013-0755" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the mozVibrate implementation in the Vibrate library in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via vectors related to the domDoc pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0755/">CVE-2013-0755</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565943" comment="MozillaFirefox-10.0.12-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565944" comment="MozillaFirefox-translations-10.0.12-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565945" comment="libfreebl3-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565946" comment="libfreebl3-32bit-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565947" comment="mozilla-nspr-4.9.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565948" comment="mozilla-nspr-32bit-4.9.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565949" comment="mozilla-nss-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565950" comment="mozilla-nss-32bit-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565951" comment="mozilla-nss-tools-3.14.1-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0756</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0756" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0756" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0756" ref_url="https://www.suse.com/security/cve/CVE-2013-0756" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the obj_toSource function in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via a crafted web page referencing JavaScript Proxy objects that are not properly handled during garbage collection.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0756/">CVE-2013-0756</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565943" comment="MozillaFirefox-10.0.12-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565944" comment="MozillaFirefox-translations-10.0.12-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565945" comment="libfreebl3-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565946" comment="libfreebl3-32bit-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565947" comment="mozilla-nspr-4.9.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565948" comment="mozilla-nspr-32bit-4.9.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565949" comment="mozilla-nss-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565950" comment="mozilla-nss-32bit-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565951" comment="mozilla-nss-tools-3.14.1-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0757</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0757" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0757" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0757" ref_url="https://www.suse.com/security/cve/CVE-2013-0757" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The Chrome Object Wrapper (COW) implementation in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 does not prevent modifications to the prototype of an object, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges by referencing Object.prototype.__proto__ in a crafted HTML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0757/">CVE-2013-0757</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565943" comment="MozillaFirefox-10.0.12-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565944" comment="MozillaFirefox-translations-10.0.12-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565945" comment="libfreebl3-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565946" comment="libfreebl3-32bit-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565947" comment="mozilla-nspr-4.9.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565948" comment="mozilla-nspr-32bit-4.9.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565949" comment="mozilla-nss-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565950" comment="mozilla-nss-32bit-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565951" comment="mozilla-nss-tools-3.14.1-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0758</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0758" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0758" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0758" ref_url="https://www.suse.com/security/cve/CVE-2013-0758" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allow remote attackers to execute arbitrary JavaScript code with chrome privileges by leveraging improper interaction between plugin objects and SVG elements.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0758/">CVE-2013-0758</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565943" comment="MozillaFirefox-10.0.12-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565944" comment="MozillaFirefox-translations-10.0.12-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565945" comment="libfreebl3-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565946" comment="libfreebl3-32bit-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565947" comment="mozilla-nspr-4.9.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565948" comment="mozilla-nspr-32bit-4.9.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565949" comment="mozilla-nss-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565950" comment="mozilla-nss-32bit-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565951" comment="mozilla-nss-tools-3.14.1-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130759" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0759</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0759" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0759" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0759" ref_url="https://www.suse.com/security/cve/CVE-2013-0759" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allow remote attackers to spoof the address bar via vectors involving authentication information in the userinfo field of a URL, in conjunction with a 204 (aka No Content) HTTP status code.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0759/">CVE-2013-0759</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565943" comment="MozillaFirefox-10.0.12-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565944" comment="MozillaFirefox-translations-10.0.12-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565945" comment="libfreebl3-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565946" comment="libfreebl3-32bit-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565947" comment="mozilla-nspr-4.9.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565948" comment="mozilla-nspr-32bit-4.9.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565949" comment="mozilla-nss-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565950" comment="mozilla-nss-32bit-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565951" comment="mozilla-nss-tools-3.14.1-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0760</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0760" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0760" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0760" ref_url="https://www.suse.com/security/cve/CVE-2013-0760" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the CharDistributionAnalysis::HandleOneChar function in Mozilla Firefox before 18.0, Thunderbird before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via a crafted document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0760/">CVE-2013-0760</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565943" comment="MozillaFirefox-10.0.12-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565944" comment="MozillaFirefox-translations-10.0.12-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565945" comment="libfreebl3-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565946" comment="libfreebl3-32bit-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565947" comment="mozilla-nspr-4.9.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565948" comment="mozilla-nspr-32bit-4.9.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565949" comment="mozilla-nss-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565950" comment="mozilla-nss-32bit-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565951" comment="mozilla-nss-tools-3.14.1-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0761</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0761" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0761" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0761" ref_url="https://www.suse.com/security/cve/CVE-2013-0761" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the mozilla::TrackUnionStream::EndTrack implementation in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.1, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0761/">CVE-2013-0761</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565943" comment="MozillaFirefox-10.0.12-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565944" comment="MozillaFirefox-translations-10.0.12-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565945" comment="libfreebl3-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565946" comment="libfreebl3-32bit-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565947" comment="mozilla-nspr-4.9.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565948" comment="mozilla-nspr-32bit-4.9.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565949" comment="mozilla-nss-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565950" comment="mozilla-nss-32bit-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565951" comment="mozilla-nss-tools-3.14.1-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0762</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0762" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0762" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0762" ref_url="https://www.suse.com/security/cve/CVE-2013-0762" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the imgRequest::OnStopFrame function in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.1, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0762/">CVE-2013-0762</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565943" comment="MozillaFirefox-10.0.12-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565944" comment="MozillaFirefox-translations-10.0.12-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565945" comment="libfreebl3-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565946" comment="libfreebl3-32bit-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565947" comment="mozilla-nspr-4.9.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565948" comment="mozilla-nspr-32bit-4.9.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565949" comment="mozilla-nss-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565950" comment="mozilla-nss-32bit-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565951" comment="mozilla-nss-tools-3.14.1-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0763</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0763" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0763" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0763" ref_url="https://www.suse.com/security/cve/CVE-2013-0763" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.1, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors related to Mesa drivers and a resized WebGL canvas.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0763/">CVE-2013-0763</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565943" comment="MozillaFirefox-10.0.12-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565944" comment="MozillaFirefox-translations-10.0.12-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565945" comment="libfreebl3-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565946" comment="libfreebl3-32bit-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565947" comment="mozilla-nspr-4.9.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565948" comment="mozilla-nspr-32bit-4.9.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565949" comment="mozilla-nss-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565950" comment="mozilla-nss-32bit-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565951" comment="mozilla-nss-tools-3.14.1-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0764</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0764" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0764" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0764" ref_url="https://www.suse.com/security/cve/CVE-2013-0764" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The nsSOCKSSocketInfo::ConnectToProxy function in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 does not ensure thread safety for SSL sessions, which allows remote attackers to execute arbitrary code via crafted data, as demonstrated by e-mail message data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0764/">CVE-2013-0764</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565943" comment="MozillaFirefox-10.0.12-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565944" comment="MozillaFirefox-translations-10.0.12-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565945" comment="libfreebl3-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565946" comment="libfreebl3-32bit-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565947" comment="mozilla-nspr-4.9.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565948" comment="mozilla-nspr-32bit-4.9.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565949" comment="mozilla-nss-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565950" comment="mozilla-nss-32bit-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565951" comment="mozilla-nss-tools-3.14.1-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0765</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0765" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0765" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0765" ref_url="https://www.suse.com/security/cve/CVE-2013-0765" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0410-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 19.0, Thunderbird before 17.0.3, and SeaMonkey before 2.16 do not prevent multiple wrapping of WebIDL objects, which allows remote attackers to bypass intended access restrictions via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0765/">CVE-2013-0765</cve>
	<bugzilla href="https://bugzilla.suse.com/804248">SUSE bug 804248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590757" comment="MozillaFirefox-17.0.3esr-0.4.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565953" comment="MozillaFirefox-branding-SLED-7-0.6.9.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590758" comment="MozillaFirefox-translations-17.0.3esr-0.4.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565955" comment="beagle-0.3.8-56.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565956" comment="beagle-evolution-0.3.8-56.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565957" comment="beagle-firefox-0.3.8-56.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565958" comment="beagle-gui-0.3.8-56.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565959" comment="beagle-lang-0.3.8-56.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565960" comment="libfreebl3-3.14.2-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565961" comment="libfreebl3-32bit-3.14.2-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565962" comment="mhtml-firefox-0.5-1.47.51.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565963" comment="mozilla-nspr-4.9.5-0.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565964" comment="mozilla-nspr-32bit-4.9.5-0.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565965" comment="mozilla-nss-3.14.2-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565966" comment="mozilla-nss-32bit-3.14.2-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565967" comment="mozilla-nss-tools-3.14.2-0.4.3.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0766</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0766" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0766" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0766" ref_url="https://www.suse.com/security/cve/CVE-2013-0766" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the ~nsHTMLEditRules implementation in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.1, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0766/">CVE-2013-0766</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565943" comment="MozillaFirefox-10.0.12-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565944" comment="MozillaFirefox-translations-10.0.12-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565945" comment="libfreebl3-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565946" comment="libfreebl3-32bit-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565947" comment="mozilla-nspr-4.9.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565948" comment="mozilla-nspr-32bit-4.9.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565949" comment="mozilla-nss-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565950" comment="mozilla-nss-32bit-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565951" comment="mozilla-nss-tools-3.14.1-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0767</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0767" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0767" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0767" ref_url="https://www.suse.com/security/cve/CVE-2013-0767" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The nsSVGPathElement::GetPathLengthScale function in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.1, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0767/">CVE-2013-0767</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565943" comment="MozillaFirefox-10.0.12-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565944" comment="MozillaFirefox-translations-10.0.12-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565945" comment="libfreebl3-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565946" comment="libfreebl3-32bit-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565947" comment="mozilla-nspr-4.9.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565948" comment="mozilla-nspr-32bit-4.9.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565949" comment="mozilla-nss-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565950" comment="mozilla-nss-32bit-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565951" comment="mozilla-nss-tools-3.14.1-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0768</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0768" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0768" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0768" ref_url="https://www.suse.com/security/cve/CVE-2013-0768" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the Canvas implementation in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via an HTML document that specifies invalid width and height values.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0768/">CVE-2013-0768</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565943" comment="MozillaFirefox-10.0.12-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565944" comment="MozillaFirefox-translations-10.0.12-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565945" comment="libfreebl3-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565946" comment="libfreebl3-32bit-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565947" comment="mozilla-nspr-4.9.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565948" comment="mozilla-nspr-32bit-4.9.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565949" comment="mozilla-nss-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565950" comment="mozilla-nss-32bit-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565951" comment="mozilla-nss-tools-3.14.1-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0769</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0769" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0769" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0769" ref_url="https://www.suse.com/security/cve/CVE-2013-0769" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.1, and SeaMonkey before 2.15 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0769/">CVE-2013-0769</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565943" comment="MozillaFirefox-10.0.12-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565944" comment="MozillaFirefox-translations-10.0.12-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565945" comment="libfreebl3-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565946" comment="libfreebl3-32bit-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565947" comment="mozilla-nspr-4.9.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565948" comment="mozilla-nspr-32bit-4.9.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565949" comment="mozilla-nss-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565950" comment="mozilla-nss-32bit-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565951" comment="mozilla-nss-tools-3.14.1-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0770</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0770" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0770" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0770" ref_url="https://www.suse.com/security/cve/CVE-2013-0770" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 18.0, Thunderbird before 17.0.2, and SeaMonkey before 2.15 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0770/">CVE-2013-0770</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565943" comment="MozillaFirefox-10.0.12-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565944" comment="MozillaFirefox-translations-10.0.12-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565945" comment="libfreebl3-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565946" comment="libfreebl3-32bit-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565947" comment="mozilla-nspr-4.9.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565948" comment="mozilla-nspr-32bit-4.9.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565949" comment="mozilla-nss-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565950" comment="mozilla-nss-32bit-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565951" comment="mozilla-nss-tools-3.14.1-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0771</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0771" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0771" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0771" ref_url="https://www.suse.com/security/cve/CVE-2013-0771" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the gfxTextRun::ShrinkToLigatureBoundaries function in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.1, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via a crafted document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0771/">CVE-2013-0771</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565943" comment="MozillaFirefox-10.0.12-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565944" comment="MozillaFirefox-translations-10.0.12-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565945" comment="libfreebl3-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565946" comment="libfreebl3-32bit-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565947" comment="mozilla-nspr-4.9.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565948" comment="mozilla-nspr-32bit-4.9.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565949" comment="mozilla-nss-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565950" comment="mozilla-nss-32bit-3.14.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565951" comment="mozilla-nss-tools-3.14.1-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0772</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0772" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0772" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0772" ref_url="https://www.suse.com/security/cve/CVE-2013-0772" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0410-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html" source="SUSE-SU"/>
    <description>
    The RasterImage::DrawFrameTo function in Mozilla Firefox before 19.0, Thunderbird before 17.0.3, and SeaMonkey before 2.16 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read and application crash) via a crafted GIF image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0772/">CVE-2013-0772</cve>
	<bugzilla href="https://bugzilla.suse.com/804248">SUSE bug 804248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590757" comment="MozillaFirefox-17.0.3esr-0.4.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565953" comment="MozillaFirefox-branding-SLED-7-0.6.9.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590758" comment="MozillaFirefox-translations-17.0.3esr-0.4.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565955" comment="beagle-0.3.8-56.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565956" comment="beagle-evolution-0.3.8-56.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565957" comment="beagle-firefox-0.3.8-56.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565958" comment="beagle-gui-0.3.8-56.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565959" comment="beagle-lang-0.3.8-56.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565960" comment="libfreebl3-3.14.2-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565961" comment="libfreebl3-32bit-3.14.2-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565962" comment="mhtml-firefox-0.5-1.47.51.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565963" comment="mozilla-nspr-4.9.5-0.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565964" comment="mozilla-nspr-32bit-4.9.5-0.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565965" comment="mozilla-nss-3.14.2-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565966" comment="mozilla-nss-32bit-3.14.2-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565967" comment="mozilla-nss-tools-3.14.2-0.4.3.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0773</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0773" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0773" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0773" ref_url="https://www.suse.com/security/cve/CVE-2013-0773" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0410-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The Chrome Object Wrapper (COW) and System Only Wrapper (SOW) implementations in Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 do not prevent modifications to a prototype, which allows remote attackers to obtain sensitive information from chrome objects or possibly execute arbitrary JavaScript code with chrome privileges via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0773/">CVE-2013-0773</cve>
	<bugzilla href="https://bugzilla.suse.com/804248">SUSE bug 804248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590757" comment="MozillaFirefox-17.0.3esr-0.4.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565953" comment="MozillaFirefox-branding-SLED-7-0.6.9.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590758" comment="MozillaFirefox-translations-17.0.3esr-0.4.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565955" comment="beagle-0.3.8-56.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565956" comment="beagle-evolution-0.3.8-56.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565957" comment="beagle-firefox-0.3.8-56.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565958" comment="beagle-gui-0.3.8-56.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565959" comment="beagle-lang-0.3.8-56.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565960" comment="libfreebl3-3.14.2-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565961" comment="libfreebl3-32bit-3.14.2-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565962" comment="mhtml-firefox-0.5-1.47.51.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565963" comment="mozilla-nspr-4.9.5-0.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565964" comment="mozilla-nspr-32bit-4.9.5-0.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565965" comment="mozilla-nss-3.14.2-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565966" comment="mozilla-nss-32bit-3.14.2-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565967" comment="mozilla-nss-tools-3.14.2-0.4.3.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0774</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0774" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0774" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0774" ref_url="https://www.suse.com/security/cve/CVE-2013-0774" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0410-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 do not prevent JavaScript workers from reading the browser-profile directory name, which has unspecified impact and remote attack vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0774/">CVE-2013-0774</cve>
	<bugzilla href="https://bugzilla.suse.com/804248">SUSE bug 804248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590757" comment="MozillaFirefox-17.0.3esr-0.4.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565953" comment="MozillaFirefox-branding-SLED-7-0.6.9.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590758" comment="MozillaFirefox-translations-17.0.3esr-0.4.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565955" comment="beagle-0.3.8-56.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565956" comment="beagle-evolution-0.3.8-56.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565957" comment="beagle-firefox-0.3.8-56.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565958" comment="beagle-gui-0.3.8-56.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565959" comment="beagle-lang-0.3.8-56.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565960" comment="libfreebl3-3.14.2-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565961" comment="libfreebl3-32bit-3.14.2-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565962" comment="mhtml-firefox-0.5-1.47.51.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565963" comment="mozilla-nspr-4.9.5-0.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565964" comment="mozilla-nspr-32bit-4.9.5-0.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565965" comment="mozilla-nss-3.14.2-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565966" comment="mozilla-nss-32bit-3.14.2-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565967" comment="mozilla-nss-tools-3.14.2-0.4.3.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0775</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0775" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0775" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0775" ref_url="https://www.suse.com/security/cve/CVE-2013-0775" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0410-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsImageLoadingContent::OnStopContainer function in Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 allows remote attackers to execute arbitrary code via crafted web script.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0775/">CVE-2013-0775</cve>
	<bugzilla href="https://bugzilla.suse.com/804248">SUSE bug 804248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590757" comment="MozillaFirefox-17.0.3esr-0.4.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565953" comment="MozillaFirefox-branding-SLED-7-0.6.9.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590758" comment="MozillaFirefox-translations-17.0.3esr-0.4.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565955" comment="beagle-0.3.8-56.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565956" comment="beagle-evolution-0.3.8-56.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565957" comment="beagle-firefox-0.3.8-56.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565958" comment="beagle-gui-0.3.8-56.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565959" comment="beagle-lang-0.3.8-56.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565960" comment="libfreebl3-3.14.2-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565961" comment="libfreebl3-32bit-3.14.2-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565962" comment="mhtml-firefox-0.5-1.47.51.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565963" comment="mozilla-nspr-4.9.5-0.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565964" comment="mozilla-nspr-32bit-4.9.5-0.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565965" comment="mozilla-nss-3.14.2-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565966" comment="mozilla-nss-32bit-3.14.2-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565967" comment="mozilla-nss-tools-3.14.2-0.4.3.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0776</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0776" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0776" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0776" ref_url="https://www.suse.com/security/cve/CVE-2013-0776" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0410-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 allow man-in-the-middle attackers to spoof the address bar by operating a proxy server that provides a 407 HTTP status code accompanied by web script, as demonstrated by a phishing attack on an HTTPS site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0776/">CVE-2013-0776</cve>
	<bugzilla href="https://bugzilla.suse.com/804248">SUSE bug 804248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590757" comment="MozillaFirefox-17.0.3esr-0.4.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565953" comment="MozillaFirefox-branding-SLED-7-0.6.9.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590758" comment="MozillaFirefox-translations-17.0.3esr-0.4.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565955" comment="beagle-0.3.8-56.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565956" comment="beagle-evolution-0.3.8-56.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565957" comment="beagle-firefox-0.3.8-56.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565958" comment="beagle-gui-0.3.8-56.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565959" comment="beagle-lang-0.3.8-56.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565960" comment="libfreebl3-3.14.2-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565961" comment="libfreebl3-32bit-3.14.2-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565962" comment="mhtml-firefox-0.5-1.47.51.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565963" comment="mozilla-nspr-4.9.5-0.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565964" comment="mozilla-nspr-32bit-4.9.5-0.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565965" comment="mozilla-nss-3.14.2-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565966" comment="mozilla-nss-32bit-3.14.2-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565967" comment="mozilla-nss-tools-3.14.2-0.4.3.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130780" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0780</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0780" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0780" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0780" ref_url="https://www.suse.com/security/cve/CVE-2013-0780" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0410-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsOverflowContinuationTracker::Finish function in Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted document that uses Cascading Style Sheets (CSS) -moz-column-* properties.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0780/">CVE-2013-0780</cve>
	<bugzilla href="https://bugzilla.suse.com/804248">SUSE bug 804248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590757" comment="MozillaFirefox-17.0.3esr-0.4.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565953" comment="MozillaFirefox-branding-SLED-7-0.6.9.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590758" comment="MozillaFirefox-translations-17.0.3esr-0.4.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565955" comment="beagle-0.3.8-56.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565956" comment="beagle-evolution-0.3.8-56.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565957" comment="beagle-firefox-0.3.8-56.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565958" comment="beagle-gui-0.3.8-56.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565959" comment="beagle-lang-0.3.8-56.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565960" comment="libfreebl3-3.14.2-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565961" comment="libfreebl3-32bit-3.14.2-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565962" comment="mhtml-firefox-0.5-1.47.51.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565963" comment="mozilla-nspr-4.9.5-0.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565964" comment="mozilla-nspr-32bit-4.9.5-0.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565965" comment="mozilla-nss-3.14.2-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565966" comment="mozilla-nss-32bit-3.14.2-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565967" comment="mozilla-nss-tools-3.14.2-0.4.3.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0782</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0782" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0782" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0782" ref_url="https://www.suse.com/security/cve/CVE-2013-0782" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0410-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the nsSaveAsCharset::DoCharsetConversion function in Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0782/">CVE-2013-0782</cve>
	<bugzilla href="https://bugzilla.suse.com/804248">SUSE bug 804248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590757" comment="MozillaFirefox-17.0.3esr-0.4.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565953" comment="MozillaFirefox-branding-SLED-7-0.6.9.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590758" comment="MozillaFirefox-translations-17.0.3esr-0.4.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565955" comment="beagle-0.3.8-56.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565956" comment="beagle-evolution-0.3.8-56.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565957" comment="beagle-firefox-0.3.8-56.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565958" comment="beagle-gui-0.3.8-56.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565959" comment="beagle-lang-0.3.8-56.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565960" comment="libfreebl3-3.14.2-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565961" comment="libfreebl3-32bit-3.14.2-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565962" comment="mhtml-firefox-0.5-1.47.51.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565963" comment="mozilla-nspr-4.9.5-0.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565964" comment="mozilla-nspr-32bit-4.9.5-0.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565965" comment="mozilla-nss-3.14.2-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565966" comment="mozilla-nss-32bit-3.14.2-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565967" comment="mozilla-nss-tools-3.14.2-0.4.3.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0783</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0783" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0783" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0783" ref_url="https://www.suse.com/security/cve/CVE-2013-0783" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0410-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0783/">CVE-2013-0783</cve>
	<bugzilla href="https://bugzilla.suse.com/804248">SUSE bug 804248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590757" comment="MozillaFirefox-17.0.3esr-0.4.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565953" comment="MozillaFirefox-branding-SLED-7-0.6.9.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590758" comment="MozillaFirefox-translations-17.0.3esr-0.4.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565955" comment="beagle-0.3.8-56.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565956" comment="beagle-evolution-0.3.8-56.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565957" comment="beagle-firefox-0.3.8-56.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565958" comment="beagle-gui-0.3.8-56.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565959" comment="beagle-lang-0.3.8-56.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565960" comment="libfreebl3-3.14.2-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565961" comment="libfreebl3-32bit-3.14.2-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565962" comment="mhtml-firefox-0.5-1.47.51.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565963" comment="mozilla-nspr-4.9.5-0.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565964" comment="mozilla-nspr-32bit-4.9.5-0.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565965" comment="mozilla-nss-3.14.2-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565966" comment="mozilla-nss-32bit-3.14.2-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565967" comment="mozilla-nss-tools-3.14.2-0.4.3.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0787</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0787" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0787" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0787" ref_url="https://www.suse.com/security/cve/CVE-2013-0787" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0431-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0465-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0466-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0467-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0468-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsEditor::IsPreformatted function in editor/libeditor/base/nsEditor.cpp in Mozilla Firefox before 19.0.2, Firefox ESR 17.x before 17.0.4, Thunderbird before 17.0.4, Thunderbird ESR 17.x before 17.0.4, and SeaMonkey before 2.16.1 allows remote attackers to execute arbitrary code via vectors involving an execCommand call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0787/">CVE-2013-0787</cve>
	<bugzilla href="https://bugzilla.suse.com/808243">SUSE bug 808243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565952" comment="MozillaFirefox-17.0.4esr-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565953" comment="MozillaFirefox-branding-SLED-7-0.6.9.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565954" comment="MozillaFirefox-translations-17.0.4esr-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565955" comment="beagle-0.3.8-56.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565956" comment="beagle-evolution-0.3.8-56.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565957" comment="beagle-firefox-0.3.8-56.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565958" comment="beagle-gui-0.3.8-56.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565959" comment="beagle-lang-0.3.8-56.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565960" comment="libfreebl3-3.14.2-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565961" comment="libfreebl3-32bit-3.14.2-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565962" comment="mhtml-firefox-0.5-1.47.51.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565963" comment="mozilla-nspr-4.9.5-0.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565964" comment="mozilla-nspr-32bit-4.9.5-0.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565965" comment="mozilla-nss-3.14.2-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565966" comment="mozilla-nss-32bit-3.14.2-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565967" comment="mozilla-nss-tools-3.14.2-0.4.3.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0788</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0788" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0788" ref_url="https://www.suse.com/security/cve/CVE-2013-0788" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0842-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0843-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0631-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, and SeaMonkey before 2.17 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0788/">CVE-2013-0788</cve>
	<bugzilla href="https://bugzilla.suse.com/813026">SUSE bug 813026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819204">SUSE bug 819204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565978" comment="MozillaFirefox-17.0.6esr-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565969" comment="MozillaFirefox-branding-SLED-7-0.6.9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565979" comment="MozillaFirefox-translations-17.0.6esr-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565971" comment="libfreebl3-3.14.3-0.4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565972" comment="libfreebl3-32bit-3.14.3-0.4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565973" comment="mozilla-nspr-4.9.6-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565974" comment="mozilla-nspr-32bit-4.9.6-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565975" comment="mozilla-nss-3.14.3-0.4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565976" comment="mozilla-nss-32bit-3.14.3-0.4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565977" comment="mozilla-nss-tools-3.14.3-0.4.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0789</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0789" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0789" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0789" ref_url="https://www.suse.com/security/cve/CVE-2013-0789" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0631-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 20.0 and SeaMonkey before 2.17 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the nsContentUtils::HoldJSObjects function and the nsAutoPtr class, and other vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0789/">CVE-2013-0789</cve>
	<bugzilla href="https://bugzilla.suse.com/813026">SUSE bug 813026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819204">SUSE bug 819204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565968" comment="MozillaFirefox-17.0.5esr-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565969" comment="MozillaFirefox-branding-SLED-7-0.6.9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565970" comment="MozillaFirefox-translations-17.0.5esr-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565971" comment="libfreebl3-3.14.3-0.4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565972" comment="libfreebl3-32bit-3.14.3-0.4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565973" comment="mozilla-nspr-4.9.6-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565974" comment="mozilla-nspr-32bit-4.9.6-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565975" comment="mozilla-nss-3.14.3-0.4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565976" comment="mozilla-nss-32bit-3.14.3-0.4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565977" comment="mozilla-nss-tools-3.14.3-0.4.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0790</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0790" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0790" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0790" ref_url="https://www.suse.com/security/cve/CVE-2013-0790" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox before 20.0 on Android allows remote attackers to cause a denial of service (stack memory corruption and application crash) or possibly execute arbitrary code via unknown vectors involving a plug-in.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0790/">CVE-2013-0790</cve>
	<bugzilla href="https://bugzilla.suse.com/813026">SUSE bug 813026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819204">SUSE bug 819204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565968" comment="MozillaFirefox-17.0.5esr-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565969" comment="MozillaFirefox-branding-SLED-7-0.6.9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565970" comment="MozillaFirefox-translations-17.0.5esr-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565971" comment="libfreebl3-3.14.3-0.4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565972" comment="libfreebl3-32bit-3.14.3-0.4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565973" comment="mozilla-nspr-4.9.6-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565974" comment="mozilla-nspr-32bit-4.9.6-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565975" comment="mozilla-nss-3.14.3-0.4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565976" comment="mozilla-nss-32bit-3.14.3-0.4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565977" comment="mozilla-nss-tools-3.14.3-0.4.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0791</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0791" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0791" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0791" ref_url="https://www.suse.com/security/cve/CVE-2013-0791" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0842-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0843-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html" source="SUSE-SU"/>
    <description>
    The CERT_DecodeCertPackage function in Mozilla Network Security Services (NSS), as used in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, SeaMonkey before 2.17, and other products, allows remote attackers to cause a denial of service (out-of-bounds read and memory corruption) via a crafted certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0791/">CVE-2013-0791</cve>
	<bugzilla href="https://bugzilla.suse.com/813026">SUSE bug 813026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819204">SUSE bug 819204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565978" comment="MozillaFirefox-17.0.6esr-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565969" comment="MozillaFirefox-branding-SLED-7-0.6.9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565979" comment="MozillaFirefox-translations-17.0.6esr-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565971" comment="libfreebl3-3.14.3-0.4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565972" comment="libfreebl3-32bit-3.14.3-0.4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565973" comment="mozilla-nspr-4.9.6-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565974" comment="mozilla-nspr-32bit-4.9.6-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565975" comment="mozilla-nss-3.14.3-0.4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565976" comment="mozilla-nss-32bit-3.14.3-0.4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565977" comment="mozilla-nss-tools-3.14.3-0.4.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0792</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0792" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0792" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0792" ref_url="https://www.suse.com/security/cve/CVE-2013-0792" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0842-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0843-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0631-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00041.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 20.0 and SeaMonkey before 2.17, when gfx.color_management.enablev4 is used, do not properly handle color profiles during PNG rendering, which allows remote attackers to obtain sensitive information from process memory or cause a denial of service (memory corruption) via a grayscale PNG image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0792/">CVE-2013-0792</cve>
	<bugzilla href="https://bugzilla.suse.com/813026">SUSE bug 813026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819204">SUSE bug 819204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565978" comment="MozillaFirefox-17.0.6esr-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565969" comment="MozillaFirefox-branding-SLED-7-0.6.9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565979" comment="MozillaFirefox-translations-17.0.6esr-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565971" comment="libfreebl3-3.14.3-0.4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565972" comment="libfreebl3-32bit-3.14.3-0.4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565973" comment="mozilla-nspr-4.9.6-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565974" comment="mozilla-nspr-32bit-4.9.6-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565975" comment="mozilla-nss-3.14.3-0.4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565976" comment="mozilla-nss-32bit-3.14.3-0.4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565977" comment="mozilla-nss-tools-3.14.3-0.4.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0793</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0793" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0793" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0793" ref_url="https://www.suse.com/security/cve/CVE-2013-0793" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0842-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0843-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0631-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, and SeaMonkey before 2.17 do not ensure the correctness of the address bar during history navigation, which allows remote attackers to conduct cross-site scripting (XSS) attacks or phishing attacks by leveraging control over navigation timing.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0793/">CVE-2013-0793</cve>
	<bugzilla href="https://bugzilla.suse.com/819204">SUSE bug 819204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565978" comment="MozillaFirefox-17.0.6esr-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565979" comment="MozillaFirefox-translations-17.0.6esr-0.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0794</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0794" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0794" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0794" ref_url="https://www.suse.com/security/cve/CVE-2013-0794" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0842-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0843-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0631-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00041.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 20.0 and SeaMonkey before 2.17 do not prevent origin spoofing of tab-modal dialogs, which allows remote attackers to conduct phishing attacks via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0794/">CVE-2013-0794</cve>
	<bugzilla href="https://bugzilla.suse.com/813026">SUSE bug 813026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819204">SUSE bug 819204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565978" comment="MozillaFirefox-17.0.6esr-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565969" comment="MozillaFirefox-branding-SLED-7-0.6.9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565979" comment="MozillaFirefox-translations-17.0.6esr-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565971" comment="libfreebl3-3.14.3-0.4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565972" comment="libfreebl3-32bit-3.14.3-0.4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565973" comment="mozilla-nspr-4.9.6-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565974" comment="mozilla-nspr-32bit-4.9.6-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565975" comment="mozilla-nss-3.14.3-0.4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565976" comment="mozilla-nss-32bit-3.14.3-0.4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565977" comment="mozilla-nss-tools-3.14.3-0.4.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0795</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0795" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0795" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0795" ref_url="https://www.suse.com/security/cve/CVE-2013-0795" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0842-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0843-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0631-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The System Only Wrapper (SOW) implementation in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, and SeaMonkey before 2.17 does not prevent use of the cloneNode method for cloning a protected node, which allows remote attackers to bypass the Same Origin Policy or possibly execute arbitrary JavaScript code with chrome privileges via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0795/">CVE-2013-0795</cve>
	<bugzilla href="https://bugzilla.suse.com/813026">SUSE bug 813026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819204">SUSE bug 819204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565978" comment="MozillaFirefox-17.0.6esr-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565969" comment="MozillaFirefox-branding-SLED-7-0.6.9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565979" comment="MozillaFirefox-translations-17.0.6esr-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565971" comment="libfreebl3-3.14.3-0.4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565972" comment="libfreebl3-32bit-3.14.3-0.4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565973" comment="mozilla-nspr-4.9.6-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565974" comment="mozilla-nspr-32bit-4.9.6-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565975" comment="mozilla-nss-3.14.3-0.4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565976" comment="mozilla-nss-32bit-3.14.3-0.4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565977" comment="mozilla-nss-tools-3.14.3-0.4.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0796</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0796" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0796" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0796" ref_url="https://www.suse.com/security/cve/CVE-2013-0796" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0842-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0843-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0631-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The WebGL subsystem in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, and SeaMonkey before 2.17 on Linux does not properly interact with Mesa drivers, which allows remote attackers to execute arbitrary code or cause a denial of service (free of unallocated memory) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0796/">CVE-2013-0796</cve>
	<bugzilla href="https://bugzilla.suse.com/813026">SUSE bug 813026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819204">SUSE bug 819204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565978" comment="MozillaFirefox-17.0.6esr-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565969" comment="MozillaFirefox-branding-SLED-7-0.6.9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565979" comment="MozillaFirefox-translations-17.0.6esr-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565971" comment="libfreebl3-3.14.3-0.4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565972" comment="libfreebl3-32bit-3.14.3-0.4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565973" comment="mozilla-nspr-4.9.6-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565974" comment="mozilla-nspr-32bit-4.9.6-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565975" comment="mozilla-nss-3.14.3-0.4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565976" comment="mozilla-nss-32bit-3.14.3-0.4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565977" comment="mozilla-nss-tools-3.14.3-0.4.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0797</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0797" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0797" ref_url="https://www.suse.com/security/cve/CVE-2013-0797" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0842-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0843-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
    <description>
    Untrusted search path vulnerability in the Mozilla Updater in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, and SeaMonkey before 2.17 allows local users to gain privileges via a Trojan horse DLL file in an unspecified directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0797/">CVE-2013-0797</cve>
	<bugzilla href="https://bugzilla.suse.com/813026">SUSE bug 813026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819204">SUSE bug 819204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565978" comment="MozillaFirefox-17.0.6esr-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565969" comment="MozillaFirefox-branding-SLED-7-0.6.9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565979" comment="MozillaFirefox-translations-17.0.6esr-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565971" comment="libfreebl3-3.14.3-0.4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565972" comment="libfreebl3-32bit-3.14.3-0.4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565973" comment="mozilla-nspr-4.9.6-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565974" comment="mozilla-nspr-32bit-4.9.6-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565975" comment="mozilla-nss-3.14.3-0.4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565976" comment="mozilla-nss-32bit-3.14.3-0.4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565977" comment="mozilla-nss-tools-3.14.3-0.4.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0798</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0798" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0798" ref_url="https://www.suse.com/security/cve/CVE-2013-0798" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 20.0 on Android uses world-writable and world-readable permissions for the app_tmp installation directory in the local filesystem, which allows attackers to modify add-ons before installation via an application that leverages the time window during which app_tmp is used.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0798/">CVE-2013-0798</cve>
	<bugzilla href="https://bugzilla.suse.com/813026">SUSE bug 813026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819204">SUSE bug 819204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565968" comment="MozillaFirefox-17.0.5esr-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565969" comment="MozillaFirefox-branding-SLED-7-0.6.9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565970" comment="MozillaFirefox-translations-17.0.5esr-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565971" comment="libfreebl3-3.14.3-0.4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565972" comment="libfreebl3-32bit-3.14.3-0.4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565973" comment="mozilla-nspr-4.9.6-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565974" comment="mozilla-nspr-32bit-4.9.6-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565975" comment="mozilla-nss-3.14.3-0.4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565976" comment="mozilla-nss-32bit-3.14.3-0.4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565977" comment="mozilla-nss-tools-3.14.3-0.4.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0799</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0799" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0799" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0799" ref_url="https://www.suse.com/security/cve/CVE-2013-0799" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0842-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0843-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the Mozilla Maintenance Service in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, and Thunderbird ESR 17.x before 17.0.5 on Windows allows local users to gain privileges via crafted arguments.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0799/">CVE-2013-0799</cve>
	<bugzilla href="https://bugzilla.suse.com/813026">SUSE bug 813026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819204">SUSE bug 819204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565978" comment="MozillaFirefox-17.0.6esr-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565969" comment="MozillaFirefox-branding-SLED-7-0.6.9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565979" comment="MozillaFirefox-translations-17.0.6esr-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565971" comment="libfreebl3-3.14.3-0.4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565972" comment="libfreebl3-32bit-3.14.3-0.4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565973" comment="mozilla-nspr-4.9.6-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565974" comment="mozilla-nspr-32bit-4.9.6-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565975" comment="mozilla-nss-3.14.3-0.4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565976" comment="mozilla-nss-32bit-3.14.3-0.4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565977" comment="mozilla-nss-tools-3.14.3-0.4.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0800</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0800" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0800" ref_url="https://www.suse.com/security/cve/CVE-2013-0800" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0842-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0843-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0631-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Integer signedness error in the pixman_fill_sse2 function in pixman-sse2.c in Pixman, as distributed with Cairo and used in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, SeaMonkey before 2.17, and other products, allows remote attackers to execute arbitrary code via crafted values that trigger attempted use of a (1) negative box boundary or (2) negative box size, leading to an out-of-bounds write operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0800/">CVE-2013-0800</cve>
	<bugzilla href="https://bugzilla.suse.com/813026">SUSE bug 813026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819204">SUSE bug 819204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565978" comment="MozillaFirefox-17.0.6esr-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565969" comment="MozillaFirefox-branding-SLED-7-0.6.9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565979" comment="MozillaFirefox-translations-17.0.6esr-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565971" comment="libfreebl3-3.14.3-0.4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565972" comment="libfreebl3-32bit-3.14.3-0.4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565973" comment="mozilla-nspr-4.9.6-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565974" comment="mozilla-nspr-32bit-4.9.6-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565975" comment="mozilla-nss-3.14.3-0.4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565976" comment="mozilla-nss-32bit-3.14.3-0.4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565977" comment="mozilla-nss-tools-3.14.3-0.4.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0809</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0809" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0809" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0809" ref_url="https://www.suse.com/security/cve/CVE-2013-0809" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0434-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0430-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0438-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0509-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00078.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the 2D component in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 15 and earlier, 6 Update 41 and earlier, and 5.0 Update 40 and earlier allows remote attackers to execute arbitrary code via unknown vectors, a different vulnerability than CVE-2013-1493.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0809/">CVE-2013-0809</cve>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/807487">SUSE bug 807487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/809386">SUSE bug 809386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813939">SUSE bug 813939</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590767" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.4-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590768" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.4-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590769" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.4-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0871</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0871" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0871" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0871" ref_url="https://www.suse.com/security/cve/CVE-2013-0871" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0341-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0674-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0396-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0925-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0927-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00064.html" source="SUSE-SU"/>
    <description>
    Race condition in the ptrace functionality in the Linux kernel before 3.7.5 allows local users to gain privileges via a PTRACE_SETREGS ptrace system call in a crafted application, as demonstrated by ptrace_death.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-19"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0871/">CVE-2013-0871</cve>
	<bugzilla href="https://bugzilla.suse.com/804154">SUSE bug 804154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/804227">SUSE bug 804227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/841063">SUSE bug 841063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590770" comment="kernel-default-3.0.58-0.6.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590771" comment="kernel-default-base-3.0.58-0.6.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590772" comment="kernel-default-devel-3.0.58-0.6.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590773" comment="kernel-default-extra-3.0.58-0.6.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590774" comment="kernel-source-3.0.58-0.6.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590775" comment="kernel-syms-3.0.58-0.6.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590776" comment="kernel-trace-3.0.58-0.6.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590777" comment="kernel-trace-base-3.0.58-0.6.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590778" comment="kernel-trace-devel-3.0.58-0.6.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590779" comment="kernel-trace-extra-3.0.58-0.6.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590780" comment="kernel-xen-3.0.58-0.6.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590781" comment="kernel-xen-base-3.0.58-0.6.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590782" comment="kernel-xen-devel-3.0.58-0.6.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590783" comment="kernel-xen-extra-3.0.58-0.6.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590784" comment="xen-kmp-default-4.1.3_06_3.0.58_0.6.6-0.7.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590785" comment="xen-kmp-trace-4.1.3_06_3.0.58_0.6.6-0.7.22 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0913</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0913" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0913" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0913" ref_url="https://www.suse.com/security/cve/CVE-2013-0913" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0759-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0759-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0824-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0847-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0923-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0925-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html" source="SUSE-SU"/>
    <description>
    Integer overflow in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the i915 driver in the Direct Rendering Manager (DRM) subsystem in the Linux kernel through 3.8.3, as used in Google Chrome OS before 25.0.1364.173 and other products, allows local users to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted application that triggers many relocation copies, and potentially leads to a race condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0913/">CVE-2013-0913</cve>
	<bugzilla href="https://bugzilla.suse.com/808829">SUSE bug 808829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589566" comment="kernel-default-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589567" comment="kernel-default-base-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589568" comment="kernel-default-devel-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589569" comment="kernel-default-extra-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589570" comment="kernel-source-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589571" comment="kernel-syms-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589572" comment="kernel-trace-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589573" comment="kernel-trace-base-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589574" comment="kernel-trace-devel-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589575" comment="kernel-trace-extra-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589576" comment="kernel-xen-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589577" comment="kernel-xen-base-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589578" comment="kernel-xen-devel-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589579" comment="kernel-xen-extra-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589580" comment="xen-kmp-default-4.1.4_02_3.0.74_0.6.6-0.5.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589581" comment="xen-kmp-trace-4.1.4_02_3.0.74_0.6.6-0.5.22 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0914</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0914" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0914" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0914" ref_url="https://www.suse.com/security/cve/CVE-2013-0914" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0759-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0759-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1187-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1971-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00129.html" source="SUSE-SU"/>
    <description>
    The flush_signal_handlers function in kernel/signal.c in the Linux kernel before 3.8.4 preserves the value of the sa_restorer field across an exec operation, which makes it easier for local users to bypass the ASLR protection mechanism via a crafted application containing a sigaction system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-0914/">CVE-2013-0914</cve>
	<bugzilla href="https://bugzilla.suse.com/808827">SUSE bug 808827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589566" comment="kernel-default-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589567" comment="kernel-default-base-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589568" comment="kernel-default-devel-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589569" comment="kernel-default-extra-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589570" comment="kernel-source-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589571" comment="kernel-syms-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589572" comment="kernel-trace-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589573" comment="kernel-trace-base-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589574" comment="kernel-trace-devel-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589575" comment="kernel-trace-extra-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589576" comment="kernel-xen-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589577" comment="kernel-xen-base-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589578" comment="kernel-xen-devel-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589579" comment="kernel-xen-extra-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589580" comment="xen-kmp-default-4.1.4_02_3.0.74_0.6.6-0.5.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589581" comment="xen-kmp-trace-4.1.4_02_3.0.74_0.6.6-0.5.22 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1059</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1059" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1059" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1059" ref_url="https://www.suse.com/security/cve/CVE-2013-1059" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1161-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1474-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000608.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1773-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00106.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1971-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00129.html" source="SUSE-SU"/>
    <description>
    net/ceph/auth_none.c in the Linux kernel through 3.10 allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via an auth_reply message that triggers an attempted build_request operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1059/">CVE-2013-1059</cve>
	<bugzilla href="https://bugzilla.suse.com/826350">SUSE bug 826350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882913">SUSE bug 882913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590816" comment="kernel-default-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590817" comment="kernel-default-base-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590818" comment="kernel-default-devel-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590819" comment="kernel-default-extra-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590820" comment="kernel-source-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590821" comment="kernel-syms-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590822" comment="kernel-trace-devel-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590823" comment="kernel-xen-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590824" comment="kernel-xen-base-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590825" comment="kernel-xen-devel-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590826" comment="kernel-xen-extra-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590827" comment="xen-kmp-default-4.2.2_06_3.0.93_0.8-0.7.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590800" comment="kernel-default-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590801" comment="kernel-default-base-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590802" comment="kernel-default-devel-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590803" comment="kernel-default-extra-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590804" comment="kernel-source-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590805" comment="kernel-syms-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590806" comment="kernel-trace-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590807" comment="kernel-trace-base-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590808" comment="kernel-trace-devel-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590809" comment="kernel-trace-extra-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590810" comment="kernel-xen-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590811" comment="kernel-xen-base-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590812" comment="kernel-xen-devel-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590813" comment="kernel-xen-extra-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590814" comment="xen-kmp-default-4.1.5_02_3.0.93_0.5-0.5.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590815" comment="xen-kmp-trace-4.1.5_02_3.0.93_0.5-0.5.39 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131365" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1365</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1365" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1365" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1365" ref_url="https://www.suse.com/security/cve/CVE-2013-1365" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0296-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00011.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on Windows, before 10.3.183.61 and 11.x before 11.6.602.167 on Mac OS X, before 10.3.183.61 and 11.x before 11.2.202.270 on Linux, before 11.1.111.43 on Android 2.x and 3.x, and before 11.1.115.47 on Android 4.x; Adobe AIR before 3.6.0.597; and Adobe AIR SDK before 3.6.0.599 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-0642, CVE-2013-0645, CVE-2013-1366, CVE-2013-1367, CVE-2013-1368, CVE-2013-1369, CVE-2013-1370, CVE-2013-1372, and CVE-2013-1373.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1365/">CVE-2013-1365</cve>
	<bugzilla href="https://bugzilla.suse.com/803485">SUSE bug 803485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590745" comment="flash-player-11.2.202.270-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590746" comment="flash-player-gnome-11.2.202.270-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590747" comment="flash-player-kde4-11.2.202.270-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131366" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1366</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1366" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1366" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1366" ref_url="https://www.suse.com/security/cve/CVE-2013-1366" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0296-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00011.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on Windows, before 10.3.183.61 and 11.x before 11.6.602.167 on Mac OS X, before 10.3.183.61 and 11.x before 11.2.202.270 on Linux, before 11.1.111.43 on Android 2.x and 3.x, and before 11.1.115.47 on Android 4.x; Adobe AIR before 3.6.0.597; and Adobe AIR SDK before 3.6.0.599 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-0642, CVE-2013-0645, CVE-2013-1365, CVE-2013-1367, CVE-2013-1368, CVE-2013-1369, CVE-2013-1370, CVE-2013-1372, and CVE-2013-1373.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1366/">CVE-2013-1366</cve>
	<bugzilla href="https://bugzilla.suse.com/803485">SUSE bug 803485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590745" comment="flash-player-11.2.202.270-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590746" comment="flash-player-gnome-11.2.202.270-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590747" comment="flash-player-kde4-11.2.202.270-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131367" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1367</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1367" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1367" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1367" ref_url="https://www.suse.com/security/cve/CVE-2013-1367" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0296-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00011.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on Windows, before 10.3.183.61 and 11.x before 11.6.602.167 on Mac OS X, before 10.3.183.61 and 11.x before 11.2.202.270 on Linux, before 11.1.111.43 on Android 2.x and 3.x, and before 11.1.115.47 on Android 4.x; Adobe AIR before 3.6.0.597; and Adobe AIR SDK before 3.6.0.599 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-0642, CVE-2013-0645, CVE-2013-1365, CVE-2013-1366, CVE-2013-1368, CVE-2013-1369, CVE-2013-1370, CVE-2013-1372, and CVE-2013-1373.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1367/">CVE-2013-1367</cve>
	<bugzilla href="https://bugzilla.suse.com/803485">SUSE bug 803485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590745" comment="flash-player-11.2.202.270-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590746" comment="flash-player-gnome-11.2.202.270-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590747" comment="flash-player-kde4-11.2.202.270-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1368</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1368" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1368" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1368" ref_url="https://www.suse.com/security/cve/CVE-2013-1368" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0296-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00011.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on Windows, before 10.3.183.61 and 11.x before 11.6.602.167 on Mac OS X, before 10.3.183.61 and 11.x before 11.2.202.270 on Linux, before 11.1.111.43 on Android 2.x and 3.x, and before 11.1.115.47 on Android 4.x; Adobe AIR before 3.6.0.597; and Adobe AIR SDK before 3.6.0.599 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-0642, CVE-2013-0645, CVE-2013-1365, CVE-2013-1366, CVE-2013-1367, CVE-2013-1369, CVE-2013-1370, CVE-2013-1372, and CVE-2013-1373.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1368/">CVE-2013-1368</cve>
	<bugzilla href="https://bugzilla.suse.com/803485">SUSE bug 803485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590745" comment="flash-player-11.2.202.270-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590746" comment="flash-player-gnome-11.2.202.270-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590747" comment="flash-player-kde4-11.2.202.270-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131369" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1369</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1369" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1369" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1369" ref_url="https://www.suse.com/security/cve/CVE-2013-1369" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0296-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00011.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on Windows, before 10.3.183.61 and 11.x before 11.6.602.167 on Mac OS X, before 10.3.183.61 and 11.x before 11.2.202.270 on Linux, before 11.1.111.43 on Android 2.x and 3.x, and before 11.1.115.47 on Android 4.x; Adobe AIR before 3.6.0.597; and Adobe AIR SDK before 3.6.0.599 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-0642, CVE-2013-0645, CVE-2013-1365, CVE-2013-1366, CVE-2013-1367, CVE-2013-1368, CVE-2013-1370, CVE-2013-1372, and CVE-2013-1373.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1369/">CVE-2013-1369</cve>
	<bugzilla href="https://bugzilla.suse.com/803485">SUSE bug 803485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590745" comment="flash-player-11.2.202.270-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590746" comment="flash-player-gnome-11.2.202.270-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590747" comment="flash-player-kde4-11.2.202.270-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1370</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1370" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1370" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1370" ref_url="https://www.suse.com/security/cve/CVE-2013-1370" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0296-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00011.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on Windows, before 10.3.183.61 and 11.x before 11.6.602.167 on Mac OS X, before 10.3.183.61 and 11.x before 11.2.202.270 on Linux, before 11.1.111.43 on Android 2.x and 3.x, and before 11.1.115.47 on Android 4.x; Adobe AIR before 3.6.0.597; and Adobe AIR SDK before 3.6.0.599 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-0642, CVE-2013-0645, CVE-2013-1365, CVE-2013-1366, CVE-2013-1367, CVE-2013-1368, CVE-2013-1369, CVE-2013-1372, and CVE-2013-1373.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1370/">CVE-2013-1370</cve>
	<bugzilla href="https://bugzilla.suse.com/803485">SUSE bug 803485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590745" comment="flash-player-11.2.202.270-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590746" comment="flash-player-gnome-11.2.202.270-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590747" comment="flash-player-kde4-11.2.202.270-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1371</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1371" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1371" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1371" ref_url="https://www.suse.com/security/cve/CVE-2013-1371" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00021.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK &amp; Compiler before 3.6.0.6090 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1371/">CVE-2013-1371</cve>
	<bugzilla href="https://bugzilla.suse.com/808973">SUSE bug 808973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590754" comment="flash-player-11.2.202.275-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590755" comment="flash-player-gnome-11.2.202.275-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590756" comment="flash-player-kde4-11.2.202.275-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1372</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1372" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1372" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1372" ref_url="https://www.suse.com/security/cve/CVE-2013-1372" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0296-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00011.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on Windows, before 10.3.183.61 and 11.x before 11.6.602.167 on Mac OS X, before 10.3.183.61 and 11.x before 11.2.202.270 on Linux, before 11.1.111.43 on Android 2.x and 3.x, and before 11.1.115.47 on Android 4.x; Adobe AIR before 3.6.0.597; and Adobe AIR SDK before 3.6.0.599 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-0642, CVE-2013-0645, CVE-2013-1365, CVE-2013-1366, CVE-2013-1367, CVE-2013-1368, CVE-2013-1369, CVE-2013-1370, and CVE-2013-1373.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1372/">CVE-2013-1372</cve>
	<bugzilla href="https://bugzilla.suse.com/803485">SUSE bug 803485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590745" comment="flash-player-11.2.202.270-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590746" comment="flash-player-gnome-11.2.202.270-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590747" comment="flash-player-kde4-11.2.202.270-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1373</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1373" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1373" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1373" ref_url="https://www.suse.com/security/cve/CVE-2013-1373" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0296-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00011.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on Windows, before 10.3.183.61 and 11.x before 11.6.602.167 on Mac OS X, before 10.3.183.61 and 11.x before 11.2.202.270 on Linux, before 11.1.111.43 on Android 2.x and 3.x, and before 11.1.115.47 on Android 4.x; Adobe AIR before 3.6.0.597; and Adobe AIR SDK before 3.6.0.599 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-0642, CVE-2013-0645, CVE-2013-1365, CVE-2013-1366, CVE-2013-1367, CVE-2013-1368, CVE-2013-1369, CVE-2013-1370, and CVE-2013-1372.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1373/">CVE-2013-1373</cve>
	<bugzilla href="https://bugzilla.suse.com/803485">SUSE bug 803485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590745" comment="flash-player-11.2.202.270-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590746" comment="flash-player-gnome-11.2.202.270-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590747" comment="flash-player-kde4-11.2.202.270-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1374</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1374" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1374" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1374" ref_url="https://www.suse.com/security/cve/CVE-2013-1374" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0296-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0295-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00011.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on Windows, before 10.3.183.61 and 11.x before 11.6.602.167 on Mac OS X, before 10.3.183.61 and 11.x before 11.2.202.270 on Linux, before 11.1.111.43 on Android 2.x and 3.x, and before 11.1.115.47 on Android 4.x; Adobe AIR before 3.6.0.597; and Adobe AIR SDK before 3.6.0.599 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-0644 and CVE-2013-0649.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1374/">CVE-2013-1374</cve>
	<bugzilla href="https://bugzilla.suse.com/803485">SUSE bug 803485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590745" comment="flash-player-11.2.202.270-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590746" comment="flash-player-gnome-11.2.202.270-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590747" comment="flash-player-kde4-11.2.202.270-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1375</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1375" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1375" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1375" ref_url="https://www.suse.com/security/cve/CVE-2013-1375" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00021.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK &amp; Compiler before 3.6.0.6090 allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1375/">CVE-2013-1375</cve>
	<bugzilla href="https://bugzilla.suse.com/808973">SUSE bug 808973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590754" comment="flash-player-11.2.202.275-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590755" comment="flash-player-gnome-11.2.202.275-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590756" comment="flash-player-kde4-11.2.202.275-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1378</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1378" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1378" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1378" ref_url="https://www.suse.com/security/cve/CVE-2013-1378" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0670-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0670-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0672-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00019.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.75 and 11.x before 11.7.700.169 on Windows and Mac OS X, before 10.3.183.75 and 11.x before 11.2.202.280 on Linux, before 11.1.111.50 on Android 2.x and 3.x, and before 11.1.115.54 on Android 4.x; Adobe AIR before 3.7.0.1530; and Adobe AIR SDK &amp; Compiler before 3.7.0.1530 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-1380.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1378/">CVE-2013-1378</cve>
	<bugzilla href="https://bugzilla.suse.com/814635">SUSE bug 814635</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590896" comment="flash-player-11.2.202.280-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590897" comment="flash-player-gnome-11.2.202.280-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590898" comment="flash-player-kde4-11.2.202.280-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1379</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1379" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1379" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1379" ref_url="https://www.suse.com/security/cve/CVE-2013-1379" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0670-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0670-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0672-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00019.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.75 and 11.x before 11.7.700.169 on Windows and Mac OS X, before 10.3.183.75 and 11.x before 11.2.202.280 on Linux, before 11.1.111.50 on Android 2.x and 3.x, and before 11.1.115.54 on Android 4.x; Adobe AIR before 3.7.0.1530; and Adobe AIR SDK &amp; Compiler before 3.7.0.1530 do not properly initialize pointer arrays, which allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1379/">CVE-2013-1379</cve>
	<bugzilla href="https://bugzilla.suse.com/814635">SUSE bug 814635</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590896" comment="flash-player-11.2.202.280-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590897" comment="flash-player-gnome-11.2.202.280-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590898" comment="flash-player-kde4-11.2.202.280-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1380</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1380" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1380" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1380" ref_url="https://www.suse.com/security/cve/CVE-2013-1380" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0670-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0670-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0672-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00019.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.75 and 11.x before 11.7.700.169 on Windows and Mac OS X, before 10.3.183.75 and 11.x before 11.2.202.280 on Linux, before 11.1.111.50 on Android 2.x and 3.x, and before 11.1.115.54 on Android 4.x; Adobe AIR before 3.7.0.1530; and Adobe AIR SDK &amp; Compiler before 3.7.0.1530 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-1378.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1380/">CVE-2013-1380</cve>
	<bugzilla href="https://bugzilla.suse.com/814635">SUSE bug 814635</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590896" comment="flash-player-11.2.202.280-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590897" comment="flash-player-gnome-11.2.202.280-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590898" comment="flash-player-kde4-11.2.202.280-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1415</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1415" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1415" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1415" ref_url="https://www.suse.com/security/cve/CVE-2013-1415" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0498-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0523-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00090.html" source="SUSE-SU"/>
    <description>
    The pkinit_check_kdc_pkid function in plugins/preauth/pkinit/pkinit_crypto_openssl.c in the PKINIT implementation in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.4 and 1.11.x before 1.11.1 does not properly handle errors during extraction of fields from an X.509 certificate, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a malformed KRB5_PADATA_PK_AS_REQ AS-REQ request.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1415/">CVE-2013-1415</cve>
	<bugzilla href="https://bugzilla.suse.com/806715">SUSE bug 806715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590899" comment="krb5-1.6.3-133.49.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590900" comment="krb5-32bit-1.6.3-133.49.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590901" comment="krb5-client-1.6.3-133.49.54.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1418</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1418" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1418" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1418" ref_url="https://www.suse.com/security/cve/CVE-2013-1418" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000664.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1738-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1751-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1833-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00026.html" source="SUSE-SU"/>
    <description>
    The setup_server_realm function in main.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.7, when multiple realms are configured, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted request.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1418/">CVE-2013-1418</cve>
	<bugzilla href="https://bugzilla.suse.com/849240">SUSE bug 849240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866059">SUSE bug 866059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879587">SUSE bug 879587</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566055" comment="krb5-1.6.3-133.49.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566056" comment="krb5-32bit-1.6.3-133.49.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566057" comment="krb5-client-1.6.3-133.49.58.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1432</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1432" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1432" ref_url="https://www.suse.com/security/cve/CVE-2013-1432" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1392-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1404-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00007.html" source="SUSE-SU"/>
    <description>
    Xen 4.1.x and 4.2.x, when the XSA-45 patch is in place, does not properly maintain references on pages stored for deferred cleanup, which allows local PV guest kernels to cause a denial of service (premature page free and hypervisor crash) or possibly gain privileges via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1432/">CVE-2013-1432</cve>
	<bugzilla href="https://bugzilla.suse.com/823011">SUSE bug 823011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826882">SUSE bug 826882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566249" comment="xen-4.1.6_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566250" comment="xen-doc-html-4.1.6_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566251" comment="xen-doc-pdf-4.1.6_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566252" comment="xen-kmp-default-4.1.6_02_3.0.93_0.5-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566253" comment="xen-kmp-pae-4.1.6_02_3.0.93_0.5-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566254" comment="xen-kmp-trace-4.1.6_02_3.0.93_0.5-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566255" comment="xen-libs-4.1.6_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566256" comment="xen-libs-32bit-4.1.6_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566257" comment="xen-tools-4.1.6_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566258" comment="xen-tools-domU-4.1.6_02-0.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567207" comment="xen-4.2.3_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567208" comment="xen-doc-html-4.2.3_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567209" comment="xen-doc-pdf-4.2.3_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567210" comment="xen-kmp-default-4.2.3_02_3.0.93_0.8-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567211" comment="xen-kmp-pae-4.2.3_02_3.0.93_0.8-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567212" comment="xen-libs-4.2.3_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567213" comment="xen-libs-32bit-4.2.3_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567214" comment="xen-tools-4.2.3_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567215" comment="xen-tools-domU-4.2.3_02-0.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1442</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1442" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1442" ref_url="https://www.suse.com/security/cve/CVE-2013-1442" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1636-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1953-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00115.html" source="SUSE-SU"/>
    <description>
    Xen 4.0 through 4.3.x, when using AVX or LWP capable CPUs, does not properly clear previous data from registers when using an XSAVE or XRSTOR to extend the state components of a saved or restored vCPU after touching other restored extended registers, which allows local guest OSes to obtain sensitive information by reading the registers.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1442/">CVE-2013-1442</cve>
	<bugzilla href="https://bugzilla.suse.com/839596">SUSE bug 839596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566249" comment="xen-4.1.6_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566250" comment="xen-doc-html-4.1.6_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566251" comment="xen-doc-pdf-4.1.6_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566252" comment="xen-kmp-default-4.1.6_02_3.0.93_0.5-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566253" comment="xen-kmp-pae-4.1.6_02_3.0.93_0.5-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566254" comment="xen-kmp-trace-4.1.6_02_3.0.93_0.5-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566255" comment="xen-libs-4.1.6_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566256" comment="xen-libs-32bit-4.1.6_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566257" comment="xen-tools-4.1.6_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566258" comment="xen-tools-domU-4.1.6_02-0.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567207" comment="xen-4.2.3_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567208" comment="xen-doc-html-4.2.3_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567209" comment="xen-doc-pdf-4.2.3_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567210" comment="xen-kmp-default-4.2.3_02_3.0.93_0.8-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567211" comment="xen-kmp-pae-4.2.3_02_3.0.93_0.8-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567212" comment="xen-libs-4.2.3_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567213" comment="xen-libs-32bit-4.2.3_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567214" comment="xen-tools-4.2.3_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567215" comment="xen-tools-domU-4.2.3_02-0.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1475</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1475" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1475" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1475" ref_url="https://www.suse.com/security/cve/CVE-2013-1475" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "IIOP type reuse management" in ObjectStreamClass.java.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1475/">CVE-2013-1475</cve>
	<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590731" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.2-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590732" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.2-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590733" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.2-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1476</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1476" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1476" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1476" ref_url="https://www.suse.com/security/cve/CVE-2013-1476" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2013-0441 and CVE-2013-1475.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass Java sandbox restrictions via "certain value handler constructors."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1476/">CVE-2013-1476</cve>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590731" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.2-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590732" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.2-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590733" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.2-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1478</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1478" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1478" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1478" ref_url="https://www.suse.com/security/cve/CVE-2013-1478" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "insufficient validation of raster parameters" that can trigger an integer overflow and memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1478/">CVE-2013-1478</cve>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590731" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.2-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590732" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.2-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590733" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.2-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1480</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1480" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1480" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1480" ref_url="https://www.suse.com/security/cve/CVE-2013-1480" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "insufficient validation of raster parameters" in awt_parseImage.c, which triggers memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1480/">CVE-2013-1480</cve>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590731" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.2-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590732" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.2-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590733" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.2-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1486</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1486" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1486" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1486" ref_url="https://www.suse.com/security/cve/CVE-2013-1486" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00002.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 13 and earlier, 6 Update 39 and earlier, and 5.0 Update 39 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1486/">CVE-2013-1486</cve>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/804654">SUSE bug 804654</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590590" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.3-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590591" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.3-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590592" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.3-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1488</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1488" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1488" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1488" ref_url="https://www.suse.com/security/cve/CVE-2013-1488" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0745-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0777-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0964-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0993-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00129.html" source="SUSE-SU"/>
    <description>
    The Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, and OpenJDK 6 and 7, allows remote attackers to execute arbitrary code via unspecified vectors involving reflection, Libraries, "improper toString calls," and the JDBC driver manager, as demonstrated by James Forshaw during a Pwn2Own competition at CanSecWest 2013.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1488/">CVE-2013-1488</cve>
	<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590718" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590719" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590720" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.5-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1493</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1493" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1493" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1493" ref_url="https://www.suse.com/security/cve/CVE-2013-1493" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0434-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0430-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0438-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0509-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00078.html" source="SUSE-SU"/>
    <description>
    The color management (CMM) functionality in the 2D component in Oracle Java SE 7 Update 15 and earlier, 6 Update 41 and earlier, and 5.0 Update 40 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (crash) via an image with crafted raster parameters, which triggers (1) an out-of-bounds read or (2) memory corruption in the JVM, as exploited in the wild in February 2013.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1493/">CVE-2013-1493</cve>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/807487">SUSE bug 807487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/809386">SUSE bug 809386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813939">SUSE bug 813939</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590767" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.4-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590768" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.4-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590769" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.4-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1500</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1500" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1500" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1500" ref_url="https://www.suse.com/security/cve/CVE-2013-1500" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1264-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows local users to affect confidentiality and integrity via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to weak permissions for shared memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1500/">CVE-2013-1500</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590914" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590915" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590916" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590917" comment="java-1_7_0-openjdk-1.7.0.6-0.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590918" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590919" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.19.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1518</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1518" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1518" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1518" ref_url="https://www.suse.com/security/cve/CVE-2013-1518" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0745-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0777-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0964-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0993-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00129.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JAXP.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "missing security restrictions."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1518/">CVE-2013-1518</cve>
	<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590718" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590719" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590720" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.5-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1537</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1537" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1537" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1537" ref_url="https://www.suse.com/security/cve/CVE-2013-1537" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0934-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0745-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0777-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0964-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0993-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00129.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to the default java.rmi.server.useCodebaseOnly setting of false, which allows remote attackers to perform "dynamic class downloading" and execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1537/">CVE-2013-1537</cve>
	<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590718" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590719" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590720" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.5-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1557</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1557" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1557" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1557" ref_url="https://www.suse.com/security/cve/CVE-2013-1557" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0934-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0745-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0777-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0964-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0993-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00129.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "missing security restrictions" in the LogStream.setDefaultStream method.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1557/">CVE-2013-1557</cve>
	<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590718" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590719" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590720" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.5-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1569</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1569" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1569" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1569" ref_url="https://www.suse.com/security/cve/CVE-2013-1569" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0934-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0745-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0777-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0964-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0993-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00129.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "checking of [a] glyph table" in the International Components for Unicode (ICU) Layout Engine before 51.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-13"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1569/">CVE-2013-1569</cve>
	<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590718" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590719" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590720" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.5-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1571</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1571" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1571" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1571" ref_url="https://www.suse.com/security/cve/CVE-2013-1571" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="TID7021300" ref_url="https://www.suse.com/support/kb/doc/?id=7021300" source="SUSE-SU"/>
		<reference ref_id="TID7021433" ref_url="https://www.suse.com/support/kb/doc/?id=7021433" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Javadoc component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier; JavaFX 2.2.21 and earlier; and OpenJDK 7 allows remote attackers to affect integrity via unknown vectors related to Javadoc. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to frame injection in HTML that is generated by Javadoc.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1571/">CVE-2013-1571</cve>
	<bugzilla href="https://bugzilla.suse.com/824397">SUSE bug 824397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590914" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590915" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590916" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590917" comment="java-1_7_0-openjdk-1.7.0.6-0.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590918" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590919" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.19.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1572</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1572" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1572" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1572" ref_url="https://www.suse.com/security/cve/CVE-2013-1572" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0276-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0285-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00037.html" source="SUSE-SU"/>
    <description>
    The dissect_oampdu_event_notification function in epan/dissectors/packet-slowprotocols.c in the IEEE 802.3 Slow Protocols dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle certain short lengths, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1572/">CVE-2013-1572</cve>
	<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590928" comment="wireshark-1.8.5-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1573</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1573" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1573" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1573" ref_url="https://www.suse.com/security/cve/CVE-2013-1573" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0276-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0285-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00037.html" source="SUSE-SU"/>
    <description>
    The csnStreamDissector function in epan/dissectors/packet-csn1.c in the CSN.1 dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle a large number of padding bits, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1573/">CVE-2013-1573</cve>
	<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590928" comment="wireshark-1.8.5-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1574</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1574" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1574" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1574" ref_url="https://www.suse.com/security/cve/CVE-2013-1574" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0276-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0285-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00037.html" source="SUSE-SU"/>
    <description>
    The dissect_bthci_eir_ad_data function in epan/dissectors/packet-bthci_cmd.c in the Bluetooth HCI dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 uses an incorrect data type for a counter variable, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1574/">CVE-2013-1574</cve>
	<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590928" comment="wireshark-1.8.5-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1575</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1575" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1575" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1575" ref_url="https://www.suse.com/security/cve/CVE-2013-1575" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0276-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0285-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00037.html" source="SUSE-SU"/>
    <description>
    The dissect_r3_cmd_alarmconfigure function in epan/dissectors/packet-assa_r3.c in the R3 dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle a certain alarm length, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1575/">CVE-2013-1575</cve>
	<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590928" comment="wireshark-1.8.5-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1576</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1576" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1576" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1576" ref_url="https://www.suse.com/security/cve/CVE-2013-1576" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0276-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0285-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00037.html" source="SUSE-SU"/>
    <description>
    The dissect_sdp_media_attribute function in epan/dissectors/packet-sdp.c in the SDP dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly process crypto-suite parameters, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1576/">CVE-2013-1576</cve>
	<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590928" comment="wireshark-1.8.5-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1577</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1577" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1577" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1577" ref_url="https://www.suse.com/security/cve/CVE-2013-1577" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0276-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0285-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00037.html" source="SUSE-SU"/>
    <description>
    The dissect_sip_p_charging_func_addresses function in epan/dissectors/packet-sip.c in the SIP dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle offset data associated with a quoted string, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1577/">CVE-2013-1577</cve>
	<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590928" comment="wireshark-1.8.5-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1578</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1578" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1578" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1578" ref_url="https://www.suse.com/security/cve/CVE-2013-1578" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0276-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0285-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00037.html" source="SUSE-SU"/>
    <description>
    The dissect_pw_eth_heuristic function in epan/dissectors/packet-pw-eth.c in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle apparent Ethernet address values at the beginning of MPLS data, which allows remote attackers to cause a denial of service (loop) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1578/">CVE-2013-1578</cve>
	<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590928" comment="wireshark-1.8.5-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131579" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1579</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1579" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1579" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1579" ref_url="https://www.suse.com/security/cve/CVE-2013-1579" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0276-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0285-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00037.html" source="SUSE-SU"/>
    <description>
    The rtps_util_add_bitmap function in epan/dissectors/packet-rtps.c in the RTPS dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly implement certain nested loops for processing bitmap data, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1579/">CVE-2013-1579</cve>
	<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590928" comment="wireshark-1.8.5-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1580</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1580" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1580" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1580" ref_url="https://www.suse.com/security/cve/CVE-2013-1580" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0276-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0285-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00037.html" source="SUSE-SU"/>
    <description>
    The dissect_cmstatus_tlv function in plugins/docsis/packet-cmstatus.c in the DOCSIS CM-STATUS dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 uses an incorrect data type for a position variable, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1580/">CVE-2013-1580</cve>
	<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590928" comment="wireshark-1.8.5-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1581</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1581" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1581" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1581" ref_url="https://www.suse.com/security/cve/CVE-2013-1581" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0276-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0285-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00037.html" source="SUSE-SU"/>
    <description>
    The dissect_pft_fec_detailed function in epan/dissectors/packet-dcp-etsi.c in the DCP-ETSI dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle fragment gaps, which allows remote attackers to cause a denial of service (loop) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1581/">CVE-2013-1581</cve>
	<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590928" comment="wireshark-1.8.5-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1582</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1582" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1582" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1582" ref_url="https://www.suse.com/security/cve/CVE-2013-1582" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0276-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0285-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00037.html" source="SUSE-SU"/>
    <description>
    The dissect_clnp function in epan/dissectors/packet-clnp.c in the CLNP dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly manage an offset variable, which allows remote attackers to cause a denial of service (infinite loop or application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1582/">CVE-2013-1582</cve>
	<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590928" comment="wireshark-1.8.5-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1583</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1583" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1583" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1583" ref_url="https://www.suse.com/security/cve/CVE-2013-1583" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0276-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0285-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00037.html" source="SUSE-SU"/>
    <description>
    The dissect_version_4_primary_header function in epan/dissectors/packet-dtn.c in the DTN dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 accesses an inappropriate pointer, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1583/">CVE-2013-1583</cve>
	<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590928" comment="wireshark-1.8.5-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1584</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1584" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1584" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1584" ref_url="https://www.suse.com/security/cve/CVE-2013-1584" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0276-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0285-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00037.html" source="SUSE-SU"/>
    <description>
    The dissect_version_5_and_6_primary_header function in epan/dissectors/packet-dtn.c in the DTN dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 accesses an inappropriate pointer, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1584/">CVE-2013-1584</cve>
	<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590928" comment="wireshark-1.8.5-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1585</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1585" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1585" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1585" ref_url="https://www.suse.com/security/cve/CVE-2013-1585" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0276-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0285-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00037.html" source="SUSE-SU"/>
    <description>
    epan/tvbuff.c in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly validate certain length values for the MS-MMC dissector, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1585/">CVE-2013-1585</cve>
	<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590928" comment="wireshark-1.8.5-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1586</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1586" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1586" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1586" ref_url="https://www.suse.com/security/cve/CVE-2013-1586" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0276-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0285-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00037.html" source="SUSE-SU"/>
    <description>
    The fragment_set_tot_len function in epan/reassemble.c in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly determine the length of a reassembled packet for the DTLS dissector, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1586/">CVE-2013-1586</cve>
	<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590928" comment="wireshark-1.8.5-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1587</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1587" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1587" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1587" ref_url="https://www.suse.com/security/cve/CVE-2013-1587" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0276-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0285-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00037.html" source="SUSE-SU"/>
    <description>
    The dissect_rohc_ir_packet function in epan/dissectors/packet-rohc.c in the ROHC dissector in Wireshark 1.8.x before 1.8.5 does not properly handle unknown profiles, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1587/">CVE-2013-1587</cve>
	<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590928" comment="wireshark-1.8.5-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1588</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1588" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1588" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1588" ref_url="https://www.suse.com/security/cve/CVE-2013-1588" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0276-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0285-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00037.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in the dissect_pft_fec_detailed function in the DCP-ETSI dissector in epan/dissectors/packet-dcp-etsi.c in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 allow remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1588/">CVE-2013-1588</cve>
	<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590928" comment="wireshark-1.8.5-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131589" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1589</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1589" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1589" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1589" ref_url="https://www.suse.com/security/cve/CVE-2013-1589" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0276-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0285-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00037.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in epan/proto.c in the dissection engine in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1589/">CVE-2013-1589</cve>
	<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590928" comment="wireshark-1.8.5-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1590</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1590" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1590" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1590" ref_url="https://www.suse.com/security/cve/CVE-2013-1590" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0276-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0285-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00037.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the NTLMSSP dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1590/">CVE-2013-1590</cve>
	<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590928" comment="wireshark-1.8.5-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1591</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1591" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1591" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1591" ref_url="https://www.suse.com/security/cve/CVE-2013-1591" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-August/000583.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1421-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00019.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in libpixman, as used in Pale Moon before 15.4 and possibly other products, has unspecified impact and context-dependent attack vectors.  NOTE: this issue might be resultant from an integer overflow in the fast_composite_scaled_bilinear function in pixman-inlines.h, which triggers an infinite loop.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1591/">CVE-2013-1591</cve>
	<bugzilla href="https://bugzilla.suse.com/815064">SUSE bug 815064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590931" comment="libpixman-1-0-0.24.4-0.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590932" comment="libpixman-1-0-32bit-0.24.4-0.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1619</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1619" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1619" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1619" ref_url="https://www.suse.com/security/cve/CVE-2013-1619" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0322-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0807-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0346-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00009.html" source="SUSE-SU"/>
    <description>
    The TLS implementation in GnuTLS before 2.12.23, 3.0.x before 3.0.28, and 3.1.x before 3.1.7 does not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1619/">CVE-2013-1619</cve>
	<bugzilla href="https://bugzilla.suse.com/802184">SUSE bug 802184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802651">SUSE bug 802651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957568">SUSE bug 957568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590936" comment="gnutls-2.4.1-24.39.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590937" comment="libgnutls26-2.4.1-24.39.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590938" comment="libgnutls26-32bit-2.4.1-24.39.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1633</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1633" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1633" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1633" ref_url="https://www.suse.com/security/cve/CVE-2013-1633" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000785.html" source="SUSE-SU"/>
    <description>
    easy_install in setuptools before 0.7 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to the default use of the product.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-13"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1633/">CVE-2013-1633</cve>
	<bugzilla href="https://bugzilla.suse.com/843759">SUSE bug 843759</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567098" comment="python-setuptools-0.6c8-10.19.6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1640</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1640" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1640" ref_url="https://www.suse.com/security/cve/CVE-2013-1640" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0641-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00056.html" source="SUSE-SU"/>
    <description>
    The (1) template and (2) inline_template functions in the master server in Puppet before 2.6.18, 2.7.x before 2.7.21, and 3.1.x before 3.1.1, and Puppet Enterprise before 1.2.7 and 2.7.x before 2.7.2 allows remote authenticated users to execute arbitrary code via a crafted catalog request.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1640/">CVE-2013-1640</cve>
	<bugzilla href="https://bugzilla.suse.com/809839">SUSE bug 809839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880224">SUSE bug 880224</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591050" comment="puppet-2.6.18-0.4.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1652</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1652" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1652" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1652" ref_url="https://www.suse.com/security/cve/CVE-2013-1652" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0641-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00056.html" source="SUSE-SU"/>
    <description>
    Puppet before 2.6.18, 2.7.x before 2.7.21, and 3.1.x before 3.1.1, and Puppet Enterprise before 1.2.7 and 2.7.x before 2.7.2 allows remote authenticated users with a valid certificate and private key to read arbitrary catalogs or poison the master's cache via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1652/">CVE-2013-1652</cve>
	<bugzilla href="https://bugzilla.suse.com/809839">SUSE bug 809839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880224">SUSE bug 880224</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591050" comment="puppet-2.6.18-0.4.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1653</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1653" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1653" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1653" ref_url="https://www.suse.com/security/cve/CVE-2013-1653" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0641-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00056.html" source="SUSE-SU"/>
    <description>
    Puppet before 2.6.18, 2.7.x before 2.7.21, and 3.1.x before 3.1.1, and Puppet Enterprise before 1.2.7 and 2.7.x before 2.7.2, when listening for incoming connections is enabled and allowing access to the "run" REST endpoint is allowed, allows remote authenticated users to execute arbitrary code via a crafted HTTP request.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1653/">CVE-2013-1653</cve>
	<bugzilla href="https://bugzilla.suse.com/809839">SUSE bug 809839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591050" comment="puppet-2.6.18-0.4.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1654</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1654" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1654" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1654" ref_url="https://www.suse.com/security/cve/CVE-2013-1654" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0641-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00056.html" source="SUSE-SU"/>
    <description>
    Puppet 2.7.x before 2.7.21 and 3.1.x before 3.1.1, and Puppet Enterprise 2.7.x before 2.7.2, does not properly negotiate the SSL protocol between client and master, which allows remote attackers to conduct SSLv2 downgrade attacks against SSLv3 sessions via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1654/">CVE-2013-1654</cve>
	<bugzilla href="https://bugzilla.suse.com/809839">SUSE bug 809839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880224">SUSE bug 880224</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591050" comment="puppet-2.6.18-0.4.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1655</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1655" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1655" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1655" ref_url="https://www.suse.com/security/cve/CVE-2013-1655" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0641-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00056.html" source="SUSE-SU"/>
    <description>
    Puppet 2.7.x before 2.7.21 and 3.1.x before 3.1.1, when running Ruby 1.9.3 or later, allows remote attackers to execute arbitrary code via vectors related to "serialized attributes."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1655/">CVE-2013-1655</cve>
	<bugzilla href="https://bugzilla.suse.com/809839">SUSE bug 809839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880224">SUSE bug 880224</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591050" comment="puppet-2.6.18-0.4.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1667</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1667" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1667" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1667" ref_url="https://www.suse.com/security/cve/CVE-2013-1667" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0441-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0442-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0502-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00038.html" source="SUSE-SU"/>
    <description>
    The rehash mechanism in Perl 5.8.2 through 5.16.x allows context-dependent attackers to cause a denial of service (memory consumption and crash) via a crafted hash key.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1667/">CVE-2013-1667</cve>
	<bugzilla href="https://bugzilla.suse.com/804415">SUSE bug 804415</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566171" comment="perl-5.10.0-64.61.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566172" comment="perl-32bit-5.10.0-64.61.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566173" comment="perl-base-5.10.0-64.61.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566174" comment="perl-doc-5.10.0-64.61.61.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1682</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1682" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1682" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1682" ref_url="https://www.suse.com/security/cve/CVE-2013-1682" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1141-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1142-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1143-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1176-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1682/">CVE-2013-1682</cve>
	<bugzilla href="https://bugzilla.suse.com/825935">SUSE bug 825935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565980" comment="MozillaFirefox-17.0.7esr-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565981" comment="MozillaFirefox-branding-SLED-7-0.6.9.31 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565982" comment="MozillaFirefox-translations-17.0.7esr-0.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566430" comment="MozillaFirefox-17.0.7esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566431" comment="MozillaFirefox-branding-SLED-7-0.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566432" comment="MozillaFirefox-translations-17.0.7esr-0.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131684" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1684</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1684" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1684" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1684" ref_url="https://www.suse.com/security/cve/CVE-2013-1684" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1141-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1142-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1143-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1176-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the mozilla::dom::HTMLMediaElement::LookupMediaElementURITable function in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1684/">CVE-2013-1684</cve>
	<bugzilla href="https://bugzilla.suse.com/825935">SUSE bug 825935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565980" comment="MozillaFirefox-17.0.7esr-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565981" comment="MozillaFirefox-branding-SLED-7-0.6.9.31 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565982" comment="MozillaFirefox-translations-17.0.7esr-0.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566430" comment="MozillaFirefox-17.0.7esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566431" comment="MozillaFirefox-branding-SLED-7-0.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566432" comment="MozillaFirefox-translations-17.0.7esr-0.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1685</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1685" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1685" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1685" ref_url="https://www.suse.com/security/cve/CVE-2013-1685" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1141-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1142-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1143-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1176-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsIDocument::GetRootElement function in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1685/">CVE-2013-1685</cve>
	<bugzilla href="https://bugzilla.suse.com/825935">SUSE bug 825935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565980" comment="MozillaFirefox-17.0.7esr-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565981" comment="MozillaFirefox-branding-SLED-7-0.6.9.31 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565982" comment="MozillaFirefox-translations-17.0.7esr-0.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566430" comment="MozillaFirefox-17.0.7esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566431" comment="MozillaFirefox-branding-SLED-7-0.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566432" comment="MozillaFirefox-translations-17.0.7esr-0.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1686</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1686" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1686" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1686" ref_url="https://www.suse.com/security/cve/CVE-2013-1686" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1141-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1142-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1143-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1176-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the mozilla::ResetDir function in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1686/">CVE-2013-1686</cve>
	<bugzilla href="https://bugzilla.suse.com/825935">SUSE bug 825935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565980" comment="MozillaFirefox-17.0.7esr-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565981" comment="MozillaFirefox-branding-SLED-7-0.6.9.31 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565982" comment="MozillaFirefox-translations-17.0.7esr-0.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566430" comment="MozillaFirefox-17.0.7esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566431" comment="MozillaFirefox-branding-SLED-7-0.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566432" comment="MozillaFirefox-translations-17.0.7esr-0.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1687</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1687" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1687" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1687" ref_url="https://www.suse.com/security/cve/CVE-2013-1687" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1141-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1142-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1143-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1176-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The System Only Wrapper (SOW) and Chrome Object Wrapper (COW) implementations in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 do not properly restrict XBL user-defined functions, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges, or conduct cross-site scripting (XSS) attacks, via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1687/">CVE-2013-1687</cve>
	<bugzilla href="https://bugzilla.suse.com/825935">SUSE bug 825935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565980" comment="MozillaFirefox-17.0.7esr-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565981" comment="MozillaFirefox-branding-SLED-7-0.6.9.31 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565982" comment="MozillaFirefox-translations-17.0.7esr-0.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566430" comment="MozillaFirefox-17.0.7esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566431" comment="MozillaFirefox-branding-SLED-7-0.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566432" comment="MozillaFirefox-translations-17.0.7esr-0.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1690</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1690" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1690" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1690" ref_url="https://www.suse.com/security/cve/CVE-2013-1690" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1141-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1142-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1143-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1176-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 do not properly handle onreadystatechange events in conjunction with page reloading, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted web site that triggers an attempt to execute data at an unmapped memory location.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1690/">CVE-2013-1690</cve>
	<bugzilla href="https://bugzilla.suse.com/825935">SUSE bug 825935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565980" comment="MozillaFirefox-17.0.7esr-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565981" comment="MozillaFirefox-branding-SLED-7-0.6.9.31 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565982" comment="MozillaFirefox-translations-17.0.7esr-0.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566430" comment="MozillaFirefox-17.0.7esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566431" comment="MozillaFirefox-branding-SLED-7-0.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566432" comment="MozillaFirefox-translations-17.0.7esr-0.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1692</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1692" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1692" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1692" ref_url="https://www.suse.com/security/cve/CVE-2013-1692" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1141-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1142-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1143-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1176-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 do not prevent the inclusion of body data in an XMLHttpRequest HEAD request, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1692/">CVE-2013-1692</cve>
	<bugzilla href="https://bugzilla.suse.com/825935">SUSE bug 825935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565980" comment="MozillaFirefox-17.0.7esr-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565981" comment="MozillaFirefox-branding-SLED-7-0.6.9.31 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565982" comment="MozillaFirefox-translations-17.0.7esr-0.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566430" comment="MozillaFirefox-17.0.7esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566431" comment="MozillaFirefox-branding-SLED-7-0.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566432" comment="MozillaFirefox-translations-17.0.7esr-0.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1693</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1693" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1693" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1693" ref_url="https://www.suse.com/security/cve/CVE-2013-1693" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1141-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1142-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1143-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1176-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The SVG filter implementation in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 allows remote attackers to read pixel values, and possibly bypass the Same Origin Policy and read text from a different domain, by observing timing differences in execution of filter code.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1693/">CVE-2013-1693</cve>
	<bugzilla href="https://bugzilla.suse.com/825935">SUSE bug 825935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565980" comment="MozillaFirefox-17.0.7esr-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565981" comment="MozillaFirefox-branding-SLED-7-0.6.9.31 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565982" comment="MozillaFirefox-translations-17.0.7esr-0.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566430" comment="MozillaFirefox-17.0.7esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566431" comment="MozillaFirefox-branding-SLED-7-0.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566432" comment="MozillaFirefox-translations-17.0.7esr-0.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1697</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1697" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1697" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1697" ref_url="https://www.suse.com/security/cve/CVE-2013-1697" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1141-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1142-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1143-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1176-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The XrayWrapper implementation in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 does not properly restrict use of DefaultValue for method calls, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted web site that triggers use of a user-defined (1) toString or (2) valueOf method.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1697/">CVE-2013-1697</cve>
	<bugzilla href="https://bugzilla.suse.com/825935">SUSE bug 825935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565980" comment="MozillaFirefox-17.0.7esr-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565981" comment="MozillaFirefox-branding-SLED-7-0.6.9.31 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565982" comment="MozillaFirefox-translations-17.0.7esr-0.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566430" comment="MozillaFirefox-17.0.7esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566431" comment="MozillaFirefox-branding-SLED-7-0.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566432" comment="MozillaFirefox-translations-17.0.7esr-0.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131701" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1701</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1701" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1701" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1701" ref_url="https://www.suse.com/security/cve/CVE-2013-1701" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, Thunderbird ESR 17.x before 17.0.8, and SeaMonkey before 2.20 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1701/">CVE-2013-1701</cve>
	<bugzilla href="https://bugzilla.suse.com/833389">SUSE bug 833389</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591053" comment="MozillaFirefox-17.0.8esr-0.4.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591054" comment="MozillaFirefox-translations-17.0.8esr-0.4.2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591055" comment="MozillaFirefox-17.0.8esr-0.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591056" comment="MozillaFirefox-translations-17.0.8esr-0.7.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1702</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1702" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1702" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1702" ref_url="https://www.suse.com/security/cve/CVE-2013-1702" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00014.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 23.0 and SeaMonkey before 2.20 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1702/">CVE-2013-1702</cve>
	<bugzilla href="https://bugzilla.suse.com/833389">SUSE bug 833389</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591053" comment="MozillaFirefox-17.0.8esr-0.4.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591054" comment="MozillaFirefox-translations-17.0.8esr-0.4.2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591055" comment="MozillaFirefox-17.0.8esr-0.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591056" comment="MozillaFirefox-translations-17.0.8esr-0.7.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1705</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1705" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1705" ref_url="https://www.suse.com/security/cve/CVE-2013-1705" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1496-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer underflow in the cryptojs_interpret_key_gen_type function in Mozilla Firefox before 23.0 and SeaMonkey before 2.20 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted Certificate Request Message Format (CRMF) request.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1705/">CVE-2013-1705</cve>
	<bugzilla href="https://bugzilla.suse.com/833389">SUSE bug 833389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840485">SUSE bug 840485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565846" comment="MozillaFirefox-17.0.9esr-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565847" comment="MozillaFirefox-translations-17.0.9esr-0.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566318" comment="MozillaFirefox-17.0.9esr-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566319" comment="MozillaFirefox-translations-17.0.9esr-0.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1706</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1706" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1706" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1706" ref_url="https://www.suse.com/security/cve/CVE-2013-1706" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00021.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in maintenanceservice.exe in the Mozilla Maintenance Service in Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, and Thunderbird ESR 17.x before 17.0.8 allows local users to gain privileges via a long pathname on the command line.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1706/">CVE-2013-1706</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591053" comment="MozillaFirefox-17.0.8esr-0.4.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591054" comment="MozillaFirefox-translations-17.0.8esr-0.4.2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591055" comment="MozillaFirefox-17.0.8esr-0.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591056" comment="MozillaFirefox-translations-17.0.8esr-0.7.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1707</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1707" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1707" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1707" ref_url="https://www.suse.com/security/cve/CVE-2013-1707" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00021.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in Mozilla Updater in Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, and Thunderbird ESR 17.x before 17.0.8 allows local users to gain privileges via a long pathname on the command line to the Mozilla Maintenance Service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1707/">CVE-2013-1707</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591053" comment="MozillaFirefox-17.0.8esr-0.4.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591054" comment="MozillaFirefox-translations-17.0.8esr-0.4.2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591055" comment="MozillaFirefox-17.0.8esr-0.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591056" comment="MozillaFirefox-translations-17.0.8esr-0.7.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1709</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1709" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1709" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1709" ref_url="https://www.suse.com/security/cve/CVE-2013-1709" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, Thunderbird ESR 17.x before 17.0.8, and SeaMonkey before 2.20 do not properly handle the interaction between FRAME elements and history, which allows remote attackers to conduct cross-site scripting (XSS) attacks via vectors involving spoofing a relative location in a previously visited document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1709/">CVE-2013-1709</cve>
	<bugzilla href="https://bugzilla.suse.com/833389">SUSE bug 833389</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591053" comment="MozillaFirefox-17.0.8esr-0.4.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591054" comment="MozillaFirefox-translations-17.0.8esr-0.4.2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591055" comment="MozillaFirefox-17.0.8esr-0.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591056" comment="MozillaFirefox-translations-17.0.8esr-0.7.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1710</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1710" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1710" ref_url="https://www.suse.com/security/cve/CVE-2013-1710" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The crypto.generateCRMFRequest function in Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, Thunderbird ESR 17.x before 17.0.8, and SeaMonkey before 2.20 allows remote attackers to execute arbitrary JavaScript code or conduct cross-site scripting (XSS) attacks via vectors related to Certificate Request Message Format (CRMF) request generation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1710/">CVE-2013-1710</cve>
	<bugzilla href="https://bugzilla.suse.com/833389">SUSE bug 833389</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591053" comment="MozillaFirefox-17.0.8esr-0.4.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591054" comment="MozillaFirefox-translations-17.0.8esr-0.4.2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591055" comment="MozillaFirefox-17.0.8esr-0.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591056" comment="MozillaFirefox-translations-17.0.8esr-0.7.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1712</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1712" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1712" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1712" ref_url="https://www.suse.com/security/cve/CVE-2013-1712" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00021.html" source="SUSE-SU"/>
    <description>
    Multiple untrusted search path vulnerabilities in updater.exe in Mozilla Updater in Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, and Thunderbird ESR 17.x before 17.0.8 on Windows 7, Windows Server 2008 R2, Windows 8, and Windows Server 2012 allow local users to gain privileges via a Trojan horse DLL in (1) the update directory or (2) the current working directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1712/">CVE-2013-1712</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591053" comment="MozillaFirefox-17.0.8esr-0.4.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591054" comment="MozillaFirefox-translations-17.0.8esr-0.4.2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591055" comment="MozillaFirefox-17.0.8esr-0.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591056" comment="MozillaFirefox-translations-17.0.8esr-0.7.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1713</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1713" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1713" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1713" ref_url="https://www.suse.com/security/cve/CVE-2013-1713" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, Thunderbird ESR 17.x before 17.0.8, and SeaMonkey before 2.20 use an incorrect URI within unspecified comparisons during enforcement of the Same Origin Policy, which allows remote attackers to conduct cross-site scripting (XSS) attacks or install arbitrary add-ons via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1713/">CVE-2013-1713</cve>
	<bugzilla href="https://bugzilla.suse.com/833389">SUSE bug 833389</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591053" comment="MozillaFirefox-17.0.8esr-0.4.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591054" comment="MozillaFirefox-translations-17.0.8esr-0.4.2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591055" comment="MozillaFirefox-17.0.8esr-0.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591056" comment="MozillaFirefox-translations-17.0.8esr-0.7.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1714</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1714" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1714" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1714" ref_url="https://www.suse.com/security/cve/CVE-2013-1714" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The Web Workers implementation in Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, Thunderbird ESR 17.x before 17.0.8, and SeaMonkey before 2.20 does not properly restrict XMLHttpRequest calls, which allows remote attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1714/">CVE-2013-1714</cve>
	<bugzilla href="https://bugzilla.suse.com/833389">SUSE bug 833389</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591053" comment="MozillaFirefox-17.0.8esr-0.4.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591054" comment="MozillaFirefox-translations-17.0.8esr-0.4.2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591055" comment="MozillaFirefox-17.0.8esr-0.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591056" comment="MozillaFirefox-translations-17.0.8esr-0.7.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1717</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1717" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1717" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1717" ref_url="https://www.suse.com/security/cve/CVE-2013-1717" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, Thunderbird ESR 17.x before 17.0.8, and SeaMonkey before 2.20 do not properly restrict local-filesystem access by Java applets, which allows user-assisted remote attackers to read arbitrary files by leveraging a download to a fixed pathname or other predictable pathname.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1717/">CVE-2013-1717</cve>
	<bugzilla href="https://bugzilla.suse.com/833389">SUSE bug 833389</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591053" comment="MozillaFirefox-17.0.8esr-0.4.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591054" comment="MozillaFirefox-translations-17.0.8esr-0.4.2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591055" comment="MozillaFirefox-17.0.8esr-0.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591056" comment="MozillaFirefox-translations-17.0.8esr-0.7.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1718</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1718" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1718" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1718" ref_url="https://www.suse.com/security/cve/CVE-2013-1718" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1491-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1493-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1495-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1496-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1499-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1718/">CVE-2013-1718</cve>
	<bugzilla href="https://bugzilla.suse.com/840485">SUSE bug 840485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565846" comment="MozillaFirefox-17.0.9esr-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565847" comment="MozillaFirefox-translations-17.0.9esr-0.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566318" comment="MozillaFirefox-17.0.9esr-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566319" comment="MozillaFirefox-translations-17.0.9esr-0.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1722</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1722" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1722" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1722" ref_url="https://www.suse.com/security/cve/CVE-2013-1722" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1491-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1493-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1495-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1496-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1499-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsAnimationManager::BuildAnimations function in the Animation Manager in Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving stylesheet cloning.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1722/">CVE-2013-1722</cve>
	<bugzilla href="https://bugzilla.suse.com/840485">SUSE bug 840485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565846" comment="MozillaFirefox-17.0.9esr-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565847" comment="MozillaFirefox-translations-17.0.9esr-0.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566318" comment="MozillaFirefox-17.0.9esr-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566319" comment="MozillaFirefox-translations-17.0.9esr-0.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1725</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1725" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1725" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1725" ref_url="https://www.suse.com/security/cve/CVE-2013-1725" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1491-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1493-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1495-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1496-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1499-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 do not ensure that initialization occurs for JavaScript objects with compartments, which allows remote attackers to execute arbitrary code by leveraging incorrect scope handling.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1725/">CVE-2013-1725</cve>
	<bugzilla href="https://bugzilla.suse.com/840485">SUSE bug 840485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565846" comment="MozillaFirefox-17.0.9esr-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565847" comment="MozillaFirefox-translations-17.0.9esr-0.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566318" comment="MozillaFirefox-17.0.9esr-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566319" comment="MozillaFirefox-translations-17.0.9esr-0.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1726</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1726" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1726" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1726" ref_url="https://www.suse.com/security/cve/CVE-2013-1726" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00005.html" source="SUSE-SU"/>
    <description>
    Mozilla Updater in Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 does not ensure exclusive access to a MAR file, which allows local users to gain privileges by creating a Trojan horse file after MAR signature verification but before MAR use.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1726/">CVE-2013-1726</cve>
	<bugzilla href="https://bugzilla.suse.com/840485">SUSE bug 840485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565846" comment="MozillaFirefox-17.0.9esr-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565847" comment="MozillaFirefox-translations-17.0.9esr-0.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566318" comment="MozillaFirefox-17.0.9esr-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566319" comment="MozillaFirefox-translations-17.0.9esr-0.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1730</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1730" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1730" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1730" ref_url="https://www.suse.com/security/cve/CVE-2013-1730" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1491-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1493-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1495-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1496-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1499-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 do not properly handle movement of XBL-backed nodes between documents, which allows remote attackers to execute arbitrary code or cause a denial of service (JavaScript compartment mismatch, or assertion failure and application exit) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1730/">CVE-2013-1730</cve>
	<bugzilla href="https://bugzilla.suse.com/840485">SUSE bug 840485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565846" comment="MozillaFirefox-17.0.9esr-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565847" comment="MozillaFirefox-translations-17.0.9esr-0.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566318" comment="MozillaFirefox-17.0.9esr-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566319" comment="MozillaFirefox-translations-17.0.9esr-0.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1732</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1732" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1732" ref_url="https://www.suse.com/security/cve/CVE-2013-1732" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1491-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1493-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1495-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1496-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1499-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the nsFloatManager::GetFlowArea function in Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 allows remote attackers to execute arbitrary code via crafted use of lists and floats within a multi-column layout.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1732/">CVE-2013-1732</cve>
	<bugzilla href="https://bugzilla.suse.com/840485">SUSE bug 840485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565846" comment="MozillaFirefox-17.0.9esr-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565847" comment="MozillaFirefox-translations-17.0.9esr-0.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566318" comment="MozillaFirefox-17.0.9esr-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566319" comment="MozillaFirefox-translations-17.0.9esr-0.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1735</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1735" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1735" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1735" ref_url="https://www.suse.com/security/cve/CVE-2013-1735" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1491-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1493-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1495-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1496-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1499-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the mozilla::layout::ScrollbarActivity function in Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 allows remote attackers to execute arbitrary code via vectors related to image-document scrolling.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1735/">CVE-2013-1735</cve>
	<bugzilla href="https://bugzilla.suse.com/840485">SUSE bug 840485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565846" comment="MozillaFirefox-17.0.9esr-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565847" comment="MozillaFirefox-translations-17.0.9esr-0.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566318" comment="MozillaFirefox-17.0.9esr-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566319" comment="MozillaFirefox-translations-17.0.9esr-0.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1736</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1736" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1736" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1736" ref_url="https://www.suse.com/security/cve/CVE-2013-1736" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1491-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1493-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1495-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1496-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1499-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The nsGfxScrollFrameInner::IsLTR function in Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors related to improperly establishing parent-child relationships of range-request nodes.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1736/">CVE-2013-1736</cve>
	<bugzilla href="https://bugzilla.suse.com/840485">SUSE bug 840485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565846" comment="MozillaFirefox-17.0.9esr-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565847" comment="MozillaFirefox-translations-17.0.9esr-0.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566318" comment="MozillaFirefox-17.0.9esr-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566319" comment="MozillaFirefox-translations-17.0.9esr-0.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1737</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1737" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1737" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1737" ref_url="https://www.suse.com/security/cve/CVE-2013-1737" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1491-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1493-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1495-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1496-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1499-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 do not properly identify the "this" object during use of user-defined getter methods on DOM proxies, which might allow remote attackers to bypass intended access restrictions via vectors involving an expando object.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1737/">CVE-2013-1737</cve>
	<bugzilla href="https://bugzilla.suse.com/840485">SUSE bug 840485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565846" comment="MozillaFirefox-17.0.9esr-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565847" comment="MozillaFirefox-translations-17.0.9esr-0.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566318" comment="MozillaFirefox-17.0.9esr-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566319" comment="MozillaFirefox-translations-17.0.9esr-0.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1739</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1739" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1739" ref_url="https://www.suse.com/security/cve/CVE-2013-1739" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1539-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1542-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00016.html" source="SUSE-SU"/>
    <description>
    Mozilla Network Security Services (NSS) before 3.15.2 does not ensure that data structures are initialized before read operations, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a decryption failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1739/">CVE-2013-1739</cve>
	<bugzilla href="https://bugzilla.suse.com/842979">SUSE bug 842979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/847708">SUSE bug 847708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565983" comment="MozillaFirefox-17.0.10esr-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565984" comment="MozillaFirefox-branding-SLED-7-0.6.9.62 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565985" comment="MozillaFirefox-translations-17.0.10esr-0.4.2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566148" comment="libfreebl3-3.15.2-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566149" comment="libfreebl3-32bit-3.15.2-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566150" comment="mozilla-nspr-4.10.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566151" comment="mozilla-nspr-32bit-4.10.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566152" comment="mozilla-nss-3.15.2-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566153" comment="mozilla-nss-32bit-3.15.2-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566154" comment="mozilla-nss-tools-3.15.2-0.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566433" comment="MozillaFirefox-17.0.10esr-0.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566434" comment="MozillaFirefox-branding-SLED-7-0.12.41 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566435" comment="MozillaFirefox-translations-17.0.10esr-0.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566964" comment="libfreebl3-3.15.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566965" comment="libfreebl3-32bit-3.15.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566966" comment="libsoftokn3-3.15.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566967" comment="libsoftokn3-32bit-3.15.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566150" comment="mozilla-nspr-4.10.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566151" comment="mozilla-nspr-32bit-4.10.1-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566968" comment="mozilla-nss-3.15.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566969" comment="mozilla-nss-32bit-3.15.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566970" comment="mozilla-nss-tools-3.15.2-0.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1741</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1741" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1741" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1741" ref_url="https://www.suse.com/security/cve/CVE-2013-1741" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1732-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00080.html" source="SUSE-SU"/>
    <description>
    Integer overflow in Mozilla Network Security Services (NSS) 3.15 before 3.15.3 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a large size value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1741/">CVE-2013-1741</cve>
	<bugzilla href="https://bugzilla.suse.com/850148">SUSE bug 850148</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566155" comment="libfreebl3-3.15.3-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566156" comment="libfreebl3-32bit-3.15.3-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566157" comment="mozilla-nspr-4.10.2-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566158" comment="mozilla-nspr-32bit-4.10.2-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566159" comment="mozilla-nss-3.15.3-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566160" comment="mozilla-nss-32bit-3.15.3-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566161" comment="mozilla-nss-tools-3.15.3-0.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566997" comment="libfreebl3-3.15.3-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566998" comment="libfreebl3-32bit-3.15.3-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566999" comment="libsoftokn3-3.15.3-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567000" comment="libsoftokn3-32bit-3.15.3-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566157" comment="mozilla-nspr-4.10.2-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566158" comment="mozilla-nspr-32bit-4.10.2-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567001" comment="mozilla-nss-3.15.3-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567002" comment="mozilla-nss-32bit-3.15.3-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567003" comment="mozilla-nss-tools-3.15.3-0.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1752</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1752" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1752" ref_url="https://www.suse.com/security/cve/CVE-2013-1752" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0380-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0498-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** Various versions of Python do not properly restrict readline calls, which allows remote attackers to cause a denial of service (memory consumption) via a long string, related to (1) httplib - fixed in 2.7.4, 2.6.9, and 3.3.3; (2) ftplib - fixed in 2.7.6, 2.6.9, 3.3.3; (3) imaplib - not yet fixed in 2.7.x, fixed in 2.6.9, 3.3.3; (4) nntplib - fixed in 2.7.6, 2.6.9, 3.3.3; (5) poplib - not yet fixed in 2.7.x, fixed in 2.6.9, 3.3.3; and (6) smtplib - not yet fixed in 2.7.x, fixed in 2.6.9, not yet fixed in 3.3.x. NOTE: this was REJECTed because it is incompatible with CNT1 "Independently Fixable" in the CVE Counting Decisions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-05-21"/>
	<updated date="2022-02-17"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2013-1752/">CVE-2013-1752</cve>
	<bugzilla href="https://bugzilla.suse.com/856835">SUSE bug 856835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/856836">SUSE bug 856836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863741">SUSE bug 863741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885882">SUSE bug 885882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898572">SUSE bug 898572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912739">SUSE bug 912739</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334122" comment="python is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1753</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1753" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1753" ref_url="https://www.suse.com/security/cve/CVE-2013-1753" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0380-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0498-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00020.html" source="SUSE-SU"/>
    <description>
    The gzip_decode function in the xmlrpc client library in Python 3.4 and earlier allows remote attackers to cause a denial of service (memory consumption) via a crafted HTTP request.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-05-21"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1753/">CVE-2013-1753</cve>
	<bugzilla href="https://bugzilla.suse.com/856835">SUSE bug 856835</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334122" comment="python is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1767</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1767" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1767" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1767" ref_url="https://www.suse.com/security/cve/CVE-2013-1767" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0759-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0759-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0824-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0847-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0925-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the shmem_remount_fs function in mm/shmem.c in the Linux kernel before 3.7.10 allows local users to gain privileges or cause a denial of service (system crash) by remounting a tmpfs filesystem without specifying a required mpol (aka mempolicy) mount option.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1767/">CVE-2013-1767</cve>
	<bugzilla href="https://bugzilla.suse.com/806138">SUSE bug 806138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/807436">SUSE bug 807436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589566" comment="kernel-default-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589567" comment="kernel-default-base-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589568" comment="kernel-default-devel-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589569" comment="kernel-default-extra-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589570" comment="kernel-source-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589571" comment="kernel-syms-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589572" comment="kernel-trace-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589573" comment="kernel-trace-base-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589574" comment="kernel-trace-devel-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589575" comment="kernel-trace-extra-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589576" comment="kernel-xen-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589577" comment="kernel-xen-base-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589578" comment="kernel-xen-devel-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589579" comment="kernel-xen-extra-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589580" comment="xen-kmp-default-4.1.4_02_3.0.74_0.6.6-0.5.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589581" comment="xen-kmp-trace-4.1.4_02_3.0.74_0.6.6-0.5.22 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1769</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1769" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1769" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1769" ref_url="https://www.suse.com/security/cve/CVE-2013-1769" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000426.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0518-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00085.html" source="SUSE-SU"/>
    <description>
    A certain hashing algorithm in Telepathy Gabble 0.16.x before 0.16.5 and 0.17.x before 0.17.3 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1769/">CVE-2013-1769</cve>
	<bugzilla href="https://bugzilla.suse.com/807449">SUSE bug 807449</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563167" comment="telepathy-gabble-0.7.10-2.19.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1772</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1772" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1772" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1772" ref_url="https://www.suse.com/security/cve/CVE-2013-1772" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0759-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0759-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1187-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00018.html" source="SUSE-SU"/>
    <description>
    The log_prefix function in kernel/printk.c in the Linux kernel 3.x before 3.4.33 does not properly remove a prefix string from a syslog header, which allows local users to cause a denial of service (buffer overflow and system crash) by leveraging /dev/kmsg write access and triggering a call_console_drivers function call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1772/">CVE-2013-1772</cve>
	<bugzilla href="https://bugzilla.suse.com/806238">SUSE bug 806238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/807441">SUSE bug 807441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589566" comment="kernel-default-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589567" comment="kernel-default-base-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589568" comment="kernel-default-devel-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589569" comment="kernel-default-extra-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589570" comment="kernel-source-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589571" comment="kernel-syms-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589572" comment="kernel-trace-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589573" comment="kernel-trace-base-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589574" comment="kernel-trace-devel-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589575" comment="kernel-trace-extra-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589576" comment="kernel-xen-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589577" comment="kernel-xen-base-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589578" comment="kernel-xen-devel-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589579" comment="kernel-xen-extra-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589580" comment="xen-kmp-default-4.1.4_02_3.0.74_0.6.6-0.5.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589581" comment="xen-kmp-trace-4.1.4_02_3.0.74_0.6.6-0.5.22 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1774</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1774" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1774" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1774" ref_url="https://www.suse.com/security/cve/CVE-2013-1774" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0759-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0759-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1182-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1474-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0824-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0847-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0925-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1619-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1773-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00106.html" source="SUSE-SU"/>
    <description>
    The chase_port function in drivers/usb/serial/io_ti.c in the Linux kernel before 3.7.4 allows local users to cause a denial of service (NULL pointer dereference and system crash) via an attempted /dev/ttyUSB read or write operation on a disconnected Edgeport USB serial converter.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1774/">CVE-2013-1774</cve>
	<bugzilla href="https://bugzilla.suse.com/806976">SUSE bug 806976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/807455">SUSE bug 807455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590523" comment="kernel-default-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590524" comment="kernel-default-base-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590525" comment="kernel-default-devel-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590526" comment="kernel-default-extra-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590527" comment="kernel-source-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590528" comment="kernel-syms-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590529" comment="kernel-trace-devel-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590530" comment="kernel-xen-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590531" comment="kernel-xen-base-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590532" comment="kernel-xen-devel-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590533" comment="kernel-xen-extra-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590534" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590535" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590800" comment="kernel-default-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590801" comment="kernel-default-base-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590802" comment="kernel-default-devel-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590803" comment="kernel-default-extra-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590804" comment="kernel-source-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590805" comment="kernel-syms-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590806" comment="kernel-trace-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590807" comment="kernel-trace-base-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590808" comment="kernel-trace-devel-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590809" comment="kernel-trace-extra-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590810" comment="kernel-xen-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590811" comment="kernel-xen-base-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590812" comment="kernel-xen-devel-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590813" comment="kernel-xen-extra-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590814" comment="xen-kmp-default-4.1.5_02_3.0.93_0.5-0.5.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590815" comment="xen-kmp-trace-4.1.5_02_3.0.93_0.5-0.5.39 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1775</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1775" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1775" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1775" ref_url="https://www.suse.com/security/cve/CVE-2013-1775" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000614.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0495-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0503-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00074.html" source="SUSE-SU"/>
    <description>
    sudo 1.6.0 through 1.7.10p6 and sudo 1.8.0 through 1.8.6p6 allows local users or physically proximate attackers to bypass intended time restrictions and retain privileges without re-authenticating by setting the system clock and sudo user timestamp to the epoch.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-11"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1775/">CVE-2013-1775</cve>
	<bugzilla href="https://bugzilla.suse.com/806919">SUSE bug 806919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806921">SUSE bug 806921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/815325">SUSE bug 815325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/845568">SUSE bug 845568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566188" comment="sudo-1.7.6p2-0.2.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1776</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1776" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1776" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1776" ref_url="https://www.suse.com/security/cve/CVE-2013-1776" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000614.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0495-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0503-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00074.html" source="SUSE-SU"/>
    <description>
    sudo 1.3.5 through 1.7.10 and 1.8.0 through 1.8.5, when the tty_tickets option is enabled, does not properly validate the controlling terminal device, which allows local users with sudo permissions to hijack the authorization of another terminal via vectors related to connecting to the standard input, output, and error file descriptors of another terminal.  NOTE: this is one of three closely-related vulnerabilities that were originally assigned CVE-2013-1776, but they have been SPLIT because of different affected versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-1776/">CVE-2013-1776</cve>
	<bugzilla href="https://bugzilla.suse.com/806921">SUSE bug 806921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817349">SUSE bug 817349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817350">SUSE bug 817350</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566188" comment="sudo-1.7.6p2-0.2.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1788</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1788" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1788" ref_url="https://www.suse.com/security/cve/CVE-2013-1788" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000403.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0255-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00051.html" source="SUSE-SU"/>
    <description>
    poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors that trigger an "invalid memory access" in (1) splash/Splash.cc, (2) poppler/Function.cc, and (3) poppler/Stream.cc.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1788/">CVE-2013-1788</cve>
	<bugzilla href="https://bugzilla.suse.com/806793">SUSE bug 806793</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566120" comment="libpoppler-glib4-0.12.3-1.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566121" comment="libpoppler-qt4-3-0.12.3-1.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566122" comment="libpoppler5-0.12.3-1.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563015" comment="poppler-tools-0.12.3-1.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1789</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1789" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1789" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1789" ref_url="https://www.suse.com/security/cve/CVE-2013-1789" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000403.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0255-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00051.html" source="SUSE-SU"/>
    <description>
    splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1789/">CVE-2013-1789</cve>
	<bugzilla href="https://bugzilla.suse.com/806793">SUSE bug 806793</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566120" comment="libpoppler-glib4-0.12.3-1.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566121" comment="libpoppler-qt4-3-0.12.3-1.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566122" comment="libpoppler5-0.12.3-1.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563015" comment="poppler-tools-0.12.3-1.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1790</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1790" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1790" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1790" ref_url="https://www.suse.com/security/cve/CVE-2013-1790" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000403.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0255-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00051.html" source="SUSE-SU"/>
    <description>
    poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1790/">CVE-2013-1790</cve>
	<bugzilla href="https://bugzilla.suse.com/806793">SUSE bug 806793</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566120" comment="libpoppler-glib4-0.12.3-1.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566121" comment="libpoppler-qt4-3-0.12.3-1.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566122" comment="libpoppler5-0.12.3-1.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563015" comment="poppler-tools-0.12.3-1.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1792</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1792" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1792" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1792" ref_url="https://www.suse.com/security/cve/CVE-2013-1792" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0759-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0759-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1187-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0204-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00002.html" source="SUSE-SU"/>
    <description>
    Race condition in the install_user_keyrings function in security/keys/process_keys.c in the Linux kernel before 3.8.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) via crafted keyctl system calls that trigger keyring operations in simultaneous threads.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1792/">CVE-2013-1792</cve>
	<bugzilla href="https://bugzilla.suse.com/807428">SUSE bug 807428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/808358">SUSE bug 808358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589566" comment="kernel-default-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589567" comment="kernel-default-base-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589568" comment="kernel-default-devel-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589569" comment="kernel-default-extra-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589570" comment="kernel-source-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589571" comment="kernel-syms-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589572" comment="kernel-trace-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589573" comment="kernel-trace-base-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589574" comment="kernel-trace-devel-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589575" comment="kernel-trace-extra-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589576" comment="kernel-xen-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589577" comment="kernel-xen-base-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589578" comment="kernel-xen-devel-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589579" comment="kernel-xen-extra-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589580" comment="xen-kmp-default-4.1.4_02_3.0.74_0.6.6-0.5.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589581" comment="xen-kmp-trace-4.1.4_02_3.0.74_0.6.6-0.5.22 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1796</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1796" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1796" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1796" ref_url="https://www.suse.com/security/cve/CVE-2013-1796" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0759-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0759-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0824-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0847-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0923-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0925-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1187-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00018.html" source="SUSE-SU"/>
    <description>
    The kvm_set_msr_common function in arch/x86/kvm/x86.c in the Linux kernel through 3.8.4 does not ensure a required time_page alignment during an MSR_KVM_SYSTEM_TIME operation, which allows guest OS users to cause a denial of service (buffer overflow and host OS memory corruption) or possibly have unspecified other impact via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1796/">CVE-2013-1796</cve>
	<bugzilla href="https://bugzilla.suse.com/806980">SUSE bug 806980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819789">SUSE bug 819789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589566" comment="kernel-default-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589567" comment="kernel-default-base-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589568" comment="kernel-default-devel-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589569" comment="kernel-default-extra-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589570" comment="kernel-source-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589571" comment="kernel-syms-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589572" comment="kernel-trace-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589573" comment="kernel-trace-base-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589574" comment="kernel-trace-devel-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589575" comment="kernel-trace-extra-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589576" comment="kernel-xen-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589577" comment="kernel-xen-base-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589578" comment="kernel-xen-devel-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589579" comment="kernel-xen-extra-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589580" comment="xen-kmp-default-4.1.4_02_3.0.74_0.6.6-0.5.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589581" comment="xen-kmp-trace-4.1.4_02_3.0.74_0.6.6-0.5.22 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1797</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1797" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1797" ref_url="https://www.suse.com/security/cve/CVE-2013-1797" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0759-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0759-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0824-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0847-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0923-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0925-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1187-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in arch/x86/kvm/x86.c in the Linux kernel through 3.8.4 allows guest OS users to cause a denial of service (host OS memory corruption) or possibly have unspecified other impact via a crafted application that triggers use of a guest physical address (GPA) in (1) movable or (2) removable memory during an MSR_KVM_SYSTEM_TIME kvm_set_msr_common operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1797/">CVE-2013-1797</cve>
	<bugzilla href="https://bugzilla.suse.com/806980">SUSE bug 806980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819789">SUSE bug 819789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589566" comment="kernel-default-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589567" comment="kernel-default-base-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589568" comment="kernel-default-devel-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589569" comment="kernel-default-extra-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589570" comment="kernel-source-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589571" comment="kernel-syms-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589572" comment="kernel-trace-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589573" comment="kernel-trace-base-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589574" comment="kernel-trace-devel-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589575" comment="kernel-trace-extra-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589576" comment="kernel-xen-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589577" comment="kernel-xen-base-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589578" comment="kernel-xen-devel-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589579" comment="kernel-xen-extra-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589580" comment="xen-kmp-default-4.1.4_02_3.0.74_0.6.6-0.5.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589581" comment="xen-kmp-trace-4.1.4_02_3.0.74_0.6.6-0.5.22 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1798</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1798" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1798" ref_url="https://www.suse.com/security/cve/CVE-2013-1798" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0759-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0759-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0824-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0847-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0923-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0925-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1187-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00018.html" source="SUSE-SU"/>
    <description>
    The ioapic_read_indirect function in virt/kvm/ioapic.c in the Linux kernel through 3.8.4 does not properly handle a certain combination of invalid IOAPIC_REG_SELECT and IOAPIC_REG_WINDOW operations, which allows guest OS users to obtain sensitive information from host OS memory or cause a denial of service (host OS OOPS) via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1798/">CVE-2013-1798</cve>
	<bugzilla href="https://bugzilla.suse.com/806980">SUSE bug 806980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819789">SUSE bug 819789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589566" comment="kernel-default-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589567" comment="kernel-default-base-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589568" comment="kernel-default-devel-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589569" comment="kernel-default-extra-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589570" comment="kernel-source-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589571" comment="kernel-syms-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589572" comment="kernel-trace-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589573" comment="kernel-trace-base-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589574" comment="kernel-trace-devel-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589575" comment="kernel-trace-extra-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589576" comment="kernel-xen-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589577" comment="kernel-xen-base-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589578" comment="kernel-xen-devel-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589579" comment="kernel-xen-extra-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589580" comment="xen-kmp-default-4.1.4_02_3.0.74_0.6.6-0.5.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589581" comment="xen-kmp-trace-4.1.4_02_3.0.74_0.6.6-0.5.22 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1819</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1819" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1819" ref_url="https://www.suse.com/security/cve/CVE-2013-1819" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1474-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000608.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1619-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1773-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00106.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1971-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00129.html" source="SUSE-SU"/>
    <description>
    The _xfs_buf_find function in fs/xfs/xfs_buf.c in the Linux kernel before 3.7.6 does not validate block numbers, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by leveraging the ability to mount an XFS filesystem containing a metadata inode with an invalid extent map.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1819/">CVE-2013-1819</cve>
	<bugzilla href="https://bugzilla.suse.com/807471">SUSE bug 807471</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590816" comment="kernel-default-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590817" comment="kernel-default-base-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590818" comment="kernel-default-devel-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590819" comment="kernel-default-extra-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590820" comment="kernel-source-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590821" comment="kernel-syms-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590822" comment="kernel-trace-devel-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590823" comment="kernel-xen-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590824" comment="kernel-xen-base-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590825" comment="kernel-xen-devel-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590826" comment="kernel-xen-extra-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590827" comment="xen-kmp-default-4.2.2_06_3.0.93_0.8-0.7.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590800" comment="kernel-default-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590801" comment="kernel-default-base-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590802" comment="kernel-default-devel-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590803" comment="kernel-default-extra-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590804" comment="kernel-source-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590805" comment="kernel-syms-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590806" comment="kernel-trace-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590807" comment="kernel-trace-base-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590808" comment="kernel-trace-devel-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590809" comment="kernel-trace-extra-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590810" comment="kernel-xen-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590811" comment="kernel-xen-base-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590812" comment="kernel-xen-devel-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590813" comment="kernel-xen-extra-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590814" comment="xen-kmp-default-4.1.5_02_3.0.93_0.5-0.5.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590815" comment="xen-kmp-trace-4.1.5_02_3.0.93_0.5-0.5.39 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131821" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1821</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1821" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1821" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1821" ref_url="https://www.suse.com/security/cve/CVE-2013-1821" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000889.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0603-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0614-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00036.html" source="SUSE-SU"/>
    <description>
    lib/rexml/text.rb in the REXML parser in Ruby before 1.9.3-p392 allows remote attackers to cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion (XEE) attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1821/">CVE-2013-1821</cve>
	<bugzilla href="https://bugzilla.suse.com/808137">SUSE bug 808137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876588">SUSE bug 876588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567102" comment="ruby-1.8.7.p357-0.9.15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1828</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1828" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1828" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1828" ref_url="https://www.suse.com/security/cve/CVE-2013-1828" source="SUSE CVE"/>
    <description>
    The sctp_getsockopt_assoc_stats function in net/sctp/socket.c in the Linux kernel before 3.8.4 does not validate a size value before proceeding to a copy_from_user operation, which allows local users to gain privileges via a crafted application that contains an SCTP_GET_ASSOC_STATS getsockopt system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1828/">CVE-2013-1828</cve>
	<bugzilla href="https://bugzilla.suse.com/808351">SUSE bug 808351</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1848</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1848" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1848" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1848" ref_url="https://www.suse.com/security/cve/CVE-2013-1848" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0759-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0759-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0824-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0923-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0925-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html" source="SUSE-SU"/>
    <description>
    fs/ext3/super.c in the Linux kernel before 3.8.4 uses incorrect arguments to functions in certain circumstances related to printk input, which allows local users to conduct format-string attacks and possibly gain privileges via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1848/">CVE-2013-1848</cve>
	<bugzilla href="https://bugzilla.suse.com/809155">SUSE bug 809155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589566" comment="kernel-default-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589567" comment="kernel-default-base-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589568" comment="kernel-default-devel-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589569" comment="kernel-default-extra-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589570" comment="kernel-source-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589571" comment="kernel-syms-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589572" comment="kernel-trace-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589573" comment="kernel-trace-base-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589574" comment="kernel-trace-devel-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589575" comment="kernel-trace-extra-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589576" comment="kernel-xen-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589577" comment="kernel-xen-base-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589578" comment="kernel-xen-devel-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589579" comment="kernel-xen-extra-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589580" comment="xen-kmp-default-4.1.4_02_3.0.74_0.6.6-0.5.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589581" comment="xen-kmp-trace-4.1.4_02_3.0.74_0.6.6-0.5.22 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1860</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1860" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1860" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1860" ref_url="https://www.suse.com/security/cve/CVE-2013-1860" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0759-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0759-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00023.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the wdm_in_callback function in drivers/usb/class/cdc-wdm.c in the Linux kernel before 3.8.4 allows physically proximate attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a crafted cdc-wdm USB device.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1860/">CVE-2013-1860</cve>
	<bugzilla href="https://bugzilla.suse.com/806431">SUSE bug 806431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589566" comment="kernel-default-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589567" comment="kernel-default-base-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589568" comment="kernel-default-devel-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589569" comment="kernel-default-extra-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589570" comment="kernel-source-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589571" comment="kernel-syms-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589572" comment="kernel-trace-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589573" comment="kernel-trace-base-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589574" comment="kernel-trace-devel-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589575" comment="kernel-trace-extra-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589576" comment="kernel-xen-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589577" comment="kernel-xen-base-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589578" comment="kernel-xen-devel-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589579" comment="kernel-xen-extra-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589580" comment="xen-kmp-default-4.1.4_02_3.0.74_0.6.6-0.5.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589581" comment="xen-kmp-trace-4.1.4_02_3.0.74_0.6.6-0.5.22 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1861</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1861" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1861" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1861" ref_url="https://www.suse.com/security/cve/CVE-2013-1861" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html" source="SUSE-SU"/>
    <description>
    MariaDB 5.5.x before 5.5.30, 5.3.x before 5.3.13, 5.2.x before 5.2.15, and 5.1.x before 5.1.68, and Oracle MySQL 5.1.69 and earlier, 5.5.31 and earlier, and 5.6.11 and earlier allows remote attackers to cause a denial of service (crash) via a crafted geometry feature that specifies a large number of points, which is not properly handled when processing the binary representation of this feature, related to a numeric calculation error.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1861/">CVE-2013-1861</cve>
	<bugzilla href="https://bugzilla.suse.com/809544">SUSE bug 809544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/830086">SUSE bug 830086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591077" comment="libmysql55client18-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591078" comment="libmysql55client18-32bit-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591079" comment="libmysql55client_r18-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591080" comment="libmysql55client_r18-32bit-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591081" comment="libmysqlclient15-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591082" comment="libmysqlclient15-32bit-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591083" comment="libmysqlclient_r15-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591084" comment="libmysqlclient_r15-32bit-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591085" comment="mysql-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591086" comment="mysql-client-5.5.33-0.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1864</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1864" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1864" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1864" ref_url="https://www.suse.com/security/cve/CVE-2013-1864" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000726.html" source="SUSE-SU"/>
    <description>
    The Portable Tool Library (aka PTLib) before 2.10.10, as used in Ekiga before 4.0.1, does not properly detect recursion during entity expansion, which allows remote attackers to cause a denial of service (memory and CPU consumption) via a crafted PXML document containing a large number of nested entity references, aka a "billion laughs attack."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1864/">CVE-2013-1864</cve>
	<bugzilla href="https://bugzilla.suse.com/809917">SUSE bug 809917</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567061" comment="pwlib-1.10.10-120.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567062" comment="pwlib-plugins-avc-1.10.10-120.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567063" comment="pwlib-plugins-dc-1.10.10-120.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567064" comment="pwlib-plugins-v4l2-1.10.10-120.35.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1872</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1872" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1872" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1872" ref_url="https://www.suse.com/security/cve/CVE-2013-1872" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1188-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00019.html" source="SUSE-SU"/>
    <description>
    The Intel drivers in Mesa 8.0.x and 9.0.x allow context-dependent attackers to cause a denial of service (reachable assertion and crash) and possibly execute arbitrary code via vectors involving 3d graphics that trigger an out-of-bounds array access, related to the fs_visitor::remove_dead_constants function.  NOTE: this issue might be related to CVE-2013-0796.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1872/">CVE-2013-1872</cve>
	<bugzilla href="https://bugzilla.suse.com/828007">SUSE bug 828007</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591117" comment="Mesa-9.0.3-0.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591118" comment="Mesa-32bit-9.0.3-0.19.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1881</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1881" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1881" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1881" ref_url="https://www.suse.com/security/cve/CVE-2013-1881" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1786-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00114.html" source="SUSE-SU"/>
    <description>
    GNOME libsvg before 2.39.0 allows remote attackers to read arbitrary files via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1881/">CVE-2013-1881</cve>
	<bugzilla href="https://bugzilla.suse.com/840753">SUSE bug 840753</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566909" comment="librsvg-2.26.0-2.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566910" comment="librsvg-32bit-2.26.0-2.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566911" comment="rsvg-view-2.26.0-2.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1899</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1899" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1899" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1899" ref_url="https://www.suse.com/security/cve/CVE-2013-1899" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0633-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0627-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0628-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0635-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00012.html" source="SUSE-SU"/>
    <description>
    Argument injection vulnerability in PostgreSQL 9.2.x before 9.2.4, 9.1.x before 9.1.9, and 9.0.x before 9.0.13 allows remote attackers to cause a denial of service (file corruption), and allows remote authenticated users to modify configuration settings and execute arbitrary code, via a connection request using a database name that begins with a "-" (hyphen).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1899/">CVE-2013-1899</cve>
	<bugzilla href="https://bugzilla.suse.com/812525">SUSE bug 812525</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566100" comment="libecpg6-9.1.9-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566101" comment="libpq5-9.1.9-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566102" comment="libpq5-32bit-9.1.9-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566103" comment="postgresql91-9.1.9-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1900</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1900" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1900" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1900" ref_url="https://www.suse.com/security/cve/CVE-2013-1900" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0633-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0627-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0628-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0635-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00012.html" source="SUSE-SU"/>
    <description>
    PostgreSQL 9.2.x before 9.2.4, 9.1.x before 9.1.9, 9.0.x before 9.0.13, and 8.4.x before 8.4.17, when using OpenSSL, generates insufficiently random numbers, which might allow remote authenticated users to have an unspecified impact via vectors related to the "contrib/pgcrypto functions."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1900/">CVE-2013-1900</cve>
	<bugzilla href="https://bugzilla.suse.com/812525">SUSE bug 812525</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566100" comment="libecpg6-9.1.9-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566101" comment="libpq5-9.1.9-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566102" comment="libpq5-32bit-9.1.9-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566103" comment="postgresql91-9.1.9-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1901</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1901" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1901" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1901" ref_url="https://www.suse.com/security/cve/CVE-2013-1901" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0633-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0627-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0628-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0635-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00012.html" source="SUSE-SU"/>
    <description>
    PostgreSQL 9.2.x before 9.2.4 and 9.1.x before 9.1.9 does not properly check REPLICATION privileges, which allows remote authenticated users to bypass intended backup restrictions by calling the (1) pg_start_backup or (2) pg_stop_backup functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1901/">CVE-2013-1901</cve>
	<bugzilla href="https://bugzilla.suse.com/812525">SUSE bug 812525</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566100" comment="libecpg6-9.1.9-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566101" comment="libpq5-9.1.9-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566102" comment="libpq5-32bit-9.1.9-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566103" comment="postgresql91-9.1.9-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1913</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1913" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1913" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1913" ref_url="https://www.suse.com/security/cve/CVE-2013-1913" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000719.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the load_image function in file-xwd.c in the X Window Dump (XWD) plug-in in GIMP 2.6.9 and earlier, when used with glib before 2.24, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large color entries value in an X Window System (XWD) image dump.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1913/">CVE-2013-1913</cve>
	<bugzilla href="https://bugzilla.suse.com/853423">SUSE bug 853423</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566574" comment="gimp-2.6.2-3.34.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566575" comment="gimp-lang-2.6.2-3.34.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566576" comment="gimp-plugins-python-2.6.2-3.34.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1914</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1914" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1914" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1914" ref_url="https://www.suse.com/security/cve/CVE-2013-1914" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-August/000563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000661.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1510-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00072.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in GNU C Library (aka glibc or libc6) 2.17 and earlier allows remote attackers to cause a denial of service (crash) via a (1) hostname or (2) IP address that triggers a large number of domain conversion results.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1914/">CVE-2013-1914</cve>
	<bugzilla href="https://bugzilla.suse.com/813121">SUSE bug 813121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826666">SUSE bug 826666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882910">SUSE bug 882910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941444">SUSE bug 941444</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566000" comment="glibc-2.11.3-17.45.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566001" comment="glibc-32bit-2.11.3-17.45.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566002" comment="glibc-devel-2.11.3-17.45.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566003" comment="glibc-devel-32bit-2.11.3-17.45.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566004" comment="glibc-i18ndata-2.11.3-17.45.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566005" comment="glibc-locale-2.11.3-17.45.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566006" comment="glibc-locale-32bit-2.11.3-17.45.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566007" comment="nscd-2.11.3-17.45.49.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590138" comment="glibc-2.11.3-17.56.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590139" comment="glibc-32bit-2.11.3-17.56.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590140" comment="glibc-devel-2.11.3-17.56.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590141" comment="glibc-devel-32bit-2.11.3-17.56.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590142" comment="glibc-i18ndata-2.11.3-17.56.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590143" comment="glibc-locale-2.11.3-17.56.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590144" comment="glibc-locale-32bit-2.11.3-17.56.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590145" comment="nscd-2.11.3-17.56.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131917" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1917</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1917" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1917" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1917" ref_url="https://www.suse.com/security/cve/CVE-2013-1917" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1075-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0912-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1392-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1404-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00007.html" source="SUSE-SU"/>
    <description>
    Xen 3.1 through 4.x, when running 64-bit hosts on Intel CPUs, does not clear the NT flag when using an IRET after a SYSENTER instruction, which allows PV guest users to cause a denial of service (hypervisor crash) by triggering a #GP fault, which is not properly handled by another IRET instruction.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1917/">CVE-2013-1917</cve>
	<bugzilla href="https://bugzilla.suse.com/813673">SUSE bug 813673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566239" comment="xen-4.1.5_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566240" comment="xen-doc-html-4.1.5_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566241" comment="xen-doc-pdf-4.1.5_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566242" comment="xen-kmp-default-4.1.5_02_3.0.74_0.6.10-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566243" comment="xen-kmp-pae-4.1.5_02_3.0.74_0.6.10-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566244" comment="xen-kmp-trace-4.1.5_02_3.0.74_0.6.10-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566245" comment="xen-libs-4.1.5_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566246" comment="xen-libs-32bit-4.1.5_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566247" comment="xen-tools-4.1.5_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566248" comment="xen-tools-domU-4.1.5_02-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131918" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1918</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1918" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1918" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1918" ref_url="https://www.suse.com/security/cve/CVE-2013-1918" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1075-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1392-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1404-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00007.html" source="SUSE-SU"/>
    <description>
    Certain page table manipulation operations in Xen 4.1.x, 4.2.x, and earlier are not preemptible, which allows local PV kernels to cause a denial of service via vectors related to "deep page table traversal."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1918/">CVE-2013-1918</cve>
	<bugzilla href="https://bugzilla.suse.com/813673">SUSE bug 813673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816159">SUSE bug 816159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823011">SUSE bug 823011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826882">SUSE bug 826882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566239" comment="xen-4.1.5_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566240" comment="xen-doc-html-4.1.5_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566241" comment="xen-doc-pdf-4.1.5_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566242" comment="xen-kmp-default-4.1.5_02_3.0.74_0.6.10-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566243" comment="xen-kmp-pae-4.1.5_02_3.0.74_0.6.10-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566244" comment="xen-kmp-trace-4.1.5_02_3.0.74_0.6.10-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566245" comment="xen-libs-4.1.5_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566246" comment="xen-libs-32bit-4.1.5_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566247" comment="xen-tools-4.1.5_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566248" comment="xen-tools-domU-4.1.5_02-0.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567207" comment="xen-4.2.3_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567208" comment="xen-doc-html-4.2.3_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567209" comment="xen-doc-pdf-4.2.3_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567210" comment="xen-kmp-default-4.2.3_02_3.0.93_0.8-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567211" comment="xen-kmp-pae-4.2.3_02_3.0.93_0.8-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567212" comment="xen-libs-4.2.3_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567213" comment="xen-libs-32bit-4.2.3_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567214" comment="xen-tools-4.2.3_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567215" comment="xen-tools-domU-4.2.3_02-0.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131919" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1919</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1919" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1919" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1919" ref_url="https://www.suse.com/security/cve/CVE-2013-1919" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1075-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0912-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1392-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1404-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00007.html" source="SUSE-SU"/>
    <description>
    Xen 4.2.x and 4.1.x does not properly restrict access to IRQs, which allows local stub domain clients to gain access to IRQs and cause a denial of service via vectors related to "passed-through IRQs or PCI devices."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1919/">CVE-2013-1919</cve>
	<bugzilla href="https://bugzilla.suse.com/813673">SUSE bug 813673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813675">SUSE bug 813675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566239" comment="xen-4.1.5_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566240" comment="xen-doc-html-4.1.5_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566241" comment="xen-doc-pdf-4.1.5_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566242" comment="xen-kmp-default-4.1.5_02_3.0.74_0.6.10-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566243" comment="xen-kmp-pae-4.1.5_02_3.0.74_0.6.10-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566244" comment="xen-kmp-trace-4.1.5_02_3.0.74_0.6.10-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566245" comment="xen-libs-4.1.5_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566246" comment="xen-libs-32bit-4.1.5_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566247" comment="xen-tools-4.1.5_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566248" comment="xen-tools-domU-4.1.5_02-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131920" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1920</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1920" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1920" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1920" ref_url="https://www.suse.com/security/cve/CVE-2013-1920" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1075-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0912-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1392-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00056.html" source="SUSE-SU"/>
    <description>
    Xen 4.2.x, 4.1.x, and earlier, when the hypervisor is running "under memory pressure" and the Xen Security Module (XSM) is enabled, uses the wrong ordering of operations when extending the per-domain event channel tracking table, which causes a use-after-free and allows local guest kernels to inject arbitrary events and gain privileges via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1920/">CVE-2013-1920</cve>
	<bugzilla href="https://bugzilla.suse.com/813673">SUSE bug 813673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813677">SUSE bug 813677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566239" comment="xen-4.1.5_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566240" comment="xen-doc-html-4.1.5_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566241" comment="xen-doc-pdf-4.1.5_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566242" comment="xen-kmp-default-4.1.5_02_3.0.74_0.6.10-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566243" comment="xen-kmp-pae-4.1.5_02_3.0.74_0.6.10-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566244" comment="xen-kmp-trace-4.1.5_02_3.0.74_0.6.10-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566245" comment="xen-libs-4.1.5_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566246" comment="xen-libs-32bit-4.1.5_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566247" comment="xen-tools-4.1.5_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566248" comment="xen-tools-domU-4.1.5_02-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1922</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1922" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1922" ref_url="https://www.suse.com/security/cve/CVE-2013-1922" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000672.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1404-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00007.html" source="SUSE-SU"/>
    <description>
    qemu-nbd in QEMU, as used in Xen 4.2.x, determines the format of a raw disk image based on the header, which allows local guest OS administrators to read arbitrary files on the host by modifying the header to identify a different format, which is used when the guest is restarted, a different vulnerability than CVE-2008-2004.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1922/">CVE-2013-1922</cve>
	<bugzilla href="https://bugzilla.suse.com/814059">SUSE bug 814059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934753">SUSE bug 934753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934768">SUSE bug 934768</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567216" comment="xen-4.2.3_08-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567217" comment="xen-doc-html-4.2.3_08-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567218" comment="xen-doc-pdf-4.2.3_08-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567219" comment="xen-kmp-default-4.2.3_08_3.0.101_0.8-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567220" comment="xen-kmp-pae-4.2.3_08_3.0.101_0.8-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567221" comment="xen-libs-4.2.3_08-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567222" comment="xen-libs-32bit-4.2.3_08-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567223" comment="xen-tools-4.2.3_08-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567224" comment="xen-tools-domU-4.2.3_08-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1923</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1923" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1923" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1923" ref_url="https://www.suse.com/security/cve/CVE-2013-1923" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000636.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1012-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00142.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1016-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00146.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1048-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00172.html" source="SUSE-SU"/>
    <description>
    rpc-gssd in nfs-utils before 1.2.8 performs reverse DNS resolution for server names during GSSAPI authentication, which might allow remote attackers to read otherwise-restricted files via DNS spoofing attacks.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1923/">CVE-2013-1923</cve>
	<bugzilla href="https://bugzilla.suse.com/813464">SUSE bug 813464</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591144" comment="nfs-client-1.2.3-18.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591145" comment="nfs-kernel-server-1.2.3-18.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1926</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1926" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1926" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1926" ref_url="https://www.suse.com/security/cve/CVE-2013-1926" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0851-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0715-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00106.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0735-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0826-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0893-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0897-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0941-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0966-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00101.html" source="SUSE-SU"/>
    <description>
    The IcedTea-Web plugin before 1.2.3 and 1.3.x before 1.3.2 uses the same class loader for applets with the same codebase path but from different domains, which allows remote attackers to obtain sensitive information or possibly alter other applets via a crafted applet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1926/">CVE-2013-1926</cve>
	<bugzilla href="https://bugzilla.suse.com/815596">SUSE bug 815596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/818768">SUSE bug 818768</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589913" comment="icedtea-web-1.4-0.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589914" comment="icedtea-web-1.4-0.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1927</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1927" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1927" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1927" ref_url="https://www.suse.com/security/cve/CVE-2013-1927" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0851-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0715-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00106.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0735-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0826-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0893-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0897-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0941-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0966-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00101.html" source="SUSE-SU"/>
    <description>
    The IcedTea-Web plugin before 1.2.3 and 1.3.x before 1.3.2 allows remote attackers to execute arbitrary code via a crafted file that validates as both a GIF and a Java JAR file, aka "GIFAR."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1927/">CVE-2013-1927</cve>
	<bugzilla href="https://bugzilla.suse.com/815596">SUSE bug 815596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/818768">SUSE bug 818768</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589913" comment="icedtea-web-1.4-0.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589914" comment="icedtea-web-1.4-0.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1929</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1929" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1929" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1929" ref_url="https://www.suse.com/security/cve/CVE-2013-1929" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1474-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000608.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1773-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00106.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1950-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00112.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1971-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00129.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0766-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00013.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the tg3_read_vpd function in drivers/net/ethernet/broadcom/tg3.c in the Linux kernel before 3.8.6 allows physically proximate attackers to cause a denial of service (system crash) or possibly execute arbitrary code via crafted firmware that specifies a long string in the Vital Product Data (VPD) data structure.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1929/">CVE-2013-1929</cve>
	<bugzilla href="https://bugzilla.suse.com/813733">SUSE bug 813733</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590816" comment="kernel-default-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590817" comment="kernel-default-base-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590818" comment="kernel-default-devel-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590819" comment="kernel-default-extra-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590820" comment="kernel-source-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590821" comment="kernel-syms-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590822" comment="kernel-trace-devel-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590823" comment="kernel-xen-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590824" comment="kernel-xen-base-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590825" comment="kernel-xen-devel-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590826" comment="kernel-xen-extra-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590827" comment="xen-kmp-default-4.2.2_06_3.0.93_0.8-0.7.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590800" comment="kernel-default-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590801" comment="kernel-default-base-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590802" comment="kernel-default-devel-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590803" comment="kernel-default-extra-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590804" comment="kernel-source-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590805" comment="kernel-syms-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590806" comment="kernel-trace-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590807" comment="kernel-trace-base-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590808" comment="kernel-trace-devel-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590809" comment="kernel-trace-extra-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590810" comment="kernel-xen-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590811" comment="kernel-xen-base-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590812" comment="kernel-xen-devel-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590813" comment="kernel-xen-extra-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590814" comment="xen-kmp-default-4.1.5_02_3.0.93_0.5-0.5.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590815" comment="xen-kmp-trace-4.1.5_02_3.0.93_0.5-0.5.39 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1940</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1940" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1940" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1940" ref_url="https://www.suse.com/security/cve/CVE-2013-1940" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000844.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0776-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0878-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0937-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00073.html" source="SUSE-SU"/>
    <description>
    X.Org X server before 1.13.4 and 1.4.x before 1.14.1 does not properly restrict access to input events when adding a new hot-plug device, which might allow physically proximate attackers to obtain sensitive information, as demonstrated by reading passwords from a tty.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-1940/">CVE-2013-1940</cve>
	<bugzilla href="https://bugzilla.suse.com/814653">SUSE bug 814653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/815870">SUSE bug 815870</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591149" comment="xorg-x11-Xvnc-7.4-27.70.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591150" comment="xorg-x11-server-7.4-27.70.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591151" comment="xorg-x11-server-extra-7.4-27.70.72.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1944</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1944" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1944" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1944" ref_url="https://www.suse.com/security/cve/CVE-2013-1944" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000644.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0726-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0876-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0879-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00016.html" source="SUSE-SU"/>
    <description>
    The tailMatch function in cookie.c in cURL and libcurl before 7.30.0 does not properly match the path domain when sending cookies, which allows remote attackers to steal cookies via a matching suffix in the domain of a URL.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1944/">CVE-2013-1944</cve>
	<bugzilla href="https://bugzilla.suse.com/814655">SUSE bug 814655</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591162" comment="curl-7.19.7-1.20.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591163" comment="libcurl4-7.19.7-1.20.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591164" comment="libcurl4-32bit-7.19.7-1.20.25.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1945</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1945" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1945" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1945" ref_url="https://www.suse.com/security/cve/CVE-2013-1945" source="SUSE CVE"/>
    <description>
    ruby193 uses an insecure LD_LIBRARY_PATH setting.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-1945/">CVE-2013-1945</cve>
	<bugzilla href="https://bugzilla.suse.com/1160788">SUSE bug 1160788</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334050" comment="ruby is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1952</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1952" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1952" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1952" ref_url="https://www.suse.com/security/cve/CVE-2013-1952" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1075-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1392-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1404-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00007.html" source="SUSE-SU"/>
    <description>
    Xen 4.x, when using Intel VT-d for a bus mastering capable PCI device, does not properly check the source when accessing a bridge device's interrupt remapping table entries for MSI interrupts, which allows local guest domains to cause a denial of service (interrupt injection) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1952/">CVE-2013-1952</cve>
	<bugzilla href="https://bugzilla.suse.com/813673">SUSE bug 813673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816163">SUSE bug 816163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566239" comment="xen-4.1.5_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566240" comment="xen-doc-html-4.1.5_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566241" comment="xen-doc-pdf-4.1.5_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566242" comment="xen-kmp-default-4.1.5_02_3.0.74_0.6.10-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566243" comment="xen-kmp-pae-4.1.5_02_3.0.74_0.6.10-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566244" comment="xen-kmp-trace-4.1.5_02_3.0.74_0.6.10-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566245" comment="xen-libs-4.1.5_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566246" comment="xen-libs-32bit-4.1.5_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566247" comment="xen-tools-4.1.5_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566248" comment="xen-tools-domU-4.1.5_02-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1960</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1960" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1960" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1960" ref_url="https://www.suse.com/security/cve/CVE-2013-1960" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0795-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000623.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0812-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0812-2" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0922-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0944-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00080.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the t2p_process_jpeg_strip function in tiff2pdf in libtiff 4.0.3 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted TIFF image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-11"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1960/">CVE-2013-1960</cve>
	<bugzilla href="https://bugzilla.suse.com/817573">SUSE bug 817573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854393">SUSE bug 854393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591172" comment="libtiff3-3.8.2-141.152.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591173" comment="libtiff3-32bit-3.8.2-141.152.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1961</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1961" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1961" ref_url="https://www.suse.com/security/cve/CVE-2013-1961" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0795-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000623.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0812-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0812-2" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0922-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0944-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00080.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the t2p_write_pdf_page function in tiff2pdf in libtiff before 4.0.3 allows remote attackers to cause a denial of service (application crash) via a crafted image length and resolution in a TIFF image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-11"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1961/">CVE-2013-1961</cve>
	<bugzilla href="https://bugzilla.suse.com/817573">SUSE bug 817573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/818117">SUSE bug 818117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854393">SUSE bug 854393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591172" comment="libtiff3-3.8.2-141.152.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591173" comment="libtiff3-32bit-3.8.2-141.152.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1964</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1964" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1964" ref_url="https://www.suse.com/security/cve/CVE-2013-1964" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1075-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1392-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00056.html" source="SUSE-SU"/>
    <description>
    Xen 4.0.x and 4.1.x incorrectly releases a grant reference when releasing a non-v1, non-transitive grant, which allows local guest administrators to cause a denial of service (host crash), obtain sensitive information, or possibly have other impacts via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1964/">CVE-2013-1964</cve>
	<bugzilla href="https://bugzilla.suse.com/813673">SUSE bug 813673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813675">SUSE bug 813675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816156">SUSE bug 816156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566239" comment="xen-4.1.5_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566240" comment="xen-doc-html-4.1.5_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566241" comment="xen-doc-pdf-4.1.5_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566242" comment="xen-kmp-default-4.1.5_02_3.0.74_0.6.10-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566243" comment="xen-kmp-pae-4.1.5_02_3.0.74_0.6.10-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566244" comment="xen-kmp-trace-4.1.5_02_3.0.74_0.6.10-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566245" comment="xen-libs-4.1.5_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566246" comment="xen-libs-32bit-4.1.5_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566247" comment="xen-tools-4.1.5_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566248" comment="xen-tools-domU-4.1.5_02-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1978</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1978" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1978" ref_url="https://www.suse.com/security/cve/CVE-2013-1978" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000719.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the read_xwd_cols function in file-xwd.c in the X Window Dump (XWD) plug-in in GIMP 2.6.9 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an X Window System (XWD) image dump with more colors than color map entries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1978/">CVE-2013-1978</cve>
	<bugzilla href="https://bugzilla.suse.com/853425">SUSE bug 853425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566574" comment="gimp-2.6.2-3.34.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566575" comment="gimp-lang-2.6.2-3.34.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566576" comment="gimp-plugins-python-2.6.2-3.34.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1979</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1979" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1979" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1979" ref_url="https://www.suse.com/security/cve/CVE-2013-1979" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1022-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1022-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1182-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1316-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005470.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1971-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00129.html" source="SUSE-SU"/>
    <description>
    The scm_set_cred function in include/net/scm.h in the Linux kernel before 3.8.11 uses incorrect uid and gid values during credentials passing, which allows local users to gain privileges via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1979/">CVE-2013-1979</cve>
	<bugzilla href="https://bugzilla.suse.com/816708">SUSE bug 816708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566710" comment="kernel-default-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566711" comment="kernel-default-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566712" comment="kernel-default-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566713" comment="kernel-default-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566718" comment="kernel-source-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566719" comment="kernel-syms-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566720" comment="kernel-trace-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566721" comment="kernel-xen-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566722" comment="kernel-xen-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566723" comment="kernel-xen-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566724" comment="kernel-xen-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590534" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590535" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590507" comment="kernel-default-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590508" comment="kernel-default-base-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590509" comment="kernel-default-devel-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590510" comment="kernel-default-extra-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590511" comment="kernel-source-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590512" comment="kernel-syms-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590513" comment="kernel-trace-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590514" comment="kernel-trace-base-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590515" comment="kernel-trace-devel-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590516" comment="kernel-trace-extra-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590517" comment="kernel-xen-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590518" comment="kernel-xen-base-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590519" comment="kernel-xen-devel-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590520" comment="kernel-xen-extra-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590521" comment="xen-kmp-default-4.1.5_02_3.0.80_0.5-0.5.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590522" comment="xen-kmp-trace-4.1.5_02_3.0.80_0.5-0.5.5 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1981</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1981" ref_url="https://www.suse.com/security/cve/CVE-2013-1981" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1100-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000909.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1047-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00171.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in X.org libX11 1.5.99.901 (1.6 RC1) and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XQueryFont, (2) _XF86BigfontQueryFont, (3) XListFontsWithInfo, (4) XGetMotionEvents, (5) XListHosts, (6) XGetModifierMapping, (7) XGetPointerMapping, (8) XGetKeyboardMapping, (9) XGetWindowProperty, (10) XGetImage, (11) LoadColornameDB, (12) XrmGetFileDatabase, (13) _XimParseStringFile, or (14) TransFileName functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1981/">CVE-2013-1981</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821664">SUSE bug 821664</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566275" comment="xorg-x11-libX11-7.4-5.11.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566276" comment="xorg-x11-libX11-32bit-7.4-5.11.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566277" comment="xorg-x11-libX11-devel-7.4-5.11.11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566275" comment="xorg-x11-libX11-7.4-5.11.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566276" comment="xorg-x11-libX11-32bit-7.4-5.11.11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1982</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1982" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1982" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1982" ref_url="https://www.suse.com/security/cve/CVE-2013-1982" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1099-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000906.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1009-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00139.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in X.org libXext 1.3.1 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XcupGetReservedColormapEntries, (2) XcupStoreColors, (3) XdbeGetVisualInfo, (4) XeviGetVisualInfo, (5) XShapeGetRectangles, and (6) XSyncListSystemCounters functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1982/">CVE-2013-1982</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821665">SUSE bug 821665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566278" comment="xorg-x11-libXext-7.4-1.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566279" comment="xorg-x11-libXext-32bit-7.4-1.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566280" comment="xorg-x11-libXext-devel-7.4-1.18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567276" comment="xorg-x11-libXext-7.4-1.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567277" comment="xorg-x11-libXext-32bit-7.4-1.18.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1983</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1983" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1983" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1983" ref_url="https://www.suse.com/security/cve/CVE-2013-1983" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1097-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000916.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1014-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00144.html" source="SUSE-SU"/>
    <description>
    Integer overflow in X.org libXfixes 5.0 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the XFixesGetCursorImage function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1983/">CVE-2013-1983</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821667">SUSE bug 821667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880221">SUSE bug 880221</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566281" comment="xorg-x11-libXfixes-7.4-1.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566282" comment="xorg-x11-libXfixes-32bit-7.4-1.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566283" comment="xorg-x11-libXfixes-devel-7.4-1.16.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567278" comment="xorg-x11-libXfixes-7.4-1.16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567279" comment="xorg-x11-libXfixes-32bit-7.4-1.16.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1984</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1984" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1984" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1984" ref_url="https://www.suse.com/security/cve/CVE-2013-1984" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1103-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000904.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1033-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00161.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in X.org libXi 1.7.1 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XGetDeviceControl, (2) XGetFeedbackControl, (3) XGetDeviceDontPropagateList, (4) XGetDeviceMotionEvents, (5) XIGetProperty, (6) XIGetSelectedEvents, (7) XGetDeviceProperties, and (8) XListInputDevices functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1984/">CVE-2013-1984</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821663">SUSE bug 821663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591191" comment="xorg-x11-devel-7.4-8.26.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591192" comment="xorg-x11-libs-7.4-8.26.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591193" comment="xorg-x11-libs-32bit-7.4-8.26.36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591194" comment="xorg-x11-libs-7.4-8.26.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591195" comment="xorg-x11-libs-32bit-7.4-8.26.38.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1985</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1985" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1985" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1985" ref_url="https://www.suse.com/security/cve/CVE-2013-1985" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1103-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000904.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1026-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00154.html" source="SUSE-SU"/>
    <description>
    Integer overflow in X.org libXinerama 1.1.2 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the XineramaQueryScreens function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1985/">CVE-2013-1985</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821663">SUSE bug 821663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591191" comment="xorg-x11-devel-7.4-8.26.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591192" comment="xorg-x11-libs-7.4-8.26.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591193" comment="xorg-x11-libs-32bit-7.4-8.26.36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591194" comment="xorg-x11-libs-7.4-8.26.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591195" comment="xorg-x11-libs-32bit-7.4-8.26.38.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1986</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1986" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1986" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1986" ref_url="https://www.suse.com/security/cve/CVE-2013-1986" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1103-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000904.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1028-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00156.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in X.org libXrandr 1.4.0 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XRRQueryOutputProperty and (2) XRRQueryProviderProperty functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1986/">CVE-2013-1986</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821663">SUSE bug 821663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591191" comment="xorg-x11-devel-7.4-8.26.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591192" comment="xorg-x11-libs-7.4-8.26.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591193" comment="xorg-x11-libs-32bit-7.4-8.26.36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591194" comment="xorg-x11-libs-7.4-8.26.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591195" comment="xorg-x11-libs-32bit-7.4-8.26.38.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1987</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1987" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1987" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1987" ref_url="https://www.suse.com/security/cve/CVE-2013-1987" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1095-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000929.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1011-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00141.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in X.org libXrender 0.9.7 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XRenderQueryFilters, (2) XRenderQueryFormats, and (3) XRenderQueryPictIndexValues functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1987/">CVE-2013-1987</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821669">SUSE bug 821669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880221">SUSE bug 880221</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566287" comment="xorg-x11-libXrender-7.4-1.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566288" comment="xorg-x11-libXrender-32bit-7.4-1.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566289" comment="xorg-x11-libXrender-devel-7.4-1.16.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567280" comment="xorg-x11-libXrender-7.4-1.16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567281" comment="xorg-x11-libXrender-32bit-7.4-1.16.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1988</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1988" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1988" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1988" ref_url="https://www.suse.com/security/cve/CVE-2013-1988" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1103-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000904.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1027-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00155.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in X.org libXRes 1.0.6 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XResQueryClients and (2) XResQueryClientResources functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1988/">CVE-2013-1988</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821663">SUSE bug 821663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591191" comment="xorg-x11-devel-7.4-8.26.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591192" comment="xorg-x11-libs-7.4-8.26.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591193" comment="xorg-x11-libs-32bit-7.4-8.26.36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591194" comment="xorg-x11-libs-7.4-8.26.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591195" comment="xorg-x11-libs-32bit-7.4-8.26.38.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1989</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1989" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1989" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1989" ref_url="https://www.suse.com/security/cve/CVE-2013-1989" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1104-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1010-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00140.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in X.org libXv 1.0.7 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XvQueryPortAttributes, (2) XvListImageFormats, and (3) XvCreateImage function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1989/">CVE-2013-1989</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821671">SUSE bug 821671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880221">SUSE bug 880221</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566293" comment="xorg-x11-libXv-7.4-1.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566294" comment="xorg-x11-libXv-32bit-7.4-1.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566295" comment="xorg-x11-libXv-devel-7.4-1.16.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567284" comment="xorg-x11-libXv-7.4-1.16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567285" comment="xorg-x11-libXv-32bit-7.4-1.16.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1990</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1990" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1990" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1990" ref_url="https://www.suse.com/security/cve/CVE-2013-1990" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1103-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000904.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1025-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00153.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in X.org libXvMC 1.0.7 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XvMCListSurfaceTypes and (2) XvMCListSubpictureTypes functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1990/">CVE-2013-1990</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821663">SUSE bug 821663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591191" comment="xorg-x11-devel-7.4-8.26.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591192" comment="xorg-x11-libs-7.4-8.26.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591193" comment="xorg-x11-libs-32bit-7.4-8.26.36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591194" comment="xorg-x11-libs-7.4-8.26.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591195" comment="xorg-x11-libs-32bit-7.4-8.26.38.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1991</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1991" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1991" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1991" ref_url="https://www.suse.com/security/cve/CVE-2013-1991" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1103-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000904.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1030-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00158.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in X.org libXxf86dga 1.1.3 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XDGAQueryModes and (2) XDGASetMode functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1991/">CVE-2013-1991</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821663">SUSE bug 821663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591191" comment="xorg-x11-devel-7.4-8.26.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591192" comment="xorg-x11-libs-7.4-8.26.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591193" comment="xorg-x11-libs-32bit-7.4-8.26.36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591194" comment="xorg-x11-libs-7.4-8.26.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591195" comment="xorg-x11-libs-32bit-7.4-8.26.38.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1992</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1992" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1992" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1992" ref_url="https://www.suse.com/security/cve/CVE-2013-1992" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1103-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000904.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1029-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00157.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in X.org libdmx 1.1.2 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) DMXGetScreenAttributes, (2) DMXGetWindowAttributes, and (3) DMXGetInputAttributes functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1992/">CVE-2013-1992</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821663">SUSE bug 821663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591191" comment="xorg-x11-devel-7.4-8.26.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591192" comment="xorg-x11-libs-7.4-8.26.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591193" comment="xorg-x11-libs-32bit-7.4-8.26.36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591194" comment="xorg-x11-libs-7.4-8.26.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591195" comment="xorg-x11-libs-32bit-7.4-8.26.38.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1993</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1993" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1993" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1993" ref_url="https://www.suse.com/security/cve/CVE-2013-1993" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1098-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000921.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0865-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00007.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in X.org libGLX in Mesa 9.1.1 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XF86DRIOpenConnection and (2) XF86DRIGetClientDriverName functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1993/">CVE-2013-1993</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821855">SUSE bug 821855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880221">SUSE bug 880221</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565844" comment="Mesa-7.11.2-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565845" comment="Mesa-32bit-7.11.2-0.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1995</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1995" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1995" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1995" ref_url="https://www.suse.com/security/cve/CVE-2013-1995" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1103-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000904.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1033-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00161.html" source="SUSE-SU"/>
    <description>
    X.org libXi 1.7.1 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to an unexpected sign extension in the XListInputDevices function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1995/">CVE-2013-1995</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821663">SUSE bug 821663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591191" comment="xorg-x11-devel-7.4-8.26.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591192" comment="xorg-x11-libs-7.4-8.26.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591193" comment="xorg-x11-libs-32bit-7.4-8.26.36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591194" comment="xorg-x11-libs-7.4-8.26.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591195" comment="xorg-x11-libs-32bit-7.4-8.26.38.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1996</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1996" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1996" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1996" ref_url="https://www.suse.com/security/cve/CVE-2013-1996" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1103-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000904.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1034-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00162.html" source="SUSE-SU"/>
    <description>
    X.org libFS 1.0.4 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to an unexpected sign extension in the FSOpenServer function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1996/">CVE-2013-1996</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821663">SUSE bug 821663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591191" comment="xorg-x11-devel-7.4-8.26.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591192" comment="xorg-x11-libs-7.4-8.26.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591193" comment="xorg-x11-libs-32bit-7.4-8.26.36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591194" comment="xorg-x11-libs-7.4-8.26.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591195" comment="xorg-x11-libs-32bit-7.4-8.26.38.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1997</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1997" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1997" ref_url="https://www.suse.com/security/cve/CVE-2013-1997" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1100-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002689.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1047-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00171.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in X.org libX11 1.5.99.901 (1.6 RC1) and earlier allow X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the (1) XAllocColorCells, (2) _XkbReadGetDeviceInfoReply, (3) _XkbReadGeomShapes, (4) _XkbReadGetGeometryReply, (5) _XkbReadKeySyms, (6) _XkbReadKeyActions, (7) _XkbReadKeyBehaviors, (8) _XkbReadModifierMap, (9) _XkbReadExplicitComponents, (10) _XkbReadVirtualModMap, (11) _XkbReadGetNamesReply, (12) _XkbReadGetMapReply, (13) _XimXGetReadData, (14) XListFonts, (15) XListExtensions, and (16) XGetFontPath functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1997/">CVE-2013-1997</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821664">SUSE bug 821664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/824294">SUSE bug 824294</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566275" comment="xorg-x11-libX11-7.4-5.11.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566276" comment="xorg-x11-libX11-32bit-7.4-5.11.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566277" comment="xorg-x11-libX11-devel-7.4-5.11.11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566275" comment="xorg-x11-libX11-7.4-5.11.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566276" comment="xorg-x11-libX11-32bit-7.4-5.11.11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131998" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1998</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1998" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1998" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1998" ref_url="https://www.suse.com/security/cve/CVE-2013-1998" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1103-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000904.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1033-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00161.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in X.org libXi 1.7.1 and earlier allow X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the (1) XGetDeviceButtonMapping, (2) XIPassiveGrabDevice, and (3) XQueryDeviceState functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1998/">CVE-2013-1998</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821663">SUSE bug 821663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591191" comment="xorg-x11-devel-7.4-8.26.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591192" comment="xorg-x11-libs-7.4-8.26.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591193" comment="xorg-x11-libs-32bit-7.4-8.26.36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591194" comment="xorg-x11-libs-7.4-8.26.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591195" comment="xorg-x11-libs-32bit-7.4-8.26.38.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1999</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1999" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1999" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1999" ref_url="https://www.suse.com/security/cve/CVE-2013-1999" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1103-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000904.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1025-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00153.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in X.org libXvMC 1.0.7 and earlier allows X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the XvMCGetDRInfo function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1999/">CVE-2013-1999</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821663">SUSE bug 821663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591191" comment="xorg-x11-devel-7.4-8.26.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591192" comment="xorg-x11-libs-7.4-8.26.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591193" comment="xorg-x11-libs-32bit-7.4-8.26.36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591194" comment="xorg-x11-libs-7.4-8.26.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591195" comment="xorg-x11-libs-32bit-7.4-8.26.38.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2000</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2000" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2000" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2000" ref_url="https://www.suse.com/security/cve/CVE-2013-2000" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1103-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000904.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1030-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00158.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in X.org libXxf86dga 1.1.3 and earlier allow X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the (1) XDGAQueryModes and (2) XDGASetMode functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2000/">CVE-2013-2000</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821663">SUSE bug 821663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591191" comment="xorg-x11-devel-7.4-8.26.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591192" comment="xorg-x11-libs-7.4-8.26.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591193" comment="xorg-x11-libs-32bit-7.4-8.26.36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591194" comment="xorg-x11-libs-7.4-8.26.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591195" comment="xorg-x11-libs-32bit-7.4-8.26.38.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2001</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2001" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2001" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2001" ref_url="https://www.suse.com/security/cve/CVE-2013-2001" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1103-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000904.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1041-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00165.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in X.org libXxf86vm 1.1.2 and earlier allows X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the XF86VidModeGetGammaRamp function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2001/">CVE-2013-2001</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821663">SUSE bug 821663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591191" comment="xorg-x11-devel-7.4-8.26.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591192" comment="xorg-x11-libs-7.4-8.26.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591193" comment="xorg-x11-libs-32bit-7.4-8.26.36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591194" comment="xorg-x11-libs-7.4-8.26.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591195" comment="xorg-x11-libs-32bit-7.4-8.26.38.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2002</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2002" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2002" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2002" ref_url="https://www.suse.com/security/cve/CVE-2013-2002" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1101-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000914.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1008-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00138.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in X.org libXt 1.1.3 and earlier allows X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the _XtResourceConfigurationEH function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2002/">CVE-2013-2002</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821670">SUSE bug 821670</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566290" comment="xorg-x11-libXt-7.4-1.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566291" comment="xorg-x11-libXt-32bit-7.4-1.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566292" comment="xorg-x11-libXt-devel-7.4-1.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567282" comment="xorg-x11-libXt-7.4-1.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567283" comment="xorg-x11-libXt-32bit-7.4-1.19.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2003</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2003" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2003" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2003" ref_url="https://www.suse.com/security/cve/CVE-2013-2003" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1103-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000904.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1031-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00159.html" source="SUSE-SU"/>
    <description>
    Integer overflow in X.org libXcursor 1.1.13 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the _XcursorFileHeaderCreate function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2003/">CVE-2013-2003</cve>
	<bugzilla href="https://bugzilla.suse.com/1065386">SUSE bug 1065386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821663">SUSE bug 821663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591191" comment="xorg-x11-devel-7.4-8.26.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591192" comment="xorg-x11-libs-7.4-8.26.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591193" comment="xorg-x11-libs-32bit-7.4-8.26.36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591194" comment="xorg-x11-libs-7.4-8.26.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591195" comment="xorg-x11-libs-32bit-7.4-8.26.38.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2004</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2004" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2004" ref_url="https://www.suse.com/security/cve/CVE-2013-2004" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1100-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000909.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1047-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00171.html" source="SUSE-SU"/>
    <description>
    The (1) GetDatabase and (2) _XimParseStringFile functions in X.org libX11 1.5.99.901 (1.6 RC1) and earlier do not restrict the recursion depth when processing directives to include files, which allows X servers to cause a denial of service (stack consumption) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2004/">CVE-2013-2004</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821664">SUSE bug 821664</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566275" comment="xorg-x11-libX11-7.4-5.11.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566276" comment="xorg-x11-libX11-32bit-7.4-5.11.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566277" comment="xorg-x11-libX11-devel-7.4-5.11.11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566275" comment="xorg-x11-libX11-7.4-5.11.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566276" comment="xorg-x11-libX11-32bit-7.4-5.11.11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2005</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2005" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2005" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2005" ref_url="https://www.suse.com/security/cve/CVE-2013-2005" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1101-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000914.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1008-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00138.html" source="SUSE-SU"/>
    <description>
    X.org libXt 1.1.3 and earlier does not check the return value of the XGetWindowProperty function, which allows X servers to trigger use of an uninitialized pointer and memory corruption via vectors related to the (1) ReqCleanup, (2) HandleSelectionEvents, (3) ReqTimedOut, (4) HandleNormal, and (5) HandleSelectionReplies functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2005/">CVE-2013-2005</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821670">SUSE bug 821670</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566290" comment="xorg-x11-libXt-7.4-1.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566291" comment="xorg-x11-libXt-32bit-7.4-1.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566292" comment="xorg-x11-libXt-devel-7.4-1.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567282" comment="xorg-x11-libXt-7.4-1.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567283" comment="xorg-x11-libXt-32bit-7.4-1.19.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2007</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2007" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2007" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2007" ref_url="https://www.suse.com/security/cve/CVE-2013-2007" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000672.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1202-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1404-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00007.html" source="SUSE-SU"/>
    <description>
    The qemu guest agent in Qemu 1.4.1 and earlier, as used by Xen, when started in daemon mode, uses weak permissions for certain files, which allows local users to read and write to these files.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2007/">CVE-2013-2007</cve>
	<bugzilla href="https://bugzilla.suse.com/818181">SUSE bug 818181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/818182">SUSE bug 818182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/818183">SUSE bug 818183</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566058" comment="kvm-0.15.1-0.27.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567216" comment="xen-4.2.3_08-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567217" comment="xen-doc-html-4.2.3_08-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567218" comment="xen-doc-pdf-4.2.3_08-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567219" comment="xen-kmp-default-4.2.3_08_3.0.101_0.8-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567220" comment="xen-kmp-pae-4.2.3_08_3.0.101_0.8-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567221" comment="xen-libs-4.2.3_08-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567222" comment="xen-libs-32bit-4.2.3_08-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567223" comment="xen-tools-4.2.3_08-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567224" comment="xen-tools-domU-4.2.3_08-0.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2016</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2016" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2016" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2016" ref_url="https://www.suse.com/security/cve/CVE-2013-2016" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0623-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00002.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the way qemu v1.3.0 and later (virtio-rng) validates addresses when guest accesses the config space of a virtio device. If the virtio device has zero/small sized config space, such as virtio-rng, a privileged guest user could use this flaw to access the matching host's qemu address space and thus increase their privileges on the host.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2016/">CVE-2013-2016</cve>
	<bugzilla href="https://bugzilla.suse.com/817593">SUSE bug 817593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591216" comment="kvm-1.4.2-0.11.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2020</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2020" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2020" ref_url="https://www.suse.com/security/cve/CVE-2013-2020" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1059-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000506.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0813-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0813-2" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0881-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0883-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00020.html" source="SUSE-SU"/>
    <description>
    Integer underflow in the cli_scanpe function in pe.c in ClamAV before 0.97.8 allows remote attackers to cause a denial of service (crash) via a skewed offset larger than the size of the PE section in a UPX packed executable, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2020/">CVE-2013-2020</cve>
	<bugzilla href="https://bugzilla.suse.com/816865">SUSE bug 816865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899395">SUSE bug 899395</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565899" comment="clamav-0.97.8-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2021</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2021" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2021" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2021" ref_url="https://www.suse.com/security/cve/CVE-2013-2021" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1059-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000506.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0813-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0813-2" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0881-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0883-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00020.html" source="SUSE-SU"/>
    <description>
    pdf.c in ClamAV 0.97.1 through 0.97.7 allows remote attackers to cause a denial of service (out-of-bounds-read) via a crafted length value in an encrypted PDF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2021/">CVE-2013-2021</cve>
	<bugzilla href="https://bugzilla.suse.com/816865">SUSE bug 816865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899395">SUSE bug 899395</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565899" comment="clamav-0.97.8-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2061</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2061" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2061" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2061" ref_url="https://www.suse.com/security/cve/CVE-2013-2061" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000652.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1649-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00016.html" source="SUSE-SU"/>
    <description>
    The openvpn_decrypt function in crypto.c in OpenVPN 2.3.0 and earlier, when running in UDP mode, allows remote attackers to obtain sensitive information via a timing attack involving an HMAC comparison function that does not run in constant time and a padding oracle attack on the CBC mode cipher.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2061/">CVE-2013-2061</cve>
	<bugzilla href="https://bugzilla.suse.com/843509">SUSE bug 843509</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566170" comment="openvpn-2.0.9-143.33.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567028" comment="openvpn-2.0.9-143.40.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2062</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2062" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2062" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2062" ref_url="https://www.suse.com/security/cve/CVE-2013-2062" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1102-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000927.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1046-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00170.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in X.org libXp 1.0.1 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XpGetAttributes, (2) XpGetOneAttribute, (3) XpGetPrinterList, and (4) XpQueryScreens functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2062/">CVE-2013-2062</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821668">SUSE bug 821668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880221">SUSE bug 880221</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566284" comment="xorg-x11-libXp-7.4-1.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566285" comment="xorg-x11-libXp-32bit-7.4-1.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566286" comment="xorg-x11-libXp-devel-7.4-1.18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566284" comment="xorg-x11-libXp-7.4-1.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566285" comment="xorg-x11-libXp-32bit-7.4-1.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2063</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2063" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2063" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2063" ref_url="https://www.suse.com/security/cve/CVE-2013-2063" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1103-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000904.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1032-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00160.html" source="SUSE-SU"/>
    <description>
    Integer overflow in X.org libXtst 1.2.1 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the XRecordGetContext function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2063/">CVE-2013-2063</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821663">SUSE bug 821663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591191" comment="xorg-x11-devel-7.4-8.26.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591192" comment="xorg-x11-libs-7.4-8.26.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591193" comment="xorg-x11-libs-32bit-7.4-8.26.36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591194" comment="xorg-x11-libs-7.4-8.26.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591195" comment="xorg-x11-libs-32bit-7.4-8.26.38.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2064</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2064" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2064" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2064" ref_url="https://www.suse.com/security/cve/CVE-2013-2064" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1007-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00137.html" source="SUSE-SU"/>
    <description>
    Integer overflow in X.org libxcb 1.9 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the read_packet function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2064/">CVE-2013-2064</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821584">SUSE bug 821584</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566296" comment="xorg-x11-libxcb-7.4-1.22.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566297" comment="xorg-x11-libxcb-32bit-7.4-1.22.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566298" comment="xorg-x11-libxcb-devel-7.4-1.22.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2066</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2066" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2066" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2066" ref_url="https://www.suse.com/security/cve/CVE-2013-2066" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1104-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1010-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00140.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in X.org libXv 1.0.7 and earlier allows X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the XvQueryPortAttributes function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2066/">CVE-2013-2066</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821671">SUSE bug 821671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880221">SUSE bug 880221</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566293" comment="xorg-x11-libXv-7.4-1.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566294" comment="xorg-x11-libXv-32bit-7.4-1.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566295" comment="xorg-x11-libXv-devel-7.4-1.16.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567284" comment="xorg-x11-libXv-7.4-1.16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567285" comment="xorg-x11-libXv-32bit-7.4-1.16.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2072</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2072" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2072" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2072" ref_url="https://www.suse.com/security/cve/CVE-2013-2072" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1075-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1392-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1404-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00007.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the Python bindings for the xc_vcpu_setaffinity call in Xen 4.0.x, 4.1.x, and 4.2.x allows local administrators with permissions to configure VCPU affinity to cause a denial of service (memory corruption and xend toolstack crash) and possibly gain privileges via a crafted cpumap.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2072/">CVE-2013-2072</cve>
	<bugzilla href="https://bugzilla.suse.com/813673">SUSE bug 813673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819416">SUSE bug 819416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566239" comment="xen-4.1.5_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566240" comment="xen-doc-html-4.1.5_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566241" comment="xen-doc-pdf-4.1.5_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566242" comment="xen-kmp-default-4.1.5_02_3.0.74_0.6.10-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566243" comment="xen-kmp-pae-4.1.5_02_3.0.74_0.6.10-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566244" comment="xen-kmp-trace-4.1.5_02_3.0.74_0.6.10-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566245" comment="xen-libs-4.1.5_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566246" comment="xen-libs-32bit-4.1.5_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566247" comment="xen-tools-4.1.5_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566248" comment="xen-tools-domU-4.1.5_02-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2076</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2076" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2076" ref_url="https://www.suse.com/security/cve/CVE-2013-2076" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1075-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1314-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1392-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1404-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00007.html" source="SUSE-SU"/>
    <description>
    Xen 4.0.x, 4.1.x, and 4.2.x, when running on AMD64 processors, only save/restore the FOP, FIP, and FDP x87 registers in FXSAVE/FXRSTOR when an exception is pending, which allows one domain to determine portions of the state of floating point instructions of other domains, which can be leveraged to obtain sensitive information such as cryptographic keys, a similar vulnerability to CVE-2006-1056.  NOTE: this is the documented behavior of AMD64 processors, but it is inconsistent with Intel processors in a security-relevant fashion that was not addressed by the kernels.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2076/">CVE-2013-2076</cve>
	<bugzilla href="https://bugzilla.suse.com/813673">SUSE bug 813673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820917">SUSE bug 820917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566239" comment="xen-4.1.5_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566240" comment="xen-doc-html-4.1.5_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566241" comment="xen-doc-pdf-4.1.5_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566242" comment="xen-kmp-default-4.1.5_02_3.0.74_0.6.10-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566243" comment="xen-kmp-pae-4.1.5_02_3.0.74_0.6.10-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566244" comment="xen-kmp-trace-4.1.5_02_3.0.74_0.6.10-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566245" comment="xen-libs-4.1.5_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566246" comment="xen-libs-32bit-4.1.5_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566247" comment="xen-tools-4.1.5_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566248" comment="xen-tools-domU-4.1.5_02-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2077</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2077" ref_url="https://www.suse.com/security/cve/CVE-2013-2077" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1075-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1314-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1392-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1404-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00007.html" source="SUSE-SU"/>
    <description>
    Xen 4.0.x, 4.1.x, and 4.2.x does not properly restrict the contents of a XRSTOR, which allows local PV guest users to cause a denial of service (unhandled exception and hypervisor crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2077/">CVE-2013-2077</cve>
	<bugzilla href="https://bugzilla.suse.com/813673">SUSE bug 813673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820919">SUSE bug 820919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823011">SUSE bug 823011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566239" comment="xen-4.1.5_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566240" comment="xen-doc-html-4.1.5_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566241" comment="xen-doc-pdf-4.1.5_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566242" comment="xen-kmp-default-4.1.5_02_3.0.74_0.6.10-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566243" comment="xen-kmp-pae-4.1.5_02_3.0.74_0.6.10-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566244" comment="xen-kmp-trace-4.1.5_02_3.0.74_0.6.10-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566245" comment="xen-libs-4.1.5_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566246" comment="xen-libs-32bit-4.1.5_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566247" comment="xen-tools-4.1.5_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566248" comment="xen-tools-domU-4.1.5_02-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2078</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2078" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2078" ref_url="https://www.suse.com/security/cve/CVE-2013-2078" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1075-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1314-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1392-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1404-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00007.html" source="SUSE-SU"/>
    <description>
    Xen 4.0.2 through 4.0.4, 4.1.x, and 4.2.x allows local PV guest users to cause a denial of service (hypervisor crash) via certain bit combinations to the XSETBV instruction.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-23"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-2078/">CVE-2013-2078</cve>
	<bugzilla href="https://bugzilla.suse.com/813673">SUSE bug 813673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820920">SUSE bug 820920</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566239" comment="xen-4.1.5_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566240" comment="xen-doc-html-4.1.5_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566241" comment="xen-doc-pdf-4.1.5_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566242" comment="xen-kmp-default-4.1.5_02_3.0.74_0.6.10-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566243" comment="xen-kmp-pae-4.1.5_02_3.0.74_0.6.10-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566244" comment="xen-kmp-trace-4.1.5_02_3.0.74_0.6.10-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566245" comment="xen-libs-4.1.5_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566246" comment="xen-libs-32bit-4.1.5_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566247" comment="xen-tools-4.1.5_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566248" comment="xen-tools-domU-4.1.5_02-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2094</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2094" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2094" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2094" ref_url="https://www.suse.com/security/cve/CVE-2013-2094" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0819-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0819-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000608.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0847-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0925-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0951-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00017.html" source="SUSE-SU"/>
    <description>
    The perf_swevent_init function in kernel/events/core.c in the Linux kernel before 3.8.9 uses an incorrect integer data type, which allows local users to gain privileges via a crafted perf_event_open system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-2094/">CVE-2013-2094</cve>
	<bugzilla href="https://bugzilla.suse.com/819789">SUSE bug 819789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820202">SUSE bug 820202</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591224" comment="kernel-default-3.0.74-0.6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591225" comment="kernel-default-base-3.0.74-0.6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591226" comment="kernel-default-devel-3.0.74-0.6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591227" comment="kernel-default-extra-3.0.74-0.6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591228" comment="kernel-source-3.0.74-0.6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591229" comment="kernel-syms-3.0.74-0.6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591230" comment="kernel-trace-3.0.74-0.6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591231" comment="kernel-trace-base-3.0.74-0.6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591232" comment="kernel-trace-devel-3.0.74-0.6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591233" comment="kernel-trace-extra-3.0.74-0.6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591234" comment="kernel-xen-3.0.74-0.6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591235" comment="kernel-xen-base-3.0.74-0.6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591236" comment="kernel-xen-devel-3.0.74-0.6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591237" comment="kernel-xen-extra-3.0.74-0.6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591238" comment="xen-kmp-default-4.1.4_02_3.0.74_0.6.8-0.5.26 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591239" comment="xen-kmp-trace-4.1.4_02_3.0.74_0.6.8-0.5.26 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2116</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2116" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2116" ref_url="https://www.suse.com/security/cve/CVE-2013-2116" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1060-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0322-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00003.html" source="SUSE-SU"/>
    <description>
    The _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in GnuTLS 2.12.23 allows remote attackers to cause a denial of service (buffer over-read and crash) via a crafted padding length.  NOTE: this might be due to an incorrect fix for CVE-2013-0169.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2116/">CVE-2013-2116</cve>
	<bugzilla href="https://bugzilla.suse.com/821818">SUSE bug 821818</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566008" comment="gnutls-2.4.1-24.39.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566009" comment="libgnutls26-2.4.1-24.39.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566010" comment="libgnutls26-32bit-2.4.1-24.39.47.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2146</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2146" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2146" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2146" ref_url="https://www.suse.com/security/cve/CVE-2013-2146" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000716.html" source="SUSE-SU"/>
    <description>
    arch/x86/kernel/cpu/perf_event_intel.c in the Linux kernel before 3.8.9, when the Performance Events Subsystem is enabled, specifies an incorrect bitmask, which allows local users to cause a denial of service (general protection fault and system crash) by attempting to set a reserved bit.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2146/">CVE-2013-2146</cve>
	<bugzilla href="https://bugzilla.suse.com/825006">SUSE bug 825006</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591274" comment="kernel-default-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591275" comment="kernel-default-base-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591276" comment="kernel-default-devel-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591277" comment="kernel-default-extra-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591278" comment="kernel-source-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591279" comment="kernel-syms-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591280" comment="kernel-trace-devel-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591281" comment="kernel-xen-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591282" comment="kernel-xen-base-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591283" comment="kernel-xen-devel-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591284" comment="kernel-xen-extra-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591285" comment="xen-kmp-default-4.2.3_08_3.0.101_0.15-0.7.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2148</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2148" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2148" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2148" ref_url="https://www.suse.com/security/cve/CVE-2013-2148" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1474-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000608.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1619-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1773-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00106.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1971-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00129.html" source="SUSE-SU"/>
    <description>
    The fill_event_metadata function in fs/notify/fanotify/fanotify_user.c in the Linux kernel through 3.9.4 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory via a read operation on the fanotify descriptor.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2148/">CVE-2013-2148</cve>
	<bugzilla href="https://bugzilla.suse.com/823517">SUSE bug 823517</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590816" comment="kernel-default-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590817" comment="kernel-default-base-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590818" comment="kernel-default-devel-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590819" comment="kernel-default-extra-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590820" comment="kernel-source-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590821" comment="kernel-syms-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590822" comment="kernel-trace-devel-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590823" comment="kernel-xen-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590824" comment="kernel-xen-base-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590825" comment="kernel-xen-devel-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590826" comment="kernel-xen-extra-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590827" comment="xen-kmp-default-4.2.2_06_3.0.93_0.8-0.7.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590800" comment="kernel-default-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590801" comment="kernel-default-base-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590802" comment="kernel-default-devel-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590803" comment="kernel-default-extra-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590804" comment="kernel-source-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590805" comment="kernel-syms-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590806" comment="kernel-trace-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590807" comment="kernel-trace-base-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590808" comment="kernel-trace-devel-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590809" comment="kernel-trace-extra-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590810" comment="kernel-xen-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590811" comment="kernel-xen-base-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590812" comment="kernel-xen-devel-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590813" comment="kernel-xen-extra-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590814" comment="xen-kmp-default-4.1.5_02_3.0.93_0.5-0.5.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590815" comment="xen-kmp-trace-4.1.5_02_3.0.93_0.5-0.5.39 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2164</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2164" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2164" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2164" ref_url="https://www.suse.com/security/cve/CVE-2013-2164" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1474-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1619-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1773-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00106.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1971-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00129.html" source="SUSE-SU"/>
    <description>
    The mmc_ioctl_cdrom_read_data function in drivers/cdrom/cdrom.c in the Linux kernel through 3.10 allows local users to obtain sensitive information from kernel memory via a read operation on a malfunctioning CD-ROM drive.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2164/">CVE-2013-2164</cve>
	<bugzilla href="https://bugzilla.suse.com/824295">SUSE bug 824295</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590816" comment="kernel-default-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590817" comment="kernel-default-base-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590818" comment="kernel-default-devel-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590819" comment="kernel-default-extra-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590820" comment="kernel-source-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590821" comment="kernel-syms-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590822" comment="kernel-trace-devel-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590823" comment="kernel-xen-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590824" comment="kernel-xen-base-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590825" comment="kernel-xen-devel-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590826" comment="kernel-xen-extra-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590827" comment="xen-kmp-default-4.2.2_06_3.0.93_0.8-0.7.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590800" comment="kernel-default-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590801" comment="kernel-default-base-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590802" comment="kernel-default-devel-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590803" comment="kernel-default-extra-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590804" comment="kernel-source-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590805" comment="kernel-syms-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590806" comment="kernel-trace-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590807" comment="kernel-trace-base-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590808" comment="kernel-trace-devel-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590809" comment="kernel-trace-extra-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590810" comment="kernel-xen-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590811" comment="kernel-xen-base-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590812" comment="kernel-xen-devel-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590813" comment="kernel-xen-extra-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590814" comment="xen-kmp-default-4.1.5_02_3.0.93_0.5-0.5.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590815" comment="xen-kmp-trace-4.1.5_02_3.0.93_0.5-0.5.39 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2174</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2174" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2174" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2174" ref_url="https://www.suse.com/security/cve/CVE-2013-2174" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1166-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000644.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1132-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1133-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00013.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the curl_easy_unescape function in lib/escape.c in cURL and libcurl 7.7 through 7.30.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted string ending in a "%" (percent) character.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2174/">CVE-2013-2174</cve>
	<bugzilla href="https://bugzilla.suse.com/824517">SUSE bug 824517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917692">SUSE bug 917692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591320" comment="curl-7.19.7-1.20.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591321" comment="libcurl4-7.19.7-1.20.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591322" comment="libcurl4-32bit-7.19.7-1.20.27.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591323" comment="curl-7.19.7-1.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591324" comment="libcurl4-7.19.7-1.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591325" comment="libcurl4-32bit-7.19.7-1.28.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2189</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2189" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2189" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2189" ref_url="https://www.suse.com/security/cve/CVE-2013-2189" source="SUSE CVE"/>
    <description>
    Apache OpenOffice.org (OOo) before 4.0 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via invalid PLCF data in a DOC document file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2189/">CVE-2013-2189</cve>
	<bugzilla href="https://bugzilla.suse.com/831904">SUSE bug 831904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333957" comment="libreoffice is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2194</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2194" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2194" ref_url="https://www.suse.com/security/cve/CVE-2013-2194" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1314-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the Elf parser (libelf) in Xen 4.2.x and earlier allow local guest administrators with certain permissions to have an unspecified impact via a crafted kernel.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2194/">CVE-2013-2194</cve>
	<bugzilla href="https://bugzilla.suse.com/823011">SUSE bug 823011</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566249" comment="xen-4.1.6_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566250" comment="xen-doc-html-4.1.6_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566251" comment="xen-doc-pdf-4.1.6_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566252" comment="xen-kmp-default-4.1.6_02_3.0.93_0.5-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566253" comment="xen-kmp-pae-4.1.6_02_3.0.93_0.5-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566254" comment="xen-kmp-trace-4.1.6_02_3.0.93_0.5-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566255" comment="xen-libs-4.1.6_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566256" comment="xen-libs-32bit-4.1.6_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566257" comment="xen-tools-4.1.6_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566258" comment="xen-tools-domU-4.1.6_02-0.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567198" comment="xen-4.2.2_06-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567199" comment="xen-doc-html-4.2.2_06-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567200" comment="xen-doc-pdf-4.2.2_06-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567201" comment="xen-kmp-default-4.2.2_06_3.0.82_0.7-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567202" comment="xen-kmp-pae-4.2.2_06_3.0.82_0.7-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567203" comment="xen-libs-4.2.2_06-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567204" comment="xen-libs-32bit-4.2.2_06-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567205" comment="xen-tools-4.2.2_06-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567206" comment="xen-tools-domU-4.2.2_06-0.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2195</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2195" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2195" ref_url="https://www.suse.com/security/cve/CVE-2013-2195" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1314-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html" source="SUSE-SU"/>
    <description>
    The Elf parser (libelf) in Xen 4.2.x and earlier allow local guest administrators with certain permissions to have an unspecified impact via a crafted kernel, related to "pointer dereferences" involving unexpected calculations.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2195/">CVE-2013-2195</cve>
	<bugzilla href="https://bugzilla.suse.com/823011">SUSE bug 823011</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566249" comment="xen-4.1.6_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566250" comment="xen-doc-html-4.1.6_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566251" comment="xen-doc-pdf-4.1.6_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566252" comment="xen-kmp-default-4.1.6_02_3.0.93_0.5-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566253" comment="xen-kmp-pae-4.1.6_02_3.0.93_0.5-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566254" comment="xen-kmp-trace-4.1.6_02_3.0.93_0.5-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566255" comment="xen-libs-4.1.6_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566256" comment="xen-libs-32bit-4.1.6_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566257" comment="xen-tools-4.1.6_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566258" comment="xen-tools-domU-4.1.6_02-0.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567198" comment="xen-4.2.2_06-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567199" comment="xen-doc-html-4.2.2_06-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567200" comment="xen-doc-pdf-4.2.2_06-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567201" comment="xen-kmp-default-4.2.2_06_3.0.82_0.7-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567202" comment="xen-kmp-pae-4.2.2_06_3.0.82_0.7-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567203" comment="xen-libs-4.2.2_06-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567204" comment="xen-libs-32bit-4.2.2_06-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567205" comment="xen-tools-4.2.2_06-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567206" comment="xen-tools-domU-4.2.2_06-0.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2196</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2196" ref_url="https://www.suse.com/security/cve/CVE-2013-2196" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1314-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the Elf parser (libelf) in Xen 4.2.x and earlier allow local guest administrators with certain permissions to have an unspecified impact via a crafted kernel, related to "other problems" that are not CVE-2013-2194 or CVE-2013-2195.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2196/">CVE-2013-2196</cve>
	<bugzilla href="https://bugzilla.suse.com/823011">SUSE bug 823011</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566249" comment="xen-4.1.6_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566250" comment="xen-doc-html-4.1.6_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566251" comment="xen-doc-pdf-4.1.6_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566252" comment="xen-kmp-default-4.1.6_02_3.0.93_0.5-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566253" comment="xen-kmp-pae-4.1.6_02_3.0.93_0.5-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566254" comment="xen-kmp-trace-4.1.6_02_3.0.93_0.5-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566255" comment="xen-libs-4.1.6_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566256" comment="xen-libs-32bit-4.1.6_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566257" comment="xen-tools-4.1.6_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566258" comment="xen-tools-domU-4.1.6_02-0.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567198" comment="xen-4.2.2_06-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567199" comment="xen-doc-html-4.2.2_06-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567200" comment="xen-doc-pdf-4.2.2_06-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567201" comment="xen-kmp-default-4.2.2_06_3.0.82_0.7-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567202" comment="xen-kmp-pae-4.2.2_06_3.0.82_0.7-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567203" comment="xen-libs-4.2.2_06-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567204" comment="xen-libs-32bit-4.2.2_06-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567205" comment="xen-tools-4.2.2_06-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567206" comment="xen-tools-domU-4.2.2_06-0.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2206</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2206" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2206" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2206" ref_url="https://www.suse.com/security/cve/CVE-2013-2206" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1744-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1749-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1950-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00112.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1971-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00129.html" source="SUSE-SU"/>
    <description>
    The sctp_sf_do_5_2_4_dupcook function in net/sctp/sm_statefuns.c in the SCTP implementation in the Linux kernel before 3.8.5 does not properly handle associations during the processing of a duplicate COOKIE ECHO chunk, which allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via crafted SCTP traffic.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-2206/">CVE-2013-2206</cve>
	<bugzilla href="https://bugzilla.suse.com/781018">SUSE bug 781018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826102">SUSE bug 826102</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591350" comment="kernel-default-3.0.101-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591351" comment="kernel-default-base-3.0.101-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591352" comment="kernel-default-devel-3.0.101-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591353" comment="kernel-default-extra-3.0.101-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591354" comment="kernel-source-3.0.101-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591355" comment="kernel-syms-3.0.101-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591356" comment="kernel-trace-devel-3.0.101-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591357" comment="kernel-xen-3.0.101-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591358" comment="kernel-xen-base-3.0.101-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591359" comment="kernel-xen-devel-3.0.101-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591360" comment="kernel-xen-extra-3.0.101-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591361" comment="xen-kmp-default-4.2.3_02_3.0.101_0.8-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591334" comment="kernel-default-3.0.101-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591335" comment="kernel-default-base-3.0.101-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591336" comment="kernel-default-devel-3.0.101-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591337" comment="kernel-default-extra-3.0.101-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591338" comment="kernel-source-3.0.101-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591339" comment="kernel-syms-3.0.101-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591340" comment="kernel-trace-3.0.101-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591341" comment="kernel-trace-base-3.0.101-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591342" comment="kernel-trace-devel-3.0.101-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591343" comment="kernel-trace-extra-3.0.101-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591344" comment="kernel-xen-3.0.101-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591345" comment="kernel-xen-base-3.0.101-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591346" comment="kernel-xen-devel-3.0.101-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591347" comment="kernel-xen-extra-3.0.101-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591348" comment="xen-kmp-default-4.1.6_02_3.0.101_0.5-0.5.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591349" comment="xen-kmp-trace-4.1.6_02_3.0.101_0.5-0.5.5 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2207</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2207" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2207" ref_url="https://www.suse.com/security/cve/CVE-2013-2207" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1510-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00072.html" source="SUSE-SU"/>
    <description>
    pt_chown in GNU C Library (aka glibc or libc6) before 2.18 does not properly check permissions for tty files, which allows local users to change the permission on the files and obtain access to arbitrary pseudo-terminals by leveraging a FUSE file system.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2207/">CVE-2013-2207</cve>
	<bugzilla href="https://bugzilla.suse.com/830257">SUSE bug 830257</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566585" comment="glibc-2.11.3-17.87.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566586" comment="glibc-32bit-2.11.3-17.87.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566587" comment="glibc-devel-2.11.3-17.87.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566588" comment="glibc-devel-32bit-2.11.3-17.87.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566589" comment="glibc-i18ndata-2.11.3-17.87.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566590" comment="glibc-locale-2.11.3-17.87.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566591" comment="glibc-locale-32bit-2.11.3-17.87.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566592" comment="nscd-2.11.3-17.87.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2211</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2211" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2211" ref_url="https://www.suse.com/security/cve/CVE-2013-2211" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1314-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1392-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00056.html" source="SUSE-SU"/>
    <description>
    The libxenlight (libxl) toolstack library in Xen 4.0.x, 4.1.x, and 4.2.x uses weak permissions for xenstore keys for paravirtualised and emulated serial console devices, which allows local guest administrators to modify the xenstore value via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2211/">CVE-2013-2211</cve>
	<bugzilla href="https://bugzilla.suse.com/823608">SUSE bug 823608</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566249" comment="xen-4.1.6_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566250" comment="xen-doc-html-4.1.6_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566251" comment="xen-doc-pdf-4.1.6_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566252" comment="xen-kmp-default-4.1.6_02_3.0.93_0.5-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566253" comment="xen-kmp-pae-4.1.6_02_3.0.93_0.5-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566254" comment="xen-kmp-trace-4.1.6_02_3.0.93_0.5-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566255" comment="xen-libs-4.1.6_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566256" comment="xen-libs-32bit-4.1.6_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566257" comment="xen-tools-4.1.6_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566258" comment="xen-tools-domU-4.1.6_02-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2212</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2212" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2212" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2212" ref_url="https://www.suse.com/security/cve/CVE-2013-2212" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0372-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0482-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0483-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00010.html" source="SUSE-SU"/>
    <description>
    The vmx_set_uc_mode function in Xen 3.3 through 4.3, when disabling caches, allows local HVM guests with access to memory mapped I/O regions to cause a denial of service (CPU consumption and possibly hypervisor or guest kernel panic) via a crafted GFN range.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2212/">CVE-2013-2212</cve>
	<bugzilla href="https://bugzilla.suse.com/826718">SUSE bug 826718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/831120">SUSE bug 831120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846849">SUSE bug 846849</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567225" comment="xen-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567226" comment="xen-doc-html-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567227" comment="xen-doc-pdf-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567228" comment="xen-kmp-default-4.2.4_02_3.0.101_0.15-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567229" comment="xen-kmp-pae-4.2.4_02_3.0.101_0.15-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567230" comment="xen-libs-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567231" comment="xen-libs-32bit-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567232" comment="xen-tools-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567233" comment="xen-tools-domU-4.2.4_02-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2232</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2232" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2232" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2232" ref_url="https://www.suse.com/security/cve/CVE-2013-2232" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1474-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1619-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1773-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00106.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1971-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00129.html" source="SUSE-SU"/>
    <description>
    The ip6_sk_dst_check function in net/ipv6/ip6_output.c in the Linux kernel before 3.10 allows local users to cause a denial of service (system crash) by using an AF_INET6 socket for a connection to an IPv4 interface.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-2232/">CVE-2013-2232</cve>
	<bugzilla href="https://bugzilla.suse.com/827750">SUSE bug 827750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590816" comment="kernel-default-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590817" comment="kernel-default-base-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590818" comment="kernel-default-devel-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590819" comment="kernel-default-extra-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590820" comment="kernel-source-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590821" comment="kernel-syms-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590822" comment="kernel-trace-devel-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590823" comment="kernel-xen-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590824" comment="kernel-xen-base-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590825" comment="kernel-xen-devel-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590826" comment="kernel-xen-extra-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590827" comment="xen-kmp-default-4.2.2_06_3.0.93_0.8-0.7.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590800" comment="kernel-default-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590801" comment="kernel-default-base-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590802" comment="kernel-default-devel-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590803" comment="kernel-default-extra-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590804" comment="kernel-source-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590805" comment="kernel-syms-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590806" comment="kernel-trace-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590807" comment="kernel-trace-base-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590808" comment="kernel-trace-devel-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590809" comment="kernel-trace-extra-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590810" comment="kernel-xen-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590811" comment="kernel-xen-base-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590812" comment="kernel-xen-devel-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590813" comment="kernel-xen-extra-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590814" comment="xen-kmp-default-4.1.5_02_3.0.93_0.5-0.5.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590815" comment="xen-kmp-trace-4.1.5_02_3.0.93_0.5-0.5.39 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2234</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2234" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2234" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2234" ref_url="https://www.suse.com/security/cve/CVE-2013-2234" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1474-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1619-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1773-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00106.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1971-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00129.html" source="SUSE-SU"/>
    <description>
    The (1) key_notify_sa_flush and (2) key_notify_policy_flush functions in net/key/af_key.c in the Linux kernel before 3.10 do not initialize certain structure members, which allows local users to obtain sensitive information from kernel heap memory by reading a broadcast message from the notify interface of an IPSec key_socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2234/">CVE-2013-2234</cve>
	<bugzilla href="https://bugzilla.suse.com/827749">SUSE bug 827749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590816" comment="kernel-default-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590817" comment="kernel-default-base-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590818" comment="kernel-default-devel-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590819" comment="kernel-default-extra-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590820" comment="kernel-source-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590821" comment="kernel-syms-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590822" comment="kernel-trace-devel-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590823" comment="kernel-xen-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590824" comment="kernel-xen-base-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590825" comment="kernel-xen-devel-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590826" comment="kernel-xen-extra-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590827" comment="xen-kmp-default-4.2.2_06_3.0.93_0.8-0.7.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590800" comment="kernel-default-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590801" comment="kernel-default-base-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590802" comment="kernel-default-devel-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590803" comment="kernel-default-extra-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590804" comment="kernel-source-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590805" comment="kernel-syms-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590806" comment="kernel-trace-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590807" comment="kernel-trace-base-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590808" comment="kernel-trace-devel-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590809" comment="kernel-trace-extra-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590810" comment="kernel-xen-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590811" comment="kernel-xen-base-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590812" comment="kernel-xen-devel-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590813" comment="kernel-xen-extra-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590814" comment="xen-kmp-default-4.1.5_02_3.0.93_0.5-0.5.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590815" comment="xen-kmp-trace-4.1.5_02_3.0.93_0.5-0.5.39 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2237</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2237" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2237" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2237" ref_url="https://www.suse.com/security/cve/CVE-2013-2237" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1474-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1619-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1773-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00106.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1971-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00129.html" source="SUSE-SU"/>
    <description>
    The key_notify_policy_flush function in net/key/af_key.c in the Linux kernel before 3.9 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel heap memory by reading a broadcast message from the notify_policy interface of an IPSec key_socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2237/">CVE-2013-2237</cve>
	<bugzilla href="https://bugzilla.suse.com/828119">SUSE bug 828119</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590816" comment="kernel-default-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590817" comment="kernel-default-base-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590818" comment="kernel-default-devel-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590819" comment="kernel-default-extra-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590820" comment="kernel-source-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590821" comment="kernel-syms-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590822" comment="kernel-trace-devel-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590823" comment="kernel-xen-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590824" comment="kernel-xen-base-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590825" comment="kernel-xen-devel-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590826" comment="kernel-xen-extra-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590827" comment="xen-kmp-default-4.2.2_06_3.0.93_0.8-0.7.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590800" comment="kernel-default-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590801" comment="kernel-default-base-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590802" comment="kernel-default-devel-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590803" comment="kernel-default-extra-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590804" comment="kernel-source-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590805" comment="kernel-syms-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590806" comment="kernel-trace-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590807" comment="kernel-trace-base-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590808" comment="kernel-trace-devel-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590809" comment="kernel-trace-extra-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590810" comment="kernel-xen-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590811" comment="kernel-xen-base-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590812" comment="kernel-xen-devel-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590813" comment="kernel-xen-extra-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590814" comment="xen-kmp-default-4.1.5_02_3.0.93_0.5-0.5.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590815" comment="xen-kmp-trace-4.1.5_02_3.0.93_0.5-0.5.39 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132266" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2266</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2266" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2266" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2266" ref_url="https://www.suse.com/security/cve/CVE-2013-2266" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000425.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0605-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0619-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0620-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0625-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0666-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00077.html" source="SUSE-SU"/>
    <description>
    libdns in ISC BIND 9.7.x and 9.8.x before 9.8.4-P2, 9.8.5 before 9.8.5b2, 9.9.x before 9.9.2-P2, and 9.9.3 before 9.9.3b2 on UNIX platforms allows remote attackers to cause a denial of service (memory consumption) via a crafted regular expression, as demonstrated by a memory-exhaustion attack against a machine running a named process.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2266/">CVE-2013-2266</cve>
	<bugzilla href="https://bugzilla.suse.com/811876">SUSE bug 811876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/811934">SUSE bug 811934</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565911" comment="dhcp-4.2.4.P2-0.11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565912" comment="dhcp-client-4.2.4.P2-0.11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2274</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2274" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2274" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2274" ref_url="https://www.suse.com/security/cve/CVE-2013-2274" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0641-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00056.html" source="SUSE-SU"/>
    <description>
    Puppet 2.6.x before 2.6.18 and Puppet Enterprise 1.2.x before 1.2.7 allows remote authenticated users to execute arbitrary code on the puppet master, or an agent with puppet kick enabled, via a crafted request for a report.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-2274/">CVE-2013-2274</cve>
	<bugzilla href="https://bugzilla.suse.com/809839">SUSE bug 809839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591050" comment="puppet-2.6.18-0.4.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2275</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2275" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2275" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2275" ref_url="https://www.suse.com/security/cve/CVE-2013-2275" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0641-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00056.html" source="SUSE-SU"/>
    <description>
    The default configuration for puppet masters 0.25.0 and later in Puppet before 2.6.18, 2.7.x before 2.7.21, and 3.1.x before 3.1.1, and Puppet Enterprise before 1.2.7 and 2.7.x before 2.7.2, allows remote authenticated nodes to submit reports for other nodes via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2275/">CVE-2013-2275</cve>
	<bugzilla href="https://bugzilla.suse.com/809839">SUSE bug 809839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880224">SUSE bug 880224</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591050" comment="puppet-2.6.18-0.4.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2383</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2383" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2383" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2383" ref_url="https://www.suse.com/security/cve/CVE-2013-2383" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0934-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0745-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0777-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0964-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0993-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00129.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-1569, CVE-2013-2384, and CVE-2013-2420. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "handling of [a] glyph table" in the International Components for Unicode (ICU) Layout Engine before 51.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-13"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2383/">CVE-2013-2383</cve>
	<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590718" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590719" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590720" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.5-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2384</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2384" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2384" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2384" ref_url="https://www.suse.com/security/cve/CVE-2013-2384" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0934-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0745-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0777-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0964-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0993-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00129.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-1569, CVE-2013-2383, and CVE-2013-2420. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "font layout" in the International Components for Unicode (ICU) Layout Engine before 51.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-13"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2384/">CVE-2013-2384</cve>
	<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590718" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590719" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590720" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.5-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2407</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2407" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2407" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2407" ref_url="https://www.suse.com/security/cve/CVE-2013-2407" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality and availability via unknown vectors related to Libraries.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "XML security and the class loader."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2407/">CVE-2013-2407</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590914" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590915" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590916" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590917" comment="java-1_7_0-openjdk-1.7.0.6-0.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590918" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590919" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.19.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2412</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2412" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2412" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2412" ref_url="https://www.suse.com/security/cve/CVE-2013-2412" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Serviceability.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to insufficient indication of an SSL connection failure by JConsole, related to RMI connection dialog box.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2412/">CVE-2013-2412</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590914" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590915" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590916" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590917" comment="java-1_7_0-openjdk-1.7.0.6-0.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590918" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590919" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.19.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2415</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2415" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2415" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2415" ref_url="https://www.suse.com/security/cve/CVE-2013-2415" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0745-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0777-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0964-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0993-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00129.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, and OpenJDK 6 and 7, allows local users to affect confidentiality via vectors related to JAX-WS.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "processing of MTOM attachments" and the creation of temporary files with weak permissions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2415/">CVE-2013-2415</cve>
	<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590718" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590719" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590720" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.5-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2417</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2417" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2417" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2417" ref_url="https://www.suse.com/security/cve/CVE-2013-2417" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0934-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0745-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0777-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0964-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0993-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00129.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect availability via unknown vectors related to Networking.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to an information leak involving InetAddress serialization. CVE has not investigated the apparent discrepancy between vendor reports regarding the impact of this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2417/">CVE-2013-2417</cve>
	<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590718" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590719" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590720" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.5-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2419</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2419" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2419" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2419" ref_url="https://www.suse.com/security/cve/CVE-2013-2419" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0934-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0745-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0777-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0964-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0993-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00129.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect availability via unknown vectors related to 2D.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "font processing errors" in the International Components for Unicode (ICU) Layout Engine before 51.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2419/">CVE-2013-2419</cve>
	<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590718" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590719" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590720" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.5-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2420</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2420" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2420" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2420" ref_url="https://www.suse.com/security/cve/CVE-2013-2420" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0934-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0745-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0777-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0964-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0993-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00129.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to insufficient "validation of images" in share/native/sun/awt/image/awt_ImageRep.c, possibly involving offsets.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2420/">CVE-2013-2420</cve>
	<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590718" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590719" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590720" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.5-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2421</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2421" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2421" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2421" ref_url="https://www.suse.com/security/cve/CVE-2013-2421" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0745-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0777-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0964-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0993-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00129.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to HotSpot.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect MethodHandle lookups, which allows remote attackers to bypass Java sandbox restrictions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2421/">CVE-2013-2421</cve>
	<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590718" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590719" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590720" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.5-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2422</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2422" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2422" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2422" ref_url="https://www.suse.com/security/cve/CVE-2013-2422" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0745-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0777-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0964-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0993-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00129.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier and 6 Update 43 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper method-invocation restrictions by the MethodUtil trampoline class, which allows remote attackers to bypass the Java sandbox.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2422/">CVE-2013-2422</cve>
	<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590718" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590719" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590720" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.5-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2424</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2424" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2424" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2424" ref_url="https://www.suse.com/security/cve/CVE-2013-2424" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0745-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0777-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0964-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0993-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00129.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality via vectors related to JMX. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "insufficient class access checks" when "creating new instances" using MBeanInstantiator.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2424/">CVE-2013-2424</cve>
	<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590718" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590719" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590720" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.5-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2425</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2425" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2425" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2425" ref_url="https://www.suse.com/security/cve/CVE-2013-2425" source="SUSE CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Install.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-2425/">CVE-2013-2425</cve>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334125" comment="java-1_7_0-openjdk is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2426</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2426" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2426" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2426" ref_url="https://www.suse.com/security/cve/CVE-2013-2426" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0745-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0777-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0964-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0993-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00129.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect invocation of the defaultReadObject method in the ConcurrentHashMap class, which allows remote attackers to bypass the Java sandbox.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2426/">CVE-2013-2426</cve>
	<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590718" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590719" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590720" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.5-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2429</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2429" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2429" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2429" ref_url="https://www.suse.com/security/cve/CVE-2013-2429" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0934-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0745-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0777-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0964-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0993-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00129.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to ImageIO.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "JPEGImageWriter state corruption" when using native code, which triggers memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-2429/">CVE-2013-2429</cve>
	<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590718" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590719" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590720" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.5-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2430</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2430" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2430" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2430" ref_url="https://www.suse.com/security/cve/CVE-2013-2430" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0934-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0745-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0777-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0964-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0993-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00129.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; JavaFX 2.2.7 and earlier; and OpenJDK 6 and 7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to ImageIO. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "JPEGImageReader state corruption" when using native code.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-2430/">CVE-2013-2430</cve>
	<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590718" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590719" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590720" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.5-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2431</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2431" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2431" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2431" ref_url="https://www.suse.com/security/cve/CVE-2013-2431" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0745-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0777-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0964-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0993-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00129.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to HotSpot.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to bypassing the Java sandbox using "method handle intrinsic frames."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2431/">CVE-2013-2431</cve>
	<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590718" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590719" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.5-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590720" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.5-0.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2443</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2443" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2443" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2443" ref_url="https://www.suse.com/security/cve/CVE-2013-2443" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Libraries, a different vulnerability than CVE-2013-2452 and CVE-2013-2455.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is due to an incorrect "checking order" within the AccessControlContext class.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2443/">CVE-2013-2443</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590914" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590915" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590916" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590917" comment="java-1_7_0-openjdk-1.7.0.6-0.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590918" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590919" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.19.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2444</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2444" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2444" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2444" ref_url="https://www.suse.com/security/cve/CVE-2013-2444" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier; JavaFX 2.2.21 and earlier; and OpenJDK 7 allows remote attackers to affect availability via vectors related to AWT.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue does not "properly manage and restrict certain resources related to the processing of fonts," possibly involving temporary files.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2444/">CVE-2013-2444</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590914" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590915" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590916" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590917" comment="java-1_7_0-openjdk-1.7.0.6-0.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590918" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590919" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.19.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2445</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2445" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2445" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2445" ref_url="https://www.suse.com/security/cve/CVE-2013-2445" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect availability via unknown vectors related to Hotspot.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "handling of memory allocation errors."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2445/">CVE-2013-2445</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590914" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590915" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590916" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590917" comment="java-1_7_0-openjdk-1.7.0.6-0.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590918" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590919" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.19.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2446</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2446" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2446" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2446" ref_url="https://www.suse.com/security/cve/CVE-2013-2446" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1264-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via vectors related to CORBA. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue does not properly enforce access restrictions for CORBA output streams.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2446/">CVE-2013-2446</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590914" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590915" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590916" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590917" comment="java-1_7_0-openjdk-1.7.0.6-0.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590918" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590919" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.19.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2447</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2447" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2447" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2447" ref_url="https://www.suse.com/security/cve/CVE-2013-2447" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1264-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Networking.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to obtain a socket's local address via vectors involving inconsistencies between Socket.getLocalAddress and InetAddress.getLocalHost.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2447/">CVE-2013-2447</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590914" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590915" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590916" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590917" comment="java-1_7_0-openjdk-1.7.0.6-0.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590918" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590919" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.19.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2448</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2448" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2448" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2448" ref_url="https://www.suse.com/security/cve/CVE-2013-2448" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to insufficient "access restrictions" and "robustness of sound classes."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2448/">CVE-2013-2448</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590914" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590915" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590916" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590917" comment="java-1_7_0-openjdk-1.7.0.6-0.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590918" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590919" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.19.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2449</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2449" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2449" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2449" ref_url="https://www.suse.com/security/cve/CVE-2013-2449" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Libraries.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to GnomeFileTypeDetector and a missing check for read permissions for a path.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2449/">CVE-2013-2449</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590917" comment="java-1_7_0-openjdk-1.7.0.6-0.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590918" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590919" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.19.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2450</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2450" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2450" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2450" ref_url="https://www.suse.com/security/cve/CVE-2013-2450" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1264-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect availability via unknown vectors related to Serialization.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper handling of circular references in ObjectStreamClass.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2450/">CVE-2013-2450</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590914" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590915" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590916" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590917" comment="java-1_7_0-openjdk-1.7.0.6-0.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590918" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590919" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.19.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2451</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2451" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2451" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2451" ref_url="https://www.suse.com/security/cve/CVE-2013-2451" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier, and OpenJDK 7, allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Networking.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper enforcement of exclusive port binds when running on Windows, which allows attackers to bind to ports that are already in use.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2451/">CVE-2013-2451</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590914" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590915" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590916" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590917" comment="java-1_7_0-openjdk-1.7.0.6-0.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590918" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590919" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.19.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2452</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2452" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2452" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2452" ref_url="https://www.suse.com/security/cve/CVE-2013-2452" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1264-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Libraries, a different vulnerability than CVE-2013-2443 and CVE-2013-2455.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "network address handling in virtual machine identifiers" and the lack of "unique and unpredictable IDs" in the java.rmi.dgc.VMID class.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2452/">CVE-2013-2452</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590914" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590915" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590916" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590917" comment="java-1_7_0-openjdk-1.7.0.6-0.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590918" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590919" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.19.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2453</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2453" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2453" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2453" ref_url="https://www.suse.com/security/cve/CVE-2013-2453" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier allows remote attackers to affect integrity via vectors related to JMX.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is due to a missing check for "package access" by the MBeanServer Introspector.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2453/">CVE-2013-2453</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590914" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590915" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590916" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590917" comment="java-1_7_0-openjdk-1.7.0.6-0.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590918" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590919" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.19.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2454</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2454" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2454" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2454" ref_url="https://www.suse.com/security/cve/CVE-2013-2454" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality and integrity via vectors related to JDBC.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue does not properly restrict access to certain class packages in the SerialJavaObject class, which allows remote attackers to bypass the Java sandbox.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2454/">CVE-2013-2454</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590917" comment="java-1_7_0-openjdk-1.7.0.6-0.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590918" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590919" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.19.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2455</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2455" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2455" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2455" ref_url="https://www.suse.com/security/cve/CVE-2013-2455" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Libraries, a different vulnerability than CVE-2013-2443 and CVE-2013-2452.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect access checks by the (1) getEnclosingClass, (2) getEnclosingMethod, and (3) getEnclosingConstructor methods.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2455/">CVE-2013-2455</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590914" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590915" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590916" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590917" comment="java-1_7_0-openjdk-1.7.0.6-0.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590918" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590919" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.19.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2456</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2456" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2456" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2456" ref_url="https://www.suse.com/security/cve/CVE-2013-2456" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1264-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Serialization.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper access checks for subclasses in the ObjectOutputStream class.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2456/">CVE-2013-2456</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590914" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590915" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590916" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590917" comment="java-1_7_0-openjdk-1.7.0.6-0.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590918" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590919" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.19.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2457</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2457" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2457" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2457" ref_url="https://www.suse.com/security/cve/CVE-2013-2457" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect integrity via vectors related to JMX.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is due to an incorrect implementation of "certain class checks" that allows remote attackers to bypass intended class restrictions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2457/">CVE-2013-2457</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590914" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590915" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590916" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590917" comment="java-1_7_0-openjdk-1.7.0.6-0.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590918" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590919" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.19.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2458</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2458" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2458" ref_url="https://www.suse.com/security/cve/CVE-2013-2458" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality and integrity via unknown vectors related to Libraries.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via "an error related to method handles."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2458/">CVE-2013-2458</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590917" comment="java-1_7_0-openjdk-1.7.0.6-0.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590918" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590919" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.19.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2459</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2459" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2459" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2459" ref_url="https://www.suse.com/security/cve/CVE-2013-2459" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1264-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "integer overflow checks."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2459/">CVE-2013-2459</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590914" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590915" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590916" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590917" comment="java-1_7_0-openjdk-1.7.0.6-0.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590918" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590919" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.19.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2460</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2460" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2460" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2460" ref_url="https://www.suse.com/security/cve/CVE-2013-2460" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Serviceability.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "insufficient access checks" in the tracing component.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2460/">CVE-2013-2460</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590917" comment="java-1_7_0-openjdk-1.7.0.6-0.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590918" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590919" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.19.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2461</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2461" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2461" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2461" ref_url="https://www.suse.com/security/cve/CVE-2013-2461" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier; the Oracle JRockit component in Oracle Fusion Middleware R27.7.5 and earlier and R28.2.7 and earlier; and OpenJDK 7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.  NOTE: the previous information is from the June and July 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass verification of XML signatures via vectors related to a "Missing check for [a] valid DOMCanonicalizationMethod canonicalization algorithm."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2461/">CVE-2013-2461</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590914" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590915" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590916" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590917" comment="java-1_7_0-openjdk-1.7.0.6-0.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590918" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590919" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.19.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2463</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2463" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2463" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2463" ref_url="https://www.suse.com/security/cve/CVE-2013-2463" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1264-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect image attribute verification" in 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2463/">CVE-2013-2463</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590914" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590915" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590916" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590917" comment="java-1_7_0-openjdk-1.7.0.6-0.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590918" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590919" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.19.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2465</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2465" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2465" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2465" ref_url="https://www.suse.com/security/cve/CVE-2013-2465" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1264-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect image channel verification" in 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2465/">CVE-2013-2465</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590914" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590915" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590916" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590917" comment="java-1_7_0-openjdk-1.7.0.6-0.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590918" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590919" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.19.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2469</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2469" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2469" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2469" ref_url="https://www.suse.com/security/cve/CVE-2013-2469" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1264-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect image layout verification" in 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2469/">CVE-2013-2469</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590914" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590915" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590916" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590917" comment="java-1_7_0-openjdk-1.7.0.6-0.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590918" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590919" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.19.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2470</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2470" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2470" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2470" ref_url="https://www.suse.com/security/cve/CVE-2013-2470" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1264-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "ImagingLib byte lookup processing."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2470/">CVE-2013-2470</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590914" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590915" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590916" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590917" comment="java-1_7_0-openjdk-1.7.0.6-0.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590918" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590919" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.19.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2471</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2471" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2471" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2471" ref_url="https://www.suse.com/security/cve/CVE-2013-2471" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1264-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect IntegerComponentRaster size checks."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2471/">CVE-2013-2471</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590914" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590915" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590916" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590917" comment="java-1_7_0-openjdk-1.7.0.6-0.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590918" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590919" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.19.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2472</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2472" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2472" ref_url="https://www.suse.com/security/cve/CVE-2013-2472" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1264-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect ShortBandedRaster size checks" in 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2472/">CVE-2013-2472</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590914" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590915" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590916" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590917" comment="java-1_7_0-openjdk-1.7.0.6-0.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590918" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590919" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.19.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2473</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2473" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2473" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2473" ref_url="https://www.suse.com/security/cve/CVE-2013-2473" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1264-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect ByteBandedRaster size checks" in 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2473/">CVE-2013-2473</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590914" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590915" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590916" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.6-0.2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590917" comment="java-1_7_0-openjdk-1.7.0.6-0.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590918" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590919" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.19.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2475</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2475" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2475" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2475" ref_url="https://www.suse.com/security/cve/CVE-2013-2475" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0494-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0506-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00077.html" source="SUSE-SU"/>
    <description>
    The TCP dissector in Wireshark 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2475/">CVE-2013-2475</cve>
	<bugzilla href="https://bugzilla.suse.com/807942">SUSE bug 807942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591440" comment="wireshark-1.8.6-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2476</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2476" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2476" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2476" ref_url="https://www.suse.com/security/cve/CVE-2013-2476" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0494-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0506-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00077.html" source="SUSE-SU"/>
    <description>
    The dissect_hartip function in epan/dissectors/packet-hartip.c in the HART/IP dissector in Wireshark 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (infinite loop) via a packet with a header that is too short.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2476/">CVE-2013-2476</cve>
	<bugzilla href="https://bugzilla.suse.com/807942">SUSE bug 807942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591440" comment="wireshark-1.8.6-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2477</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2477" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2477" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2477" ref_url="https://www.suse.com/security/cve/CVE-2013-2477" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0494-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0506-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00077.html" source="SUSE-SU"/>
    <description>
    The CSN.1 dissector in Wireshark 1.8.x before 1.8.6 does not properly manage function pointers, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2477/">CVE-2013-2477</cve>
	<bugzilla href="https://bugzilla.suse.com/807942">SUSE bug 807942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591440" comment="wireshark-1.8.6-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2478</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2478" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2478" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2478" ref_url="https://www.suse.com/security/cve/CVE-2013-2478" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0494-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0506-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00077.html" source="SUSE-SU"/>
    <description>
    The dissect_server_info function in epan/dissectors/packet-ms-mms.c in the MS-MMS dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 does not properly manage string lengths, which allows remote attackers to cause a denial of service (application crash) via a malformed packet that (1) triggers an integer overflow or (2) has embedded '\0' characters in a string.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2478/">CVE-2013-2478</cve>
	<bugzilla href="https://bugzilla.suse.com/807942">SUSE bug 807942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591440" comment="wireshark-1.8.6-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2479</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2479" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2479" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2479" ref_url="https://www.suse.com/security/cve/CVE-2013-2479" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0494-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0506-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00077.html" source="SUSE-SU"/>
    <description>
    The dissect_mpls_echo_tlv_dd_map function in epan/dissectors/packet-mpls-echo.c in the MPLS Echo dissector in Wireshark 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (infinite loop) via invalid Sub-tlv data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2479/">CVE-2013-2479</cve>
	<bugzilla href="https://bugzilla.suse.com/807942">SUSE bug 807942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591440" comment="wireshark-1.8.6-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2480</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2480" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2480" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2480" ref_url="https://www.suse.com/security/cve/CVE-2013-2480" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0494-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0506-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00077.html" source="SUSE-SU"/>
    <description>
    The RTPS and RTPS2 dissectors in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 allow remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2480/">CVE-2013-2480</cve>
	<bugzilla href="https://bugzilla.suse.com/807942">SUSE bug 807942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591440" comment="wireshark-1.8.6-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132481" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2481</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2481" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2481" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2481" ref_url="https://www.suse.com/security/cve/CVE-2013-2481" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0494-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0506-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00077.html" source="SUSE-SU"/>
    <description>
    Integer signedness error in the dissect_mount_dirpath_call function in epan/dissectors/packet-mount.c in the Mount dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6, when nfs_file_name_snooping is enabled, allows remote attackers to cause a denial of service (application crash) via a negative length value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2481/">CVE-2013-2481</cve>
	<bugzilla href="https://bugzilla.suse.com/807942">SUSE bug 807942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591440" comment="wireshark-1.8.6-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2482</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2482" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2482" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2482" ref_url="https://www.suse.com/security/cve/CVE-2013-2482" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0494-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0506-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00077.html" source="SUSE-SU"/>
    <description>
    The AMPQ dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2482/">CVE-2013-2482</cve>
	<bugzilla href="https://bugzilla.suse.com/807942">SUSE bug 807942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591440" comment="wireshark-1.8.6-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2483</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2483" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2483" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2483" ref_url="https://www.suse.com/security/cve/CVE-2013-2483" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0494-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0506-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00077.html" source="SUSE-SU"/>
    <description>
    The acn_add_dmp_data function in epan/dissectors/packet-acn.c in the ACN dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via an invalid count value in ACN_DMP_ADT_D_RE DMP data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2483/">CVE-2013-2483</cve>
	<bugzilla href="https://bugzilla.suse.com/807942">SUSE bug 807942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591440" comment="wireshark-1.8.6-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2484</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2484" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2484" ref_url="https://www.suse.com/security/cve/CVE-2013-2484" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0494-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0506-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00077.html" source="SUSE-SU"/>
    <description>
    The CIMD dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2484/">CVE-2013-2484</cve>
	<bugzilla href="https://bugzilla.suse.com/807942">SUSE bug 807942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591440" comment="wireshark-1.8.6-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2485</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2485" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2485" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2485" ref_url="https://www.suse.com/security/cve/CVE-2013-2485" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0494-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0506-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00077.html" source="SUSE-SU"/>
    <description>
    The FCSP dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2485/">CVE-2013-2485</cve>
	<bugzilla href="https://bugzilla.suse.com/807942">SUSE bug 807942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591440" comment="wireshark-1.8.6-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2486</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2486" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2486" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2486" ref_url="https://www.suse.com/security/cve/CVE-2013-2486" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000561.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0494-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0506-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0848-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0911-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0947-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00083.html" source="SUSE-SU"/>
    <description>
    The dissect_diagnosticrequest function in epan/dissectors/packet-reload.c in the REsource LOcation And Discovery (aka RELOAD) dissector in Wireshark 1.8.x before 1.8.6 uses an incorrect integer data type, which allows remote attackers to cause a denial of service (infinite loop) via crafted integer values in a packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2486/">CVE-2013-2486</cve>
	<bugzilla href="https://bugzilla.suse.com/807942">SUSE bug 807942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820566">SUSE bug 820566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820973">SUSE bug 820973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591443" comment="wireshark-1.8.8-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2487</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2487" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2487" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2487" ref_url="https://www.suse.com/security/cve/CVE-2013-2487" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000561.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0494-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0506-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0848-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0911-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0947-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00083.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-reload.c in the REsource LOcation And Discovery (aka RELOAD) dissector in Wireshark 1.8.x before 1.8.6 uses incorrect integer data types, which allows remote attackers to cause a denial of service (infinite loop) via crafted integer values in a packet, related to the (1) dissect_icecandidates, (2) dissect_kinddata, (3) dissect_nodeid_list, (4) dissect_storeans, (5) dissect_storereq, (6) dissect_storeddataspecifier, (7) dissect_fetchreq, (8) dissect_findans, (9) dissect_diagnosticinfo, (10) dissect_diagnosticresponse, (11) dissect_reload_messagecontents, and (12) dissect_reload_message functions, a different vulnerability than CVE-2013-2486.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2487/">CVE-2013-2487</cve>
	<bugzilla href="https://bugzilla.suse.com/807942">SUSE bug 807942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820566">SUSE bug 820566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820973">SUSE bug 820973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591443" comment="wireshark-1.8.8-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2488</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2488" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2488" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2488" ref_url="https://www.suse.com/security/cve/CVE-2013-2488" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0494-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0506-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00077.html" source="SUSE-SU"/>
    <description>
    The DTLS dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 does not validate the fragment offset before invoking the reassembly state machine, which allows remote attackers to cause a denial of service (application crash) via a large offset value that triggers write access to an invalid memory location.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2488/">CVE-2013-2488</cve>
	<bugzilla href="https://bugzilla.suse.com/807942">SUSE bug 807942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591440" comment="wireshark-1.8.6-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2549</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2549" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2549" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2549" ref_url="https://www.suse.com/security/cve/CVE-2013-2549" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0809-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0939-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0990-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00126.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Reader 11.0.02 allows remote attackers to execute arbitrary code via vectors related to a "break into the sandbox," as demonstrated by George Hotz during a Pwn2Own competition at CanSecWest 2013.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2549/">CVE-2013-2549</cve>
	<bugzilla href="https://bugzilla.suse.com/819918">SUSE bug 819918</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591446" comment="acroread-9.5.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591447" comment="acroread-cmaps-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591448" comment="acroread-fonts-ja-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591449" comment="acroread-fonts-ko-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591450" comment="acroread-fonts-zh_CN-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591451" comment="acroread-fonts-zh_TW-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565854" comment="acroread_ja-9.4.2-0.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2550</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2550" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2550" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2550" ref_url="https://www.suse.com/security/cve/CVE-2013-2550" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0809-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0939-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0990-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00126.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Reader 11.0.02 allows attackers to bypass the sandbox protection mechanism via unknown vectors, as demonstrated by George Hotz during a Pwn2Own competition at CanSecWest 2013.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2550/">CVE-2013-2550</cve>
	<bugzilla href="https://bugzilla.suse.com/819918">SUSE bug 819918</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591446" comment="acroread-9.5.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591447" comment="acroread-cmaps-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591448" comment="acroread-fonts-ja-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591449" comment="acroread-fonts-ko-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591450" comment="acroread-fonts-zh_CN-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591451" comment="acroread-fonts-zh_TW-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565854" comment="acroread_ja-9.4.2-0.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2555</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2555" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2555" ref_url="https://www.suse.com/security/cve/CVE-2013-2555" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0670-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0670-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0672-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00019.html" source="SUSE-SU"/>
    <description>
    Integer overflow in Adobe Flash Player before 10.3.183.75 and 11.x before 11.7.700.169 on Windows and Mac OS X, before 10.3.183.75 and 11.x before 11.2.202.280 on Linux, before 11.1.111.50 on Android 2.x and 3.x, and before 11.1.115.54 on Android 4.x; Adobe AIR before 3.7.0.1530; and Adobe AIR SDK &amp; Compiler before 3.7.0.1530 allows remote attackers to execute arbitrary code via unspecified vectors, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2013.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2555/">CVE-2013-2555</cve>
	<bugzilla href="https://bugzilla.suse.com/814635">SUSE bug 814635</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590896" comment="flash-player-11.2.202.280-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590897" comment="flash-player-gnome-11.2.202.280-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590898" comment="flash-player-kde4-11.2.202.280-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2634</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2634" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2634" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2634" ref_url="https://www.suse.com/security/cve/CVE-2013-2634" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0759-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0759-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1187-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1971-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00129.html" source="SUSE-SU"/>
    <description>
    net/dcb/dcbnl.c in the Linux kernel before 3.8.4 does not initialize certain structures, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2634/">CVE-2013-2634</cve>
	<bugzilla href="https://bugzilla.suse.com/810473">SUSE bug 810473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589566" comment="kernel-default-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589567" comment="kernel-default-base-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589568" comment="kernel-default-devel-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589569" comment="kernel-default-extra-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589570" comment="kernel-source-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589571" comment="kernel-syms-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589572" comment="kernel-trace-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589573" comment="kernel-trace-base-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589574" comment="kernel-trace-devel-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589575" comment="kernel-trace-extra-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589576" comment="kernel-xen-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589577" comment="kernel-xen-base-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589578" comment="kernel-xen-devel-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589579" comment="kernel-xen-extra-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589580" comment="xen-kmp-default-4.1.4_02_3.0.74_0.6.6-0.5.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589581" comment="xen-kmp-trace-4.1.4_02_3.0.74_0.6.6-0.5.22 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2635</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2635" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2635" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2635" ref_url="https://www.suse.com/security/cve/CVE-2013-2635" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0759-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0759-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1187-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1971-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00129.html" source="SUSE-SU"/>
    <description>
    The rtnl_fill_ifinfo function in net/core/rtnetlink.c in the Linux kernel before 3.8.4 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2635/">CVE-2013-2635</cve>
	<bugzilla href="https://bugzilla.suse.com/810473">SUSE bug 810473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009589566" comment="kernel-default-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589567" comment="kernel-default-base-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589568" comment="kernel-default-devel-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589569" comment="kernel-default-extra-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589570" comment="kernel-source-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589571" comment="kernel-syms-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589572" comment="kernel-trace-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589573" comment="kernel-trace-base-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589574" comment="kernel-trace-devel-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589575" comment="kernel-trace-extra-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589576" comment="kernel-xen-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589577" comment="kernel-xen-base-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589578" comment="kernel-xen-devel-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589579" comment="kernel-xen-extra-3.0.74-0.6.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589580" comment="xen-kmp-default-4.1.4_02_3.0.74_0.6.6-0.5.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589581" comment="xen-kmp-trace-4.1.4_02_3.0.74_0.6.6-0.5.22 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2718</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2718" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2718" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2718" ref_url="https://www.suse.com/security/cve/CVE-2013-2718" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0809-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0939-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0990-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00126.html" source="SUSE-SU"/>
    <description>
    Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2719, CVE-2013-2720, CVE-2013-2721, CVE-2013-2722, CVE-2013-2723, CVE-2013-2725, CVE-2013-2726, CVE-2013-2731, CVE-2013-2732, CVE-2013-2734, CVE-2013-2735, CVE-2013-2736, CVE-2013-3337, CVE-2013-3338, CVE-2013-3339, CVE-2013-3340, and CVE-2013-3341.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2718/">CVE-2013-2718</cve>
	<bugzilla href="https://bugzilla.suse.com/819918">SUSE bug 819918</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591446" comment="acroread-9.5.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591447" comment="acroread-cmaps-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591448" comment="acroread-fonts-ja-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591449" comment="acroread-fonts-ko-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591450" comment="acroread-fonts-zh_CN-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591451" comment="acroread-fonts-zh_TW-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565854" comment="acroread_ja-9.4.2-0.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2719</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2719" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2719" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2719" ref_url="https://www.suse.com/security/cve/CVE-2013-2719" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0809-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0939-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0990-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00126.html" source="SUSE-SU"/>
    <description>
    Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2718, CVE-2013-2720, CVE-2013-2721, CVE-2013-2722, CVE-2013-2723, CVE-2013-2725, CVE-2013-2726, CVE-2013-2731, CVE-2013-2732, CVE-2013-2734, CVE-2013-2735, CVE-2013-2736, CVE-2013-3337, CVE-2013-3338, CVE-2013-3339, CVE-2013-3340, and CVE-2013-3341.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2719/">CVE-2013-2719</cve>
	<bugzilla href="https://bugzilla.suse.com/819918">SUSE bug 819918</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591446" comment="acroread-9.5.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591447" comment="acroread-cmaps-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591448" comment="acroread-fonts-ja-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591449" comment="acroread-fonts-ko-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591450" comment="acroread-fonts-zh_CN-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591451" comment="acroread-fonts-zh_TW-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565854" comment="acroread_ja-9.4.2-0.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2720</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2720" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2720" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2720" ref_url="https://www.suse.com/security/cve/CVE-2013-2720" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0809-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0939-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0990-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00126.html" source="SUSE-SU"/>
    <description>
    Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2718, CVE-2013-2719, CVE-2013-2721, CVE-2013-2722, CVE-2013-2723, CVE-2013-2725, CVE-2013-2726, CVE-2013-2731, CVE-2013-2732, CVE-2013-2734, CVE-2013-2735, CVE-2013-2736, CVE-2013-3337, CVE-2013-3338, CVE-2013-3339, CVE-2013-3340, and CVE-2013-3341.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2720/">CVE-2013-2720</cve>
	<bugzilla href="https://bugzilla.suse.com/819918">SUSE bug 819918</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591446" comment="acroread-9.5.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591447" comment="acroread-cmaps-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591448" comment="acroread-fonts-ja-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591449" comment="acroread-fonts-ko-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591450" comment="acroread-fonts-zh_CN-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591451" comment="acroread-fonts-zh_TW-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565854" comment="acroread_ja-9.4.2-0.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2721</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2721" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2721" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2721" ref_url="https://www.suse.com/security/cve/CVE-2013-2721" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0809-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0939-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0990-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00126.html" source="SUSE-SU"/>
    <description>
    Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2718, CVE-2013-2719, CVE-2013-2720, CVE-2013-2722, CVE-2013-2723, CVE-2013-2725, CVE-2013-2726, CVE-2013-2731, CVE-2013-2732, CVE-2013-2734, CVE-2013-2735, CVE-2013-2736, CVE-2013-3337, CVE-2013-3338, CVE-2013-3339, CVE-2013-3340, and CVE-2013-3341.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2721/">CVE-2013-2721</cve>
	<bugzilla href="https://bugzilla.suse.com/819918">SUSE bug 819918</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591446" comment="acroread-9.5.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591447" comment="acroread-cmaps-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591448" comment="acroread-fonts-ja-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591449" comment="acroread-fonts-ko-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591450" comment="acroread-fonts-zh_CN-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591451" comment="acroread-fonts-zh_TW-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565854" comment="acroread_ja-9.4.2-0.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2722</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2722" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2722" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2722" ref_url="https://www.suse.com/security/cve/CVE-2013-2722" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0809-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0939-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0990-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00126.html" source="SUSE-SU"/>
    <description>
    Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2718, CVE-2013-2719, CVE-2013-2720, CVE-2013-2721, CVE-2013-2723, CVE-2013-2725, CVE-2013-2726, CVE-2013-2731, CVE-2013-2732, CVE-2013-2734, CVE-2013-2735, CVE-2013-2736, CVE-2013-3337, CVE-2013-3338, CVE-2013-3339, CVE-2013-3340, and CVE-2013-3341.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2722/">CVE-2013-2722</cve>
	<bugzilla href="https://bugzilla.suse.com/819918">SUSE bug 819918</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591446" comment="acroread-9.5.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591447" comment="acroread-cmaps-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591448" comment="acroread-fonts-ja-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591449" comment="acroread-fonts-ko-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591450" comment="acroread-fonts-zh_CN-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591451" comment="acroread-fonts-zh_TW-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565854" comment="acroread_ja-9.4.2-0.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132723" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2723</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2723" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2723" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2723" ref_url="https://www.suse.com/security/cve/CVE-2013-2723" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0809-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0939-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0990-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00126.html" source="SUSE-SU"/>
    <description>
    Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2718, CVE-2013-2719, CVE-2013-2720, CVE-2013-2721, CVE-2013-2722, CVE-2013-2725, CVE-2013-2726, CVE-2013-2731, CVE-2013-2732, CVE-2013-2734, CVE-2013-2735, CVE-2013-2736, CVE-2013-3337, CVE-2013-3338, CVE-2013-3339, CVE-2013-3340, and CVE-2013-3341.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2723/">CVE-2013-2723</cve>
	<bugzilla href="https://bugzilla.suse.com/819918">SUSE bug 819918</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591446" comment="acroread-9.5.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591447" comment="acroread-cmaps-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591448" comment="acroread-fonts-ja-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591449" comment="acroread-fonts-ko-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591450" comment="acroread-fonts-zh_CN-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591451" comment="acroread-fonts-zh_TW-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565854" comment="acroread_ja-9.4.2-0.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132724" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2724</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2724" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2724" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2724" ref_url="https://www.suse.com/security/cve/CVE-2013-2724" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0809-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0939-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0990-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00126.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2724/">CVE-2013-2724</cve>
	<bugzilla href="https://bugzilla.suse.com/819918">SUSE bug 819918</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591446" comment="acroread-9.5.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591447" comment="acroread-cmaps-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591448" comment="acroread-fonts-ja-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591449" comment="acroread-fonts-ko-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591450" comment="acroread-fonts-zh_CN-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591451" comment="acroread-fonts-zh_TW-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565854" comment="acroread_ja-9.4.2-0.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2725</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2725" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2725" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2725" ref_url="https://www.suse.com/security/cve/CVE-2013-2725" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0809-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0939-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0990-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00126.html" source="SUSE-SU"/>
    <description>
    Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2718, CVE-2013-2719, CVE-2013-2720, CVE-2013-2721, CVE-2013-2722, CVE-2013-2723, CVE-2013-2726, CVE-2013-2731, CVE-2013-2732, CVE-2013-2734, CVE-2013-2735, CVE-2013-2736, CVE-2013-3337, CVE-2013-3338, CVE-2013-3339, CVE-2013-3340, and CVE-2013-3341.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2725/">CVE-2013-2725</cve>
	<bugzilla href="https://bugzilla.suse.com/819918">SUSE bug 819918</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591446" comment="acroread-9.5.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591447" comment="acroread-cmaps-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591448" comment="acroread-fonts-ja-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591449" comment="acroread-fonts-ko-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591450" comment="acroread-fonts-zh_CN-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591451" comment="acroread-fonts-zh_TW-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565854" comment="acroread_ja-9.4.2-0.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2726</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2726" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2726" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2726" ref_url="https://www.suse.com/security/cve/CVE-2013-2726" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0809-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0939-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0990-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00126.html" source="SUSE-SU"/>
    <description>
    Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2718, CVE-2013-2719, CVE-2013-2720, CVE-2013-2721, CVE-2013-2722, CVE-2013-2723, CVE-2013-2725, CVE-2013-2731, CVE-2013-2732, CVE-2013-2734, CVE-2013-2735, CVE-2013-2736, CVE-2013-3337, CVE-2013-3338, CVE-2013-3339, CVE-2013-3340, and CVE-2013-3341.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2726/">CVE-2013-2726</cve>
	<bugzilla href="https://bugzilla.suse.com/819918">SUSE bug 819918</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591446" comment="acroread-9.5.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591447" comment="acroread-cmaps-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591448" comment="acroread-fonts-ja-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591449" comment="acroread-fonts-ko-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591450" comment="acroread-fonts-zh_CN-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591451" comment="acroread-fonts-zh_TW-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565854" comment="acroread_ja-9.4.2-0.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2727</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2727" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2727" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2727" ref_url="https://www.suse.com/security/cve/CVE-2013-2727" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0809-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0939-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0990-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00126.html" source="SUSE-SU"/>
    <description>
    Integer overflow in Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-2729.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2727/">CVE-2013-2727</cve>
	<bugzilla href="https://bugzilla.suse.com/819918">SUSE bug 819918</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591446" comment="acroread-9.5.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591447" comment="acroread-cmaps-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591448" comment="acroread-fonts-ja-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591449" comment="acroread-fonts-ko-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591450" comment="acroread-fonts-zh_CN-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591451" comment="acroread-fonts-zh_TW-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565854" comment="acroread_ja-9.4.2-0.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2728</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2728" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2728" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2728" ref_url="https://www.suse.com/security/cve/CVE-2013-2728" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0798-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0797-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0892-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0954-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00010.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.86 and 11.x before 11.7.700.202 on Windows and Mac OS X, before 10.3.183.86 and 11.x before 11.2.202.285 on Linux, before 11.1.111.54 on Android 2.x and 3.x, and before 11.1.115.58 on Android 4.x; Adobe AIR before 3.7.0.1860; and Adobe AIR SDK &amp; Compiler before 3.7.0.1860 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-3324, CVE-2013-3325, CVE-2013-3326, CVE-2013-3327, CVE-2013-3328, CVE-2013-3329, CVE-2013-3330, CVE-2013-3331, CVE-2013-3332, CVE-2013-3333, CVE-2013-3334, and CVE-2013-3335.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2728/">CVE-2013-2728</cve>
	<bugzilla href="https://bugzilla.suse.com/819916">SUSE bug 819916</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591452" comment="flash-player-11.2.202.285-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591453" comment="flash-player-gnome-11.2.202.285-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591454" comment="flash-player-kde4-11.2.202.285-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2729</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2729" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2729" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2729" ref_url="https://www.suse.com/security/cve/CVE-2013-2729" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0809-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0939-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0990-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00126.html" source="SUSE-SU"/>
    <description>
    Integer overflow in Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-2727.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2729/">CVE-2013-2729</cve>
	<bugzilla href="https://bugzilla.suse.com/819918">SUSE bug 819918</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591446" comment="acroread-9.5.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591447" comment="acroread-cmaps-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591448" comment="acroread-fonts-ja-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591449" comment="acroread-fonts-ko-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591450" comment="acroread-fonts-zh_CN-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591451" comment="acroread-fonts-zh_TW-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565854" comment="acroread_ja-9.4.2-0.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2730</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2730" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2730" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2730" ref_url="https://www.suse.com/security/cve/CVE-2013-2730" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0809-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0939-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0990-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00126.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-2733.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2730/">CVE-2013-2730</cve>
	<bugzilla href="https://bugzilla.suse.com/819918">SUSE bug 819918</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591446" comment="acroread-9.5.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591447" comment="acroread-cmaps-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591448" comment="acroread-fonts-ja-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591449" comment="acroread-fonts-ko-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591450" comment="acroread-fonts-zh_CN-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591451" comment="acroread-fonts-zh_TW-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565854" comment="acroread_ja-9.4.2-0.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2731</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2731" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2731" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2731" ref_url="https://www.suse.com/security/cve/CVE-2013-2731" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0809-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0939-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0990-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00126.html" source="SUSE-SU"/>
    <description>
    Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2718, CVE-2013-2719, CVE-2013-2720, CVE-2013-2721, CVE-2013-2722, CVE-2013-2723, CVE-2013-2725, CVE-2013-2726, CVE-2013-2732, CVE-2013-2734, CVE-2013-2735, CVE-2013-2736, CVE-2013-3337, CVE-2013-3338, CVE-2013-3339, CVE-2013-3340, and CVE-2013-3341.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2731/">CVE-2013-2731</cve>
	<bugzilla href="https://bugzilla.suse.com/819918">SUSE bug 819918</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591446" comment="acroread-9.5.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591447" comment="acroread-cmaps-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591448" comment="acroread-fonts-ja-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591449" comment="acroread-fonts-ko-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591450" comment="acroread-fonts-zh_CN-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591451" comment="acroread-fonts-zh_TW-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565854" comment="acroread_ja-9.4.2-0.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2732</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2732" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2732" ref_url="https://www.suse.com/security/cve/CVE-2013-2732" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0809-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0939-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0990-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00126.html" source="SUSE-SU"/>
    <description>
    Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2718, CVE-2013-2719, CVE-2013-2720, CVE-2013-2721, CVE-2013-2722, CVE-2013-2723, CVE-2013-2725, CVE-2013-2726, CVE-2013-2731, CVE-2013-2734, CVE-2013-2735, CVE-2013-2736, CVE-2013-3337, CVE-2013-3338, CVE-2013-3339, CVE-2013-3340, and CVE-2013-3341.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2732/">CVE-2013-2732</cve>
	<bugzilla href="https://bugzilla.suse.com/819918">SUSE bug 819918</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591446" comment="acroread-9.5.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591447" comment="acroread-cmaps-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591448" comment="acroread-fonts-ja-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591449" comment="acroread-fonts-ko-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591450" comment="acroread-fonts-zh_CN-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591451" comment="acroread-fonts-zh_TW-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565854" comment="acroread_ja-9.4.2-0.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2733</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2733" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2733" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2733" ref_url="https://www.suse.com/security/cve/CVE-2013-2733" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0809-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0939-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0990-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00126.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-2730.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2733/">CVE-2013-2733</cve>
	<bugzilla href="https://bugzilla.suse.com/819918">SUSE bug 819918</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591446" comment="acroread-9.5.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591447" comment="acroread-cmaps-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591448" comment="acroread-fonts-ja-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591449" comment="acroread-fonts-ko-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591450" comment="acroread-fonts-zh_CN-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591451" comment="acroread-fonts-zh_TW-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565854" comment="acroread_ja-9.4.2-0.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132734" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2734</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2734" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2734" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2734" ref_url="https://www.suse.com/security/cve/CVE-2013-2734" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0809-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0939-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0990-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00126.html" source="SUSE-SU"/>
    <description>
    Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2718, CVE-2013-2719, CVE-2013-2720, CVE-2013-2721, CVE-2013-2722, CVE-2013-2723, CVE-2013-2725, CVE-2013-2726, CVE-2013-2731, CVE-2013-2732, CVE-2013-2735, CVE-2013-2736, CVE-2013-3337, CVE-2013-3338, CVE-2013-3339, CVE-2013-3340, and CVE-2013-3341.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2734/">CVE-2013-2734</cve>
	<bugzilla href="https://bugzilla.suse.com/819918">SUSE bug 819918</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591446" comment="acroread-9.5.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591447" comment="acroread-cmaps-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591448" comment="acroread-fonts-ja-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591449" comment="acroread-fonts-ko-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591450" comment="acroread-fonts-zh_CN-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591451" comment="acroread-fonts-zh_TW-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565854" comment="acroread_ja-9.4.2-0.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2735</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2735" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2735" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2735" ref_url="https://www.suse.com/security/cve/CVE-2013-2735" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0809-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0939-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0990-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00126.html" source="SUSE-SU"/>
    <description>
    Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2718, CVE-2013-2719, CVE-2013-2720, CVE-2013-2721, CVE-2013-2722, CVE-2013-2723, CVE-2013-2725, CVE-2013-2726, CVE-2013-2731, CVE-2013-2732, CVE-2013-2734, CVE-2013-2736, CVE-2013-3337, CVE-2013-3338, CVE-2013-3339, CVE-2013-3340, and CVE-2013-3341.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2735/">CVE-2013-2735</cve>
	<bugzilla href="https://bugzilla.suse.com/819918">SUSE bug 819918</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591446" comment="acroread-9.5.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591447" comment="acroread-cmaps-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591448" comment="acroread-fonts-ja-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591449" comment="acroread-fonts-ko-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591450" comment="acroread-fonts-zh_CN-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591451" comment="acroread-fonts-zh_TW-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565854" comment="acroread_ja-9.4.2-0.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2736</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2736" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2736" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2736" ref_url="https://www.suse.com/security/cve/CVE-2013-2736" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0809-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0939-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0990-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00126.html" source="SUSE-SU"/>
    <description>
    Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2718, CVE-2013-2719, CVE-2013-2720, CVE-2013-2721, CVE-2013-2722, CVE-2013-2723, CVE-2013-2725, CVE-2013-2726, CVE-2013-2731, CVE-2013-2732, CVE-2013-2734, CVE-2013-2735, CVE-2013-3337, CVE-2013-3338, CVE-2013-3339, CVE-2013-3340, and CVE-2013-3341.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2736/">CVE-2013-2736</cve>
	<bugzilla href="https://bugzilla.suse.com/819918">SUSE bug 819918</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591446" comment="acroread-9.5.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591447" comment="acroread-cmaps-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591448" comment="acroread-fonts-ja-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591449" comment="acroread-fonts-ko-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591450" comment="acroread-fonts-zh_CN-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591451" comment="acroread-fonts-zh_TW-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565854" comment="acroread_ja-9.4.2-0.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2737</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2737" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2737" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2737" ref_url="https://www.suse.com/security/cve/CVE-2013-2737" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0809-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0939-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0990-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00126.html" source="SUSE-SU"/>
    <description>
    A JavaScript API in Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 allows attackers to obtain sensitive information via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2737/">CVE-2013-2737</cve>
	<bugzilla href="https://bugzilla.suse.com/819918">SUSE bug 819918</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591446" comment="acroread-9.5.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591447" comment="acroread-cmaps-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591448" comment="acroread-fonts-ja-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591449" comment="acroread-fonts-ko-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591450" comment="acroread-fonts-zh_CN-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591451" comment="acroread-fonts-zh_TW-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565854" comment="acroread_ja-9.4.2-0.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2776</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2776" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2776" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2776" ref_url="https://www.suse.com/security/cve/CVE-2013-2776" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000614.html" source="SUSE-SU"/>
    <description>
    sudo 1.3.5 through 1.7.10p5 and 1.8.0 through 1.8.6p6, when running on systems without /proc or the sysctl function with the tty_tickets option enabled, does not properly validate the controlling terminal device, which allows local users with sudo permissions to hijack the authorization of another terminal via vectors related to connecting to the standard input, output, and error file descriptors of another terminal.  NOTE: this is one of three closely-related vulnerabilities that were originally assigned CVE-2013-1776, but they have been SPLIT because of different affected versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2776/">CVE-2013-2776</cve>
	<bugzilla href="https://bugzilla.suse.com/806921">SUSE bug 806921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817349">SUSE bug 817349</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566188" comment="sudo-1.7.6p2-0.2.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2777</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2777" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2777" ref_url="https://www.suse.com/security/cve/CVE-2013-2777" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000614.html" source="SUSE-SU"/>
    <description>
    sudo before 1.7.10p5 and 1.8.x before 1.8.6p6, when the tty_tickets option is enabled, does not properly validate the controlling terminal device, which allows local users with sudo permissions to hijack the authorization of another terminal via vectors related to a session without a controlling terminal device and connecting to the standard input, output, and error file descriptors of another terminal.  NOTE: this is one of three closely-related vulnerabilities that were originally assigned CVE-2013-1776, but they have been SPLIT because of different affected versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2777/">CVE-2013-2777</cve>
	<bugzilla href="https://bugzilla.suse.com/806921">SUSE bug 806921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817349">SUSE bug 817349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817350">SUSE bug 817350</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566188" comment="sudo-1.7.6p2-0.2.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2850</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2850" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2850" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2850" ref_url="https://www.suse.com/security/cve/CVE-2013-2850" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0845-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000608.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1045-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00169.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1619-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00063.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the iscsi_add_notunderstood_response function in drivers/target/iscsi/iscsi_target_parameters.c in the iSCSI target subsystem in the Linux kernel through 3.9.4 allows remote attackers to cause a denial of service (memory corruption and OOPS) or possibly execute arbitrary code via a long key that is not properly handled during construction of an error-response packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-2850/">CVE-2013-2850</cve>
	<bugzilla href="https://bugzilla.suse.com/821560">SUSE bug 821560</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591455" comment="kernel-default-3.0.74-0.6.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591456" comment="kernel-default-base-3.0.74-0.6.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591457" comment="kernel-default-devel-3.0.74-0.6.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591458" comment="kernel-default-extra-3.0.74-0.6.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591459" comment="kernel-source-3.0.74-0.6.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591460" comment="kernel-syms-3.0.74-0.6.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591461" comment="kernel-trace-3.0.74-0.6.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591462" comment="kernel-trace-base-3.0.74-0.6.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591463" comment="kernel-trace-devel-3.0.74-0.6.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591464" comment="kernel-trace-extra-3.0.74-0.6.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591465" comment="kernel-xen-3.0.74-0.6.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591466" comment="kernel-xen-base-3.0.74-0.6.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591467" comment="kernel-xen-devel-3.0.74-0.6.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591468" comment="kernel-xen-extra-3.0.74-0.6.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591469" comment="xen-kmp-default-4.1.4_02_3.0.74_0.6.10-0.5.32 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591470" comment="xen-kmp-trace-4.1.4_02_3.0.74_0.6.10-0.5.32 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2851</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2851" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2851" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2851" ref_url="https://www.suse.com/security/cve/CVE-2013-2851" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1474-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1619-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1773-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00106.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1971-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00129.html" source="SUSE-SU"/>
    <description>
    Format string vulnerability in the register_disk function in block/genhd.c in the Linux kernel through 3.9.4 allows local users to gain privileges by leveraging root access and writing format string specifiers to /sys/module/md_mod/parameters/new_array in order to create a crafted /dev/md device name.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2851/">CVE-2013-2851</cve>
	<bugzilla href="https://bugzilla.suse.com/822575">SUSE bug 822575</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590816" comment="kernel-default-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590817" comment="kernel-default-base-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590818" comment="kernel-default-devel-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590819" comment="kernel-default-extra-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590820" comment="kernel-source-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590821" comment="kernel-syms-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590822" comment="kernel-trace-devel-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590823" comment="kernel-xen-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590824" comment="kernel-xen-base-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590825" comment="kernel-xen-devel-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590826" comment="kernel-xen-extra-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590827" comment="xen-kmp-default-4.2.2_06_3.0.93_0.8-0.7.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590800" comment="kernel-default-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590801" comment="kernel-default-base-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590802" comment="kernel-default-devel-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590803" comment="kernel-default-extra-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590804" comment="kernel-source-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590805" comment="kernel-syms-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590806" comment="kernel-trace-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590807" comment="kernel-trace-base-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590808" comment="kernel-trace-devel-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590809" comment="kernel-trace-extra-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590810" comment="kernel-xen-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590811" comment="kernel-xen-base-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590812" comment="kernel-xen-devel-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590813" comment="kernel-xen-extra-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590814" comment="xen-kmp-default-4.1.5_02_3.0.93_0.5-0.5.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590815" comment="xen-kmp-trace-4.1.5_02_3.0.93_0.5-0.5.39 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2852</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2852" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2852" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2852" ref_url="https://www.suse.com/security/cve/CVE-2013-2852" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1971-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00129.html" source="SUSE-SU"/>
    <description>
    Format string vulnerability in the b43_request_firmware function in drivers/net/wireless/b43/main.c in the Broadcom B43 wireless driver in the Linux kernel through 3.9.4 allows local users to gain privileges by leveraging root access and including format string specifiers in an fwpostfix modprobe parameter, leading to improper construction of an error message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2852/">CVE-2013-2852</cve>
	<bugzilla href="https://bugzilla.suse.com/822579">SUSE bug 822579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590816" comment="kernel-default-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590817" comment="kernel-default-base-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590818" comment="kernel-default-devel-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590819" comment="kernel-default-extra-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590820" comment="kernel-source-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590821" comment="kernel-syms-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590822" comment="kernel-trace-devel-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590823" comment="kernel-xen-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590824" comment="kernel-xen-base-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590825" comment="kernel-xen-devel-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590826" comment="kernel-xen-extra-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590827" comment="xen-kmp-default-4.2.2_06_3.0.93_0.8-0.7.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132877" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2877</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2877" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2877" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2877" ref_url="https://www.suse.com/security/cve/CVE-2013-2877" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1627-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000699.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1221-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1246-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00077.html" source="SUSE-SU"/>
    <description>
    parser.c in libxml2 before 2.9.0, as used in Google Chrome before 28.0.1500.71 and other products, allows remote attackers to cause a denial of service (out-of-bounds read) via a document that ends abruptly, related to the lack of certain checks for the XML_PARSER_EOF state.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2877/">CVE-2013-2877</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828893">SUSE bug 828893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829077">SUSE bug 829077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854869">SUSE bug 854869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877506">SUSE bug 877506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566143" comment="libxml2-2.7.6-0.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566144" comment="libxml2-32bit-2.7.6-0.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566145" comment="libxml2-python-2.7.6-0.25.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132889" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2889</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2889" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2889" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2889" ref_url="https://www.suse.com/security/cve/CVE-2013-2889" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00019.html" source="SUSE-SU"/>
    <description>
    drivers/hid/hid-zpff.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_ZEROPLUS is enabled, allows physically proximate attackers to cause a denial of service (heap-based out-of-bounds write) via a crafted device.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2889/">CVE-2013-2889</cve>
	<bugzilla href="https://bugzilla.suse.com/835839">SUSE bug 835839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590044" comment="kernel-bigsmp-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590045" comment="kernel-default-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590046" comment="kernel-default-base-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590047" comment="kernel-default-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590048" comment="kernel-default-extra-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590049" comment="kernel-pae-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590050" comment="kernel-pae-base-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590051" comment="kernel-pae-devel-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590052" comment="kernel-pae-extra-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590053" comment="kernel-source-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590054" comment="kernel-syms-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590055" comment="kernel-trace-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590056" comment="kernel-xen-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590057" comment="kernel-xen-base-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590058" comment="kernel-xen-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590059" comment="kernel-xen-extra-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590060" comment="xen-kmp-default-4.2.5_02_3.0.101_0.46-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590061" comment="xen-kmp-pae-4.2.5_02_3.0.101_0.42-0.7.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2893</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2893" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2893" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2893" ref_url="https://www.suse.com/security/cve/CVE-2013-2893" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    The Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_LOGITECH_FF, CONFIG_LOGIG940_FF, or CONFIG_LOGIWHEELS_FF is enabled, allows physically proximate attackers to cause a denial of service (heap-based out-of-bounds write) via a crafted device, related to (1) drivers/hid/hid-lgff.c, (2) drivers/hid/hid-lg3ff.c, and (3) drivers/hid/hid-lg4ff.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2893/">CVE-2013-2893</cve>
	<bugzilla href="https://bugzilla.suse.com/835839">SUSE bug 835839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590044" comment="kernel-bigsmp-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590045" comment="kernel-default-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590046" comment="kernel-default-base-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590047" comment="kernel-default-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590048" comment="kernel-default-extra-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590049" comment="kernel-pae-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590050" comment="kernel-pae-base-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590051" comment="kernel-pae-devel-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590052" comment="kernel-pae-extra-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590053" comment="kernel-source-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590054" comment="kernel-syms-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590055" comment="kernel-trace-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590056" comment="kernel-xen-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590057" comment="kernel-xen-base-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590058" comment="kernel-xen-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590059" comment="kernel-xen-extra-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590060" comment="xen-kmp-default-4.2.5_02_3.0.101_0.46-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590061" comment="xen-kmp-pae-4.2.5_02_3.0.101_0.42-0.7.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2897</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2897" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2897" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2897" ref_url="https://www.suse.com/security/cve/CVE-2013-2897" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    Multiple array index errors in drivers/hid/hid-multitouch.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_MULTITOUCH is enabled, allow physically proximate attackers to cause a denial of service (heap memory corruption, or NULL pointer dereference and OOPS) via a crafted device.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2897/">CVE-2013-2897</cve>
	<bugzilla href="https://bugzilla.suse.com/835839">SUSE bug 835839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590044" comment="kernel-bigsmp-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590045" comment="kernel-default-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590046" comment="kernel-default-base-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590047" comment="kernel-default-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590048" comment="kernel-default-extra-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590049" comment="kernel-pae-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590050" comment="kernel-pae-base-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590051" comment="kernel-pae-devel-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590052" comment="kernel-pae-extra-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590053" comment="kernel-source-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590054" comment="kernel-syms-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590055" comment="kernel-trace-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590056" comment="kernel-xen-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590057" comment="kernel-xen-base-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590058" comment="kernel-xen-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590059" comment="kernel-xen-extra-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590060" comment="xen-kmp-default-4.2.5_02_3.0.101_0.46-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590061" comment="xen-kmp-pae-4.2.5_02_3.0.101_0.42-0.7.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2899</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2899" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2899" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2899" ref_url="https://www.suse.com/security/cve/CVE-2013-2899" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    drivers/hid/hid-picolcd_core.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_PICOLCD is enabled, allows physically proximate attackers to cause a denial of service (NULL pointer dereference and OOPS) via a crafted device.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2899/">CVE-2013-2899</cve>
	<bugzilla href="https://bugzilla.suse.com/835839">SUSE bug 835839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590044" comment="kernel-bigsmp-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590045" comment="kernel-default-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590046" comment="kernel-default-base-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590047" comment="kernel-default-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590048" comment="kernel-default-extra-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590049" comment="kernel-pae-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590050" comment="kernel-pae-base-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590051" comment="kernel-pae-devel-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590052" comment="kernel-pae-extra-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590053" comment="kernel-source-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590054" comment="kernel-syms-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590055" comment="kernel-trace-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590056" comment="kernel-xen-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590057" comment="kernel-xen-base-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590058" comment="kernel-xen-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590059" comment="kernel-xen-extra-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590060" comment="xen-kmp-default-4.2.5_02_3.0.101_0.46-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590061" comment="xen-kmp-pae-4.2.5_02_3.0.101_0.42-0.7.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2929</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2929" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2929" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2929" ref_url="https://www.suse.com/security/cve/CVE-2013-2929" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    The Linux kernel before 3.12.2 does not properly use the get_dumpable function, which allows local users to bypass intended ptrace restrictions or obtain sensitive information from IA64 scratch registers via a crafted application, related to kernel/ptrace.c and arch/ia64/include/asm/processor.h.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2929/">CVE-2013-2929</cve>
	<bugzilla href="https://bugzilla.suse.com/824295">SUSE bug 824295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/847652">SUSE bug 847652</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589697" comment="kernel-default-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589698" comment="kernel-default-base-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589699" comment="kernel-default-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589700" comment="kernel-default-extra-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589701" comment="kernel-source-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589702" comment="kernel-syms-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589703" comment="kernel-trace-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589704" comment="kernel-xen-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589705" comment="kernel-xen-base-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589706" comment="kernel-xen-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589707" comment="kernel-xen-extra-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589708" comment="xen-kmp-default-4.2.4_02_3.0.101_0.35-0.7.45 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2930</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2930" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2930" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2930" ref_url="https://www.suse.com/security/cve/CVE-2013-2930" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000716.html" source="SUSE-SU"/>
    <description>
    The perf_trace_event_perm function in kernel/trace/trace_event_perf.c in the Linux kernel before 3.12.2 does not properly restrict access to the perf subsystem, which allows local users to enable function tracing via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2930/">CVE-2013-2930</cve>
	<bugzilla href="https://bugzilla.suse.com/849362">SUSE bug 849362</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591274" comment="kernel-default-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591275" comment="kernel-default-base-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591276" comment="kernel-default-devel-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591277" comment="kernel-default-extra-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591278" comment="kernel-source-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591279" comment="kernel-syms-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591280" comment="kernel-trace-devel-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591281" comment="kernel-xen-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591282" comment="kernel-xen-base-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591283" comment="kernel-xen-devel-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591284" comment="kernel-xen-extra-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591285" comment="xen-kmp-default-4.2.3_08_3.0.101_0.15-0.7.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2944</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2944" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2944" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2944" ref_url="https://www.suse.com/security/cve/CVE-2013-2944" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1237-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1237-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-August/000564.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0774-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0775-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0873-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0985-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00121.html" source="SUSE-SU"/>
    <description>
    strongSwan 4.3.5 through 5.0.3, when using the OpenSSL plugin for ECDSA signature verification, allows remote attackers to authenticate as other users via an invalid signature.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2944/">CVE-2013-2944</cve>
	<bugzilla href="https://bugzilla.suse.com/815236">SUSE bug 815236</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591505" comment="strongswan-4.4.0-6.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591506" comment="strongswan-doc-4.4.0-6.17.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591507" comment="strongswan-4.4.0-6.17.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591508" comment="strongswan-doc-4.4.0-6.17.5 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3076</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3076" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3076" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3076" ref_url="https://www.suse.com/security/cve/CVE-2013-3076" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1022-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1022-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1182-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00017.html" source="SUSE-SU"/>
    <description>
    The crypto API in the Linux kernel through 3.9-rc8 does not initialize certain length variables, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call, related to the hash_recvmsg function in crypto/algif_hash.c and the skcipher_recvmsg function in crypto/algif_skcipher.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-3076/">CVE-2013-3076</cve>
	<bugzilla href="https://bugzilla.suse.com/816668">SUSE bug 816668</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590523" comment="kernel-default-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590524" comment="kernel-default-base-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590525" comment="kernel-default-devel-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590526" comment="kernel-default-extra-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590527" comment="kernel-source-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590528" comment="kernel-syms-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590529" comment="kernel-trace-devel-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590530" comment="kernel-xen-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590531" comment="kernel-xen-base-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590532" comment="kernel-xen-devel-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590533" comment="kernel-xen-extra-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590534" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590535" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590507" comment="kernel-default-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590508" comment="kernel-default-base-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590509" comment="kernel-default-devel-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590510" comment="kernel-default-extra-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590511" comment="kernel-source-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590512" comment="kernel-syms-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590513" comment="kernel-trace-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590514" comment="kernel-trace-base-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590515" comment="kernel-trace-devel-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590516" comment="kernel-trace-extra-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590517" comment="kernel-xen-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590518" comment="kernel-xen-base-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590519" comment="kernel-xen-devel-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590520" comment="kernel-xen-extra-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590521" comment="xen-kmp-default-4.1.5_02_3.0.80_0.5-0.5.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590522" comment="xen-kmp-trace-4.1.5_02_3.0.80_0.5-0.5.5 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3222</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3222" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3222" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3222" ref_url="https://www.suse.com/security/cve/CVE-2013-3222" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1022-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1022-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1182-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1971-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00129.html" source="SUSE-SU"/>
    <description>
    The vcc_recvmsg function in net/atm/common.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-3222/">CVE-2013-3222</cve>
	<bugzilla href="https://bugzilla.suse.com/816668">SUSE bug 816668</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590523" comment="kernel-default-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590524" comment="kernel-default-base-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590525" comment="kernel-default-devel-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590526" comment="kernel-default-extra-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590527" comment="kernel-source-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590528" comment="kernel-syms-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590529" comment="kernel-trace-devel-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590530" comment="kernel-xen-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590531" comment="kernel-xen-base-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590532" comment="kernel-xen-devel-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590533" comment="kernel-xen-extra-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590534" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590535" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590507" comment="kernel-default-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590508" comment="kernel-default-base-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590509" comment="kernel-default-devel-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590510" comment="kernel-default-extra-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590511" comment="kernel-source-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590512" comment="kernel-syms-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590513" comment="kernel-trace-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590514" comment="kernel-trace-base-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590515" comment="kernel-trace-devel-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590516" comment="kernel-trace-extra-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590517" comment="kernel-xen-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590518" comment="kernel-xen-base-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590519" comment="kernel-xen-devel-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590520" comment="kernel-xen-extra-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590521" comment="xen-kmp-default-4.1.5_02_3.0.80_0.5-0.5.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590522" comment="xen-kmp-trace-4.1.5_02_3.0.80_0.5-0.5.5 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3223</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3223" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3223" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3223" ref_url="https://www.suse.com/security/cve/CVE-2013-3223" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1022-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1022-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1182-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1971-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00129.html" source="SUSE-SU"/>
    <description>
    The ax25_recvmsg function in net/ax25/af_ax25.c in the Linux kernel before 3.9-rc7 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-3223/">CVE-2013-3223</cve>
	<bugzilla href="https://bugzilla.suse.com/816668">SUSE bug 816668</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590523" comment="kernel-default-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590524" comment="kernel-default-base-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590525" comment="kernel-default-devel-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590526" comment="kernel-default-extra-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590527" comment="kernel-source-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590528" comment="kernel-syms-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590529" comment="kernel-trace-devel-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590530" comment="kernel-xen-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590531" comment="kernel-xen-base-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590532" comment="kernel-xen-devel-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590533" comment="kernel-xen-extra-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590534" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590535" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590507" comment="kernel-default-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590508" comment="kernel-default-base-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590509" comment="kernel-default-devel-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590510" comment="kernel-default-extra-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590511" comment="kernel-source-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590512" comment="kernel-syms-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590513" comment="kernel-trace-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590514" comment="kernel-trace-base-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590515" comment="kernel-trace-devel-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590516" comment="kernel-trace-extra-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590517" comment="kernel-xen-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590518" comment="kernel-xen-base-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590519" comment="kernel-xen-devel-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590520" comment="kernel-xen-extra-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590521" comment="xen-kmp-default-4.1.5_02_3.0.80_0.5-0.5.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590522" comment="xen-kmp-trace-4.1.5_02_3.0.80_0.5-0.5.5 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3224</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3224" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3224" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3224" ref_url="https://www.suse.com/security/cve/CVE-2013-3224" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1022-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1022-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1182-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1971-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00129.html" source="SUSE-SU"/>
    <description>
    The bt_sock_recvmsg function in net/bluetooth/af_bluetooth.c in the Linux kernel before 3.9-rc7 does not properly initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-3224/">CVE-2013-3224</cve>
	<bugzilla href="https://bugzilla.suse.com/816668">SUSE bug 816668</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590523" comment="kernel-default-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590524" comment="kernel-default-base-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590525" comment="kernel-default-devel-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590526" comment="kernel-default-extra-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590527" comment="kernel-source-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590528" comment="kernel-syms-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590529" comment="kernel-trace-devel-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590530" comment="kernel-xen-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590531" comment="kernel-xen-base-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590532" comment="kernel-xen-devel-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590533" comment="kernel-xen-extra-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590534" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590535" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590507" comment="kernel-default-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590508" comment="kernel-default-base-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590509" comment="kernel-default-devel-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590510" comment="kernel-default-extra-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590511" comment="kernel-source-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590512" comment="kernel-syms-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590513" comment="kernel-trace-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590514" comment="kernel-trace-base-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590515" comment="kernel-trace-devel-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590516" comment="kernel-trace-extra-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590517" comment="kernel-xen-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590518" comment="kernel-xen-base-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590519" comment="kernel-xen-devel-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590520" comment="kernel-xen-extra-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590521" comment="xen-kmp-default-4.1.5_02_3.0.80_0.5-0.5.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590522" comment="xen-kmp-trace-4.1.5_02_3.0.80_0.5-0.5.5 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3225</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3225" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3225" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3225" ref_url="https://www.suse.com/security/cve/CVE-2013-3225" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1022-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1022-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1182-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
    <description>
    The rfcomm_sock_recvmsg function in net/bluetooth/rfcomm/sock.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-3225/">CVE-2013-3225</cve>
	<bugzilla href="https://bugzilla.suse.com/816668">SUSE bug 816668</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590523" comment="kernel-default-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590524" comment="kernel-default-base-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590525" comment="kernel-default-devel-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590526" comment="kernel-default-extra-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590527" comment="kernel-source-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590528" comment="kernel-syms-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590529" comment="kernel-trace-devel-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590530" comment="kernel-xen-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590531" comment="kernel-xen-base-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590532" comment="kernel-xen-devel-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590533" comment="kernel-xen-extra-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590534" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590535" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590507" comment="kernel-default-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590508" comment="kernel-default-base-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590509" comment="kernel-default-devel-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590510" comment="kernel-default-extra-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590511" comment="kernel-source-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590512" comment="kernel-syms-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590513" comment="kernel-trace-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590514" comment="kernel-trace-base-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590515" comment="kernel-trace-devel-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590516" comment="kernel-trace-extra-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590517" comment="kernel-xen-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590518" comment="kernel-xen-base-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590519" comment="kernel-xen-devel-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590520" comment="kernel-xen-extra-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590521" comment="xen-kmp-default-4.1.5_02_3.0.80_0.5-0.5.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590522" comment="xen-kmp-trace-4.1.5_02_3.0.80_0.5-0.5.5 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133227" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3227</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3227" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3227" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3227" ref_url="https://www.suse.com/security/cve/CVE-2013-3227" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1022-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1022-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1182-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1971-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00129.html" source="SUSE-SU"/>
    <description>
    The caif_seqpkt_recvmsg function in net/caif/caif_socket.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-3227/">CVE-2013-3227</cve>
	<bugzilla href="https://bugzilla.suse.com/816668">SUSE bug 816668</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590523" comment="kernel-default-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590524" comment="kernel-default-base-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590525" comment="kernel-default-devel-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590526" comment="kernel-default-extra-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590527" comment="kernel-source-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590528" comment="kernel-syms-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590529" comment="kernel-trace-devel-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590530" comment="kernel-xen-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590531" comment="kernel-xen-base-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590532" comment="kernel-xen-devel-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590533" comment="kernel-xen-extra-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590534" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590535" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590507" comment="kernel-default-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590508" comment="kernel-default-base-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590509" comment="kernel-default-devel-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590510" comment="kernel-default-extra-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590511" comment="kernel-source-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590512" comment="kernel-syms-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590513" comment="kernel-trace-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590514" comment="kernel-trace-base-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590515" comment="kernel-trace-devel-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590516" comment="kernel-trace-extra-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590517" comment="kernel-xen-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590518" comment="kernel-xen-base-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590519" comment="kernel-xen-devel-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590520" comment="kernel-xen-extra-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590521" comment="xen-kmp-default-4.1.5_02_3.0.80_0.5-0.5.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590522" comment="xen-kmp-trace-4.1.5_02_3.0.80_0.5-0.5.5 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133228" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3228</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3228" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3228" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3228" ref_url="https://www.suse.com/security/cve/CVE-2013-3228" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1022-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1022-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1182-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1971-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00129.html" source="SUSE-SU"/>
    <description>
    The irda_recvmsg_dgram function in net/irda/af_irda.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-3228/">CVE-2013-3228</cve>
	<bugzilla href="https://bugzilla.suse.com/816668">SUSE bug 816668</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590523" comment="kernel-default-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590524" comment="kernel-default-base-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590525" comment="kernel-default-devel-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590526" comment="kernel-default-extra-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590527" comment="kernel-source-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590528" comment="kernel-syms-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590529" comment="kernel-trace-devel-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590530" comment="kernel-xen-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590531" comment="kernel-xen-base-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590532" comment="kernel-xen-devel-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590533" comment="kernel-xen-extra-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590534" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590535" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590507" comment="kernel-default-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590508" comment="kernel-default-base-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590509" comment="kernel-default-devel-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590510" comment="kernel-default-extra-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590511" comment="kernel-source-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590512" comment="kernel-syms-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590513" comment="kernel-trace-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590514" comment="kernel-trace-base-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590515" comment="kernel-trace-devel-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590516" comment="kernel-trace-extra-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590517" comment="kernel-xen-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590518" comment="kernel-xen-base-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590519" comment="kernel-xen-devel-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590520" comment="kernel-xen-extra-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590521" comment="xen-kmp-default-4.1.5_02_3.0.80_0.5-0.5.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590522" comment="xen-kmp-trace-4.1.5_02_3.0.80_0.5-0.5.5 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3229</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3229" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3229" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3229" ref_url="https://www.suse.com/security/cve/CVE-2013-3229" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1022-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1022-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1182-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1971-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00129.html" source="SUSE-SU"/>
    <description>
    The iucv_sock_recvmsg function in net/iucv/af_iucv.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-3229/">CVE-2013-3229</cve>
	<bugzilla href="https://bugzilla.suse.com/816668">SUSE bug 816668</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590523" comment="kernel-default-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590524" comment="kernel-default-base-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590525" comment="kernel-default-devel-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590526" comment="kernel-default-extra-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590527" comment="kernel-source-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590528" comment="kernel-syms-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590529" comment="kernel-trace-devel-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590530" comment="kernel-xen-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590531" comment="kernel-xen-base-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590532" comment="kernel-xen-devel-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590533" comment="kernel-xen-extra-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590534" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590535" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590507" comment="kernel-default-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590508" comment="kernel-default-base-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590509" comment="kernel-default-devel-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590510" comment="kernel-default-extra-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590511" comment="kernel-source-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590512" comment="kernel-syms-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590513" comment="kernel-trace-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590514" comment="kernel-trace-base-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590515" comment="kernel-trace-devel-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590516" comment="kernel-trace-extra-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590517" comment="kernel-xen-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590518" comment="kernel-xen-base-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590519" comment="kernel-xen-devel-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590520" comment="kernel-xen-extra-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590521" comment="xen-kmp-default-4.1.5_02_3.0.80_0.5-0.5.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590522" comment="xen-kmp-trace-4.1.5_02_3.0.80_0.5-0.5.5 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3231</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3231" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3231" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3231" ref_url="https://www.suse.com/security/cve/CVE-2013-3231" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1022-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1022-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1182-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1971-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00129.html" source="SUSE-SU"/>
    <description>
    The llc_ui_recvmsg function in net/llc/af_llc.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-3231/">CVE-2013-3231</cve>
	<bugzilla href="https://bugzilla.suse.com/816668">SUSE bug 816668</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590523" comment="kernel-default-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590524" comment="kernel-default-base-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590525" comment="kernel-default-devel-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590526" comment="kernel-default-extra-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590527" comment="kernel-source-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590528" comment="kernel-syms-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590529" comment="kernel-trace-devel-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590530" comment="kernel-xen-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590531" comment="kernel-xen-base-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590532" comment="kernel-xen-devel-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590533" comment="kernel-xen-extra-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590534" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590535" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590507" comment="kernel-default-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590508" comment="kernel-default-base-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590509" comment="kernel-default-devel-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590510" comment="kernel-default-extra-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590511" comment="kernel-source-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590512" comment="kernel-syms-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590513" comment="kernel-trace-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590514" comment="kernel-trace-base-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590515" comment="kernel-trace-devel-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590516" comment="kernel-trace-extra-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590517" comment="kernel-xen-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590518" comment="kernel-xen-base-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590519" comment="kernel-xen-devel-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590520" comment="kernel-xen-extra-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590521" comment="xen-kmp-default-4.1.5_02_3.0.80_0.5-0.5.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590522" comment="xen-kmp-trace-4.1.5_02_3.0.80_0.5-0.5.5 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3232</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3232" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3232" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3232" ref_url="https://www.suse.com/security/cve/CVE-2013-3232" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1022-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1022-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1182-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1971-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00129.html" source="SUSE-SU"/>
    <description>
    The nr_recvmsg function in net/netrom/af_netrom.c in the Linux kernel before 3.9-rc7 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-3232/">CVE-2013-3232</cve>
	<bugzilla href="https://bugzilla.suse.com/816668">SUSE bug 816668</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590523" comment="kernel-default-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590524" comment="kernel-default-base-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590525" comment="kernel-default-devel-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590526" comment="kernel-default-extra-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590527" comment="kernel-source-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590528" comment="kernel-syms-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590529" comment="kernel-trace-devel-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590530" comment="kernel-xen-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590531" comment="kernel-xen-base-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590532" comment="kernel-xen-devel-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590533" comment="kernel-xen-extra-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590534" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590535" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590507" comment="kernel-default-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590508" comment="kernel-default-base-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590509" comment="kernel-default-devel-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590510" comment="kernel-default-extra-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590511" comment="kernel-source-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590512" comment="kernel-syms-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590513" comment="kernel-trace-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590514" comment="kernel-trace-base-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590515" comment="kernel-trace-devel-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590516" comment="kernel-trace-extra-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590517" comment="kernel-xen-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590518" comment="kernel-xen-base-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590519" comment="kernel-xen-devel-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590520" comment="kernel-xen-extra-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590521" comment="xen-kmp-default-4.1.5_02_3.0.80_0.5-0.5.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590522" comment="xen-kmp-trace-4.1.5_02_3.0.80_0.5-0.5.5 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3234</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3234" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3234" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3234" ref_url="https://www.suse.com/security/cve/CVE-2013-3234" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1022-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1022-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1182-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1971-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00129.html" source="SUSE-SU"/>
    <description>
    The rose_recvmsg function in net/rose/af_rose.c in the Linux kernel before 3.9-rc7 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-3234/">CVE-2013-3234</cve>
	<bugzilla href="https://bugzilla.suse.com/816668">SUSE bug 816668</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590523" comment="kernel-default-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590524" comment="kernel-default-base-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590525" comment="kernel-default-devel-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590526" comment="kernel-default-extra-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590527" comment="kernel-source-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590528" comment="kernel-syms-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590529" comment="kernel-trace-devel-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590530" comment="kernel-xen-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590531" comment="kernel-xen-base-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590532" comment="kernel-xen-devel-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590533" comment="kernel-xen-extra-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590534" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590535" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590507" comment="kernel-default-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590508" comment="kernel-default-base-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590509" comment="kernel-default-devel-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590510" comment="kernel-default-extra-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590511" comment="kernel-source-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590512" comment="kernel-syms-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590513" comment="kernel-trace-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590514" comment="kernel-trace-base-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590515" comment="kernel-trace-devel-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590516" comment="kernel-trace-extra-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590517" comment="kernel-xen-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590518" comment="kernel-xen-base-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590519" comment="kernel-xen-devel-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590520" comment="kernel-xen-extra-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590521" comment="xen-kmp-default-4.1.5_02_3.0.80_0.5-0.5.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590522" comment="xen-kmp-trace-4.1.5_02_3.0.80_0.5-0.5.5 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3235</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3235" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3235" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3235" ref_url="https://www.suse.com/security/cve/CVE-2013-3235" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1022-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1022-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1182-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1971-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00129.html" source="SUSE-SU"/>
    <description>
    net/tipc/socket.c in the Linux kernel before 3.9-rc7 does not initialize a certain data structure and a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-3235/">CVE-2013-3235</cve>
	<bugzilla href="https://bugzilla.suse.com/816668">SUSE bug 816668</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590523" comment="kernel-default-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590524" comment="kernel-default-base-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590525" comment="kernel-default-devel-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590526" comment="kernel-default-extra-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590527" comment="kernel-source-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590528" comment="kernel-syms-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590529" comment="kernel-trace-devel-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590530" comment="kernel-xen-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590531" comment="kernel-xen-base-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590532" comment="kernel-xen-devel-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590533" comment="kernel-xen-extra-3.0.82-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590534" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590535" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590507" comment="kernel-default-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590508" comment="kernel-default-base-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590509" comment="kernel-default-devel-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590510" comment="kernel-default-extra-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590511" comment="kernel-source-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590512" comment="kernel-syms-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590513" comment="kernel-trace-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590514" comment="kernel-trace-base-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590515" comment="kernel-trace-devel-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590516" comment="kernel-trace-extra-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590517" comment="kernel-xen-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590518" comment="kernel-xen-base-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590519" comment="kernel-xen-devel-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590520" comment="kernel-xen-extra-3.0.80-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590521" comment="xen-kmp-default-4.1.5_02_3.0.80_0.5-0.5.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590522" comment="xen-kmp-trace-4.1.5_02_3.0.80_0.5-0.5.5 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3301</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3301" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3301" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3301" ref_url="https://www.suse.com/security/cve/CVE-2013-3301" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000608.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1971-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00129.html" source="SUSE-SU"/>
    <description>
    The ftrace implementation in the Linux kernel before 3.8.8 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by leveraging the CAP_SYS_ADMIN capability for write access to the (1) set_ftrace_pid or (2) set_graph_function file, and then making an lseek system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3301/">CVE-2013-3301</cve>
	<bugzilla href="https://bugzilla.suse.com/815256">SUSE bug 815256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590816" comment="kernel-default-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590817" comment="kernel-default-base-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590818" comment="kernel-default-devel-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590819" comment="kernel-default-extra-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590820" comment="kernel-source-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590821" comment="kernel-syms-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590822" comment="kernel-trace-devel-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590823" comment="kernel-xen-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590824" comment="kernel-xen-base-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590825" comment="kernel-xen-devel-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590826" comment="kernel-xen-extra-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590827" comment="xen-kmp-default-4.2.2_06_3.0.93_0.8-0.7.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133324" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3324</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3324" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3324" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3324" ref_url="https://www.suse.com/security/cve/CVE-2013-3324" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0798-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0797-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0892-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0954-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00010.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.86 and 11.x before 11.7.700.202 on Windows and Mac OS X, before 10.3.183.86 and 11.x before 11.2.202.285 on Linux, before 11.1.111.54 on Android 2.x and 3.x, and before 11.1.115.58 on Android 4.x; Adobe AIR before 3.7.0.1860; and Adobe AIR SDK &amp; Compiler before 3.7.0.1860 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2728, CVE-2013-3325, CVE-2013-3326, CVE-2013-3327, CVE-2013-3328, CVE-2013-3329, CVE-2013-3330, CVE-2013-3331, CVE-2013-3332, CVE-2013-3333, CVE-2013-3334, and CVE-2013-3335.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3324/">CVE-2013-3324</cve>
	<bugzilla href="https://bugzilla.suse.com/819916">SUSE bug 819916</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591452" comment="flash-player-11.2.202.285-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591453" comment="flash-player-gnome-11.2.202.285-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591454" comment="flash-player-kde4-11.2.202.285-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133325" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3325</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3325" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3325" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3325" ref_url="https://www.suse.com/security/cve/CVE-2013-3325" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0798-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0797-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0892-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0954-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00010.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.86 and 11.x before 11.7.700.202 on Windows and Mac OS X, before 10.3.183.86 and 11.x before 11.2.202.285 on Linux, before 11.1.111.54 on Android 2.x and 3.x, and before 11.1.115.58 on Android 4.x; Adobe AIR before 3.7.0.1860; and Adobe AIR SDK &amp; Compiler before 3.7.0.1860 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2728, CVE-2013-3324, CVE-2013-3326, CVE-2013-3327, CVE-2013-3328, CVE-2013-3329, CVE-2013-3330, CVE-2013-3331, CVE-2013-3332, CVE-2013-3333, CVE-2013-3334, and CVE-2013-3335.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3325/">CVE-2013-3325</cve>
	<bugzilla href="https://bugzilla.suse.com/819916">SUSE bug 819916</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591452" comment="flash-player-11.2.202.285-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591453" comment="flash-player-gnome-11.2.202.285-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591454" comment="flash-player-kde4-11.2.202.285-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133326" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3326</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3326" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3326" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3326" ref_url="https://www.suse.com/security/cve/CVE-2013-3326" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0798-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0797-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0892-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0954-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00010.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.86 and 11.x before 11.7.700.202 on Windows and Mac OS X, before 10.3.183.86 and 11.x before 11.2.202.285 on Linux, before 11.1.111.54 on Android 2.x and 3.x, and before 11.1.115.58 on Android 4.x; Adobe AIR before 3.7.0.1860; and Adobe AIR SDK &amp; Compiler before 3.7.0.1860 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2728, CVE-2013-3324, CVE-2013-3325, CVE-2013-3327, CVE-2013-3328, CVE-2013-3329, CVE-2013-3330, CVE-2013-3331, CVE-2013-3332, CVE-2013-3333, CVE-2013-3334, and CVE-2013-3335.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3326/">CVE-2013-3326</cve>
	<bugzilla href="https://bugzilla.suse.com/819916">SUSE bug 819916</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591452" comment="flash-player-11.2.202.285-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591453" comment="flash-player-gnome-11.2.202.285-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591454" comment="flash-player-kde4-11.2.202.285-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3327</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3327" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3327" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3327" ref_url="https://www.suse.com/security/cve/CVE-2013-3327" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0798-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0797-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0892-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0954-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00010.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.86 and 11.x before 11.7.700.202 on Windows and Mac OS X, before 10.3.183.86 and 11.x before 11.2.202.285 on Linux, before 11.1.111.54 on Android 2.x and 3.x, and before 11.1.115.58 on Android 4.x; Adobe AIR before 3.7.0.1860; and Adobe AIR SDK &amp; Compiler before 3.7.0.1860 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2728, CVE-2013-3324, CVE-2013-3325, CVE-2013-3326, CVE-2013-3328, CVE-2013-3329, CVE-2013-3330, CVE-2013-3331, CVE-2013-3332, CVE-2013-3333, CVE-2013-3334, and CVE-2013-3335.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3327/">CVE-2013-3327</cve>
	<bugzilla href="https://bugzilla.suse.com/819916">SUSE bug 819916</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591452" comment="flash-player-11.2.202.285-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591453" comment="flash-player-gnome-11.2.202.285-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591454" comment="flash-player-kde4-11.2.202.285-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133328" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3328</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3328" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3328" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3328" ref_url="https://www.suse.com/security/cve/CVE-2013-3328" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0798-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0797-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0892-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0954-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00010.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.86 and 11.x before 11.7.700.202 on Windows and Mac OS X, before 10.3.183.86 and 11.x before 11.2.202.285 on Linux, before 11.1.111.54 on Android 2.x and 3.x, and before 11.1.115.58 on Android 4.x; Adobe AIR before 3.7.0.1860; and Adobe AIR SDK &amp; Compiler before 3.7.0.1860 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2728, CVE-2013-3324, CVE-2013-3325, CVE-2013-3326, CVE-2013-3327, CVE-2013-3329, CVE-2013-3330, CVE-2013-3331, CVE-2013-3332, CVE-2013-3333, CVE-2013-3334, and CVE-2013-3335.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3328/">CVE-2013-3328</cve>
	<bugzilla href="https://bugzilla.suse.com/819916">SUSE bug 819916</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591452" comment="flash-player-11.2.202.285-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591453" comment="flash-player-gnome-11.2.202.285-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591454" comment="flash-player-kde4-11.2.202.285-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133329" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3329</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3329" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3329" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3329" ref_url="https://www.suse.com/security/cve/CVE-2013-3329" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0798-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0797-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0892-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0954-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00010.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.86 and 11.x before 11.7.700.202 on Windows and Mac OS X, before 10.3.183.86 and 11.x before 11.2.202.285 on Linux, before 11.1.111.54 on Android 2.x and 3.x, and before 11.1.115.58 on Android 4.x; Adobe AIR before 3.7.0.1860; and Adobe AIR SDK &amp; Compiler before 3.7.0.1860 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2728, CVE-2013-3324, CVE-2013-3325, CVE-2013-3326, CVE-2013-3327, CVE-2013-3328, CVE-2013-3330, CVE-2013-3331, CVE-2013-3332, CVE-2013-3333, CVE-2013-3334, and CVE-2013-3335.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3329/">CVE-2013-3329</cve>
	<bugzilla href="https://bugzilla.suse.com/819916">SUSE bug 819916</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591452" comment="flash-player-11.2.202.285-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591453" comment="flash-player-gnome-11.2.202.285-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591454" comment="flash-player-kde4-11.2.202.285-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133330" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3330</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3330" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3330" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3330" ref_url="https://www.suse.com/security/cve/CVE-2013-3330" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0798-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0797-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0892-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0954-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00010.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.86 and 11.x before 11.7.700.202 on Windows and Mac OS X, before 10.3.183.86 and 11.x before 11.2.202.285 on Linux, before 11.1.111.54 on Android 2.x and 3.x, and before 11.1.115.58 on Android 4.x; Adobe AIR before 3.7.0.1860; and Adobe AIR SDK &amp; Compiler before 3.7.0.1860 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2728, CVE-2013-3324, CVE-2013-3325, CVE-2013-3326, CVE-2013-3327, CVE-2013-3328, CVE-2013-3329, CVE-2013-3331, CVE-2013-3332, CVE-2013-3333, CVE-2013-3334, and CVE-2013-3335.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3330/">CVE-2013-3330</cve>
	<bugzilla href="https://bugzilla.suse.com/819916">SUSE bug 819916</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591452" comment="flash-player-11.2.202.285-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591453" comment="flash-player-gnome-11.2.202.285-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591454" comment="flash-player-kde4-11.2.202.285-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133331" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3331</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3331" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3331" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3331" ref_url="https://www.suse.com/security/cve/CVE-2013-3331" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0798-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0797-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0892-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0954-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00010.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.86 and 11.x before 11.7.700.202 on Windows and Mac OS X, before 10.3.183.86 and 11.x before 11.2.202.285 on Linux, before 11.1.111.54 on Android 2.x and 3.x, and before 11.1.115.58 on Android 4.x; Adobe AIR before 3.7.0.1860; and Adobe AIR SDK &amp; Compiler before 3.7.0.1860 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2728, CVE-2013-3324, CVE-2013-3325, CVE-2013-3326, CVE-2013-3327, CVE-2013-3328, CVE-2013-3329, CVE-2013-3330, CVE-2013-3332, CVE-2013-3333, CVE-2013-3334, and CVE-2013-3335.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3331/">CVE-2013-3331</cve>
	<bugzilla href="https://bugzilla.suse.com/819916">SUSE bug 819916</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591452" comment="flash-player-11.2.202.285-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591453" comment="flash-player-gnome-11.2.202.285-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591454" comment="flash-player-kde4-11.2.202.285-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133332" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3332</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3332" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3332" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3332" ref_url="https://www.suse.com/security/cve/CVE-2013-3332" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0798-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0797-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0892-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0954-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00010.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.86 and 11.x before 11.7.700.202 on Windows and Mac OS X, before 10.3.183.86 and 11.x before 11.2.202.285 on Linux, before 11.1.111.54 on Android 2.x and 3.x, and before 11.1.115.58 on Android 4.x; Adobe AIR before 3.7.0.1860; and Adobe AIR SDK &amp; Compiler before 3.7.0.1860 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2728, CVE-2013-3324, CVE-2013-3325, CVE-2013-3326, CVE-2013-3327, CVE-2013-3328, CVE-2013-3329, CVE-2013-3330, CVE-2013-3331, CVE-2013-3333, CVE-2013-3334, and CVE-2013-3335.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3332/">CVE-2013-3332</cve>
	<bugzilla href="https://bugzilla.suse.com/819916">SUSE bug 819916</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591452" comment="flash-player-11.2.202.285-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591453" comment="flash-player-gnome-11.2.202.285-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591454" comment="flash-player-kde4-11.2.202.285-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133333" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3333</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3333" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3333" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3333" ref_url="https://www.suse.com/security/cve/CVE-2013-3333" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0798-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0797-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0892-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0954-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00010.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.86 and 11.x before 11.7.700.202 on Windows and Mac OS X, before 10.3.183.86 and 11.x before 11.2.202.285 on Linux, before 11.1.111.54 on Android 2.x and 3.x, and before 11.1.115.58 on Android 4.x; Adobe AIR before 3.7.0.1860; and Adobe AIR SDK &amp; Compiler before 3.7.0.1860 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2728, CVE-2013-3324, CVE-2013-3325, CVE-2013-3326, CVE-2013-3327, CVE-2013-3328, CVE-2013-3329, CVE-2013-3330, CVE-2013-3331, CVE-2013-3332, CVE-2013-3334, and CVE-2013-3335.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3333/">CVE-2013-3333</cve>
	<bugzilla href="https://bugzilla.suse.com/819916">SUSE bug 819916</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591452" comment="flash-player-11.2.202.285-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591453" comment="flash-player-gnome-11.2.202.285-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591454" comment="flash-player-kde4-11.2.202.285-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133334" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3334</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3334" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3334" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3334" ref_url="https://www.suse.com/security/cve/CVE-2013-3334" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0798-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0797-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0892-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0954-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00010.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.86 and 11.x before 11.7.700.202 on Windows and Mac OS X, before 10.3.183.86 and 11.x before 11.2.202.285 on Linux, before 11.1.111.54 on Android 2.x and 3.x, and before 11.1.115.58 on Android 4.x; Adobe AIR before 3.7.0.1860; and Adobe AIR SDK &amp; Compiler before 3.7.0.1860 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2728, CVE-2013-3324, CVE-2013-3325, CVE-2013-3326, CVE-2013-3327, CVE-2013-3328, CVE-2013-3329, CVE-2013-3330, CVE-2013-3331, CVE-2013-3332, CVE-2013-3333, and CVE-2013-3335.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3334/">CVE-2013-3334</cve>
	<bugzilla href="https://bugzilla.suse.com/819916">SUSE bug 819916</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591452" comment="flash-player-11.2.202.285-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591453" comment="flash-player-gnome-11.2.202.285-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591454" comment="flash-player-kde4-11.2.202.285-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133335" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3335</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3335" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3335" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3335" ref_url="https://www.suse.com/security/cve/CVE-2013-3335" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0798-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0797-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0892-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0954-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00010.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.86 and 11.x before 11.7.700.202 on Windows and Mac OS X, before 10.3.183.86 and 11.x before 11.2.202.285 on Linux, before 11.1.111.54 on Android 2.x and 3.x, and before 11.1.115.58 on Android 4.x; Adobe AIR before 3.7.0.1860; and Adobe AIR SDK &amp; Compiler before 3.7.0.1860 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2728, CVE-2013-3324, CVE-2013-3325, CVE-2013-3326, CVE-2013-3327, CVE-2013-3328, CVE-2013-3329, CVE-2013-3330, CVE-2013-3331, CVE-2013-3332, CVE-2013-3333, and CVE-2013-3334.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3335/">CVE-2013-3335</cve>
	<bugzilla href="https://bugzilla.suse.com/819916">SUSE bug 819916</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591452" comment="flash-player-11.2.202.285-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591453" comment="flash-player-gnome-11.2.202.285-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591454" comment="flash-player-kde4-11.2.202.285-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3337</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3337" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3337" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3337" ref_url="https://www.suse.com/security/cve/CVE-2013-3337" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0809-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0939-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0990-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00126.html" source="SUSE-SU"/>
    <description>
    Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2718, CVE-2013-2719, CVE-2013-2720, CVE-2013-2721, CVE-2013-2722, CVE-2013-2723, CVE-2013-2725, CVE-2013-2726, CVE-2013-2731, CVE-2013-2732, CVE-2013-2734, CVE-2013-2735, CVE-2013-2736, CVE-2013-3338, CVE-2013-3339, CVE-2013-3340, and CVE-2013-3341.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3337/">CVE-2013-3337</cve>
	<bugzilla href="https://bugzilla.suse.com/819918">SUSE bug 819918</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591446" comment="acroread-9.5.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591447" comment="acroread-cmaps-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591448" comment="acroread-fonts-ja-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591449" comment="acroread-fonts-ko-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591450" comment="acroread-fonts-zh_CN-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591451" comment="acroread-fonts-zh_TW-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565854" comment="acroread_ja-9.4.2-0.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133338" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3338</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3338" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3338" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3338" ref_url="https://www.suse.com/security/cve/CVE-2013-3338" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0809-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0939-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0990-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00126.html" source="SUSE-SU"/>
    <description>
    Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2718, CVE-2013-2719, CVE-2013-2720, CVE-2013-2721, CVE-2013-2722, CVE-2013-2723, CVE-2013-2725, CVE-2013-2726, CVE-2013-2731, CVE-2013-2732, CVE-2013-2734, CVE-2013-2735, CVE-2013-2736, CVE-2013-3337, CVE-2013-3339, CVE-2013-3340, and CVE-2013-3341.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3338/">CVE-2013-3338</cve>
	<bugzilla href="https://bugzilla.suse.com/819918">SUSE bug 819918</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591446" comment="acroread-9.5.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591447" comment="acroread-cmaps-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591448" comment="acroread-fonts-ja-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591449" comment="acroread-fonts-ko-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591450" comment="acroread-fonts-zh_CN-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591451" comment="acroread-fonts-zh_TW-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565854" comment="acroread_ja-9.4.2-0.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3339</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3339" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3339" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3339" ref_url="https://www.suse.com/security/cve/CVE-2013-3339" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0809-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0939-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0990-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00126.html" source="SUSE-SU"/>
    <description>
    Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2718, CVE-2013-2719, CVE-2013-2720, CVE-2013-2721, CVE-2013-2722, CVE-2013-2723, CVE-2013-2725, CVE-2013-2726, CVE-2013-2731, CVE-2013-2732, CVE-2013-2734, CVE-2013-2735, CVE-2013-2736, CVE-2013-3337, CVE-2013-3338, CVE-2013-3340, and CVE-2013-3341.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3339/">CVE-2013-3339</cve>
	<bugzilla href="https://bugzilla.suse.com/819918">SUSE bug 819918</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591446" comment="acroread-9.5.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591447" comment="acroread-cmaps-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591448" comment="acroread-fonts-ja-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591449" comment="acroread-fonts-ko-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591450" comment="acroread-fonts-zh_CN-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591451" comment="acroread-fonts-zh_TW-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565854" comment="acroread_ja-9.4.2-0.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3340</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3340" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3340" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3340" ref_url="https://www.suse.com/security/cve/CVE-2013-3340" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0809-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0939-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0990-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00126.html" source="SUSE-SU"/>
    <description>
    Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2718, CVE-2013-2719, CVE-2013-2720, CVE-2013-2721, CVE-2013-2722, CVE-2013-2723, CVE-2013-2725, CVE-2013-2726, CVE-2013-2731, CVE-2013-2732, CVE-2013-2734, CVE-2013-2735, CVE-2013-2736, CVE-2013-3337, CVE-2013-3338, CVE-2013-3339, and CVE-2013-3341.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3340/">CVE-2013-3340</cve>
	<bugzilla href="https://bugzilla.suse.com/819918">SUSE bug 819918</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591446" comment="acroread-9.5.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591447" comment="acroread-cmaps-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591448" comment="acroread-fonts-ja-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591449" comment="acroread-fonts-ko-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591450" comment="acroread-fonts-zh_CN-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591451" comment="acroread-fonts-zh_TW-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565854" comment="acroread_ja-9.4.2-0.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3341</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3341" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3341" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3341" ref_url="https://www.suse.com/security/cve/CVE-2013-3341" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0809-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0939-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0990-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00126.html" source="SUSE-SU"/>
    <description>
    Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2718, CVE-2013-2719, CVE-2013-2720, CVE-2013-2721, CVE-2013-2722, CVE-2013-2723, CVE-2013-2725, CVE-2013-2726, CVE-2013-2731, CVE-2013-2732, CVE-2013-2734, CVE-2013-2735, CVE-2013-2736, CVE-2013-3337, CVE-2013-3338, CVE-2013-3339, and CVE-2013-3340.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3341/">CVE-2013-3341</cve>
	<bugzilla href="https://bugzilla.suse.com/819918">SUSE bug 819918</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591446" comment="acroread-9.5.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591447" comment="acroread-cmaps-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591448" comment="acroread-fonts-ja-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591449" comment="acroread-fonts-ko-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591450" comment="acroread-fonts-zh_CN-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591451" comment="acroread-fonts-zh_TW-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565854" comment="acroread_ja-9.4.2-0.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3342</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3342" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3342" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3342" ref_url="https://www.suse.com/security/cve/CVE-2013-3342" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0809-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0939-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0990-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00126.html" source="SUSE-SU"/>
    <description>
    Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 do not properly handle operating-system domain blacklists, which has unspecified impact and attack vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3342/">CVE-2013-3342</cve>
	<bugzilla href="https://bugzilla.suse.com/819918">SUSE bug 819918</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591446" comment="acroread-9.5.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591447" comment="acroread-cmaps-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591448" comment="acroread-fonts-ja-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591449" comment="acroread-fonts-ko-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591450" comment="acroread-fonts-zh_CN-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591451" comment="acroread-fonts-zh_TW-9.4.6-0.4.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565854" comment="acroread_ja-9.4.2-0.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133343" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3343</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3343" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3343" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3343" ref_url="https://www.suse.com/security/cve/CVE-2013-3343" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1039-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1039-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1040-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00164.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1063-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00179.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 10.3.183.90 and 11.x before 11.7.700.224 on Windows, before 10.3.183.90 and 11.x before 11.7.700.225 on Mac OS X, before 10.3.183.90 and 11.x before 11.2.202.291 on Linux, before 11.1.111.59 on Android 2.x and 3.x, and before 11.1.115.63 on Android 4.x; Adobe AIR before 3.7.0.2090 on Windows and Android and before 3.7.0.2100 on Mac OS X; and Adobe AIR SDK &amp; Compiler before 3.7.0.2090 on Windows and before 3.7.0.2100 on Mac OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3343/">CVE-2013-3343</cve>
	<bugzilla href="https://bugzilla.suse.com/824512">SUSE bug 824512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591513" comment="flash-player-11.2.202.291-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591514" comment="flash-player-gnome-11.2.202.291-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591515" comment="flash-player-kde4-11.2.202.291-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133344" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3344</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3344" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3344" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3344" ref_url="https://www.suse.com/security/cve/CVE-2013-3344" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1191-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00021.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Adobe Flash Player before 11.7.700.232 and 11.8.x before 11.8.800.94 on Windows and Mac OS X, before 11.2.202.297 on Linux, before 11.1.111.64 on Android 2.x and 3.x, and before 11.1.115.69 on Android 4.x allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3344/">CVE-2013-3344</cve>
	<bugzilla href="https://bugzilla.suse.com/828810">SUSE bug 828810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591516" comment="flash-player-11.2.202.297-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591517" comment="flash-player-gnome-11.2.202.297-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591518" comment="flash-player-kde4-11.2.202.297-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3345</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3345" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3345" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3345" ref_url="https://www.suse.com/security/cve/CVE-2013-3345" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1191-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00021.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 11.7.700.232 and 11.8.x before 11.8.800.94 on Windows and Mac OS X, before 11.2.202.297 on Linux, before 11.1.111.64 on Android 2.x and 3.x, and before 11.1.115.69 on Android 4.x allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3345/">CVE-2013-3345</cve>
	<bugzilla href="https://bugzilla.suse.com/828810">SUSE bug 828810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591516" comment="flash-player-11.2.202.297-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591517" comment="flash-player-gnome-11.2.202.297-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591518" comment="flash-player-kde4-11.2.202.297-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133347" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3347</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3347" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3347" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3347" ref_url="https://www.suse.com/security/cve/CVE-2013-3347" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1191-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00021.html" source="SUSE-SU"/>
    <description>
    Integer overflow in Adobe Flash Player before 11.7.700.232 and 11.8.x before 11.8.800.94 on Windows and Mac OS X, before 11.2.202.297 on Linux, before 11.1.111.64 on Android 2.x and 3.x, and before 11.1.115.69 on Android 4.x allows attackers to execute arbitrary code via PCM data that is not properly handled during resampling.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3347/">CVE-2013-3347</cve>
	<bugzilla href="https://bugzilla.suse.com/828810">SUSE bug 828810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591516" comment="flash-player-11.2.202.297-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591517" comment="flash-player-gnome-11.2.202.297-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591518" comment="flash-player-kde4-11.2.202.297-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133361" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3361</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3361" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3361" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3361" ref_url="https://www.suse.com/security/cve/CVE-2013-3361" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1456-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1459-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00040.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 11.7.700.242 and 11.8.x before 11.8.800.168 on Windows and Mac OS X, before 11.2.202.310 on Linux, before 11.1.111.73 on Android 2.x and 3.x, and before 11.1.115.81 on Android 4.x; Adobe AIR before 3.8.0.1430; and Adobe AIR SDK &amp; Compiler before 3.8.0.1430 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-3362, CVE-2013-3363, and CVE-2013-5324.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3361/">CVE-2013-3361</cve>
	<bugzilla href="https://bugzilla.suse.com/839897">SUSE bug 839897</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591519" comment="flash-player-11.2.202.310-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591520" comment="flash-player-gnome-11.2.202.310-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591521" comment="flash-player-kde4-11.2.202.310-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3362</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3362" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3362" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3362" ref_url="https://www.suse.com/security/cve/CVE-2013-3362" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1456-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1459-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00040.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 11.7.700.242 and 11.8.x before 11.8.800.168 on Windows and Mac OS X, before 11.2.202.310 on Linux, before 11.1.111.73 on Android 2.x and 3.x, and before 11.1.115.81 on Android 4.x; Adobe AIR before 3.8.0.1430; and Adobe AIR SDK &amp; Compiler before 3.8.0.1430 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-3361, CVE-2013-3363, and CVE-2013-5324.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3362/">CVE-2013-3362</cve>
	<bugzilla href="https://bugzilla.suse.com/839897">SUSE bug 839897</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591519" comment="flash-player-11.2.202.310-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591520" comment="flash-player-gnome-11.2.202.310-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591521" comment="flash-player-kde4-11.2.202.310-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133363" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3363</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3363" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3363" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3363" ref_url="https://www.suse.com/security/cve/CVE-2013-3363" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1456-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1459-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00040.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 11.7.700.242 and 11.8.x before 11.8.800.168 on Windows and Mac OS X, before 11.2.202.310 on Linux, before 11.1.111.73 on Android 2.x and 3.x, and before 11.1.115.81 on Android 4.x; Adobe AIR before 3.8.0.1430; and Adobe AIR SDK &amp; Compiler before 3.8.0.1430 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-3361, CVE-2013-3362, and CVE-2013-5324.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3363/">CVE-2013-3363</cve>
	<bugzilla href="https://bugzilla.suse.com/839897">SUSE bug 839897</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591519" comment="flash-player-11.2.202.310-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591520" comment="flash-player-gnome-11.2.202.310-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591521" comment="flash-player-kde4-11.2.202.310-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3555</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3555" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3555" ref_url="https://www.suse.com/security/cve/CVE-2013-3555" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000561.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1084-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1086-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-gtpv2.c in the GTPv2 dissector in Wireshark 1.8.x before 1.8.7 calls incorrect functions in certain contexts related to ciphers, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3555/">CVE-2013-3555</cve>
	<bugzilla href="https://bugzilla.suse.com/820566">SUSE bug 820566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820973">SUSE bug 820973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591443" comment="wireshark-1.8.8-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3556</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3556" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3556" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3556" ref_url="https://www.suse.com/security/cve/CVE-2013-3556" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000561.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1084-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1086-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" source="SUSE-SU"/>
    <description>
    The fragment_add_seq_common function in epan/reassemble.c in the ASN.1 BER dissector in Wireshark before r48943 has an incorrect pointer dereference during a comparison, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3556/">CVE-2013-3556</cve>
	<bugzilla href="https://bugzilla.suse.com/820566">SUSE bug 820566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820973">SUSE bug 820973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591443" comment="wireshark-1.8.8-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3557</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3557" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3557" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3557" ref_url="https://www.suse.com/security/cve/CVE-2013-3557" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000561.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1084-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1086-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" source="SUSE-SU"/>
    <description>
    The dissect_ber_choice function in epan/dissectors/packet-ber.c in the ASN.1 BER dissector in Wireshark 1.6.x before 1.6.15 and 1.8.x before 1.8.7 does not properly initialize a certain variable, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3557/">CVE-2013-3557</cve>
	<bugzilla href="https://bugzilla.suse.com/820566">SUSE bug 820566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820973">SUSE bug 820973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591443" comment="wireshark-1.8.8-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3558</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3558" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3558" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3558" ref_url="https://www.suse.com/security/cve/CVE-2013-3558" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000561.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1084-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1086-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" source="SUSE-SU"/>
    <description>
    The dissect_ccp_bsdcomp_opt function in epan/dissectors/packet-ppp.c in the PPP CCP dissector in Wireshark 1.8.x before 1.8.7 does not terminate a bit-field list, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3558/">CVE-2013-3558</cve>
	<bugzilla href="https://bugzilla.suse.com/820566">SUSE bug 820566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820973">SUSE bug 820973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591443" comment="wireshark-1.8.8-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3559</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3559" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3559" ref_url="https://www.suse.com/security/cve/CVE-2013-3559" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000561.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1084-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1086-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector in Wireshark 1.8.x before 1.8.7 uses incorrect integer data types, which allows remote attackers to cause a denial of service (integer overflow, and heap memory corruption or NULL pointer dereference, and application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3559/">CVE-2013-3559</cve>
	<bugzilla href="https://bugzilla.suse.com/820566">SUSE bug 820566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820973">SUSE bug 820973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591443" comment="wireshark-1.8.8-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3560</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3560" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3560" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3560" ref_url="https://www.suse.com/security/cve/CVE-2013-3560" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000561.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1084-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1086-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" source="SUSE-SU"/>
    <description>
    The dissect_dsmcc_un_download function in epan/dissectors/packet-mpeg-dsmcc.c in the MPEG DSM-CC dissector in Wireshark 1.8.x before 1.8.7 uses an incorrect format string, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3560/">CVE-2013-3560</cve>
	<bugzilla href="https://bugzilla.suse.com/820566">SUSE bug 820566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820973">SUSE bug 820973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591443" comment="wireshark-1.8.8-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3561</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3561" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3561" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3561" ref_url="https://www.suse.com/security/cve/CVE-2013-3561" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000561.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1084-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1086-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in Wireshark 1.8.x before 1.8.7 allow remote attackers to cause a denial of service (loop or application crash) via a malformed packet, related to a crash of the Websocket dissector, an infinite loop in the MySQL dissector, and a large loop in the ETCH dissector.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3561/">CVE-2013-3561</cve>
	<bugzilla href="https://bugzilla.suse.com/820566">SUSE bug 820566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820973">SUSE bug 820973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591443" comment="wireshark-1.8.8-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3562</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3562" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3562" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3562" ref_url="https://www.suse.com/security/cve/CVE-2013-3562" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000561.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1084-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1086-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" source="SUSE-SU"/>
    <description>
    Multiple integer signedness errors in the tvb_unmasked function in epan/dissectors/packet-websocket.c in the Websocket dissector in Wireshark 1.8.x before 1.8.7 allow remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3562/">CVE-2013-3562</cve>
	<bugzilla href="https://bugzilla.suse.com/820566">SUSE bug 820566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820973">SUSE bug 820973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591443" comment="wireshark-1.8.8-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3567</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3567" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3567" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3567" ref_url="https://www.suse.com/security/cve/CVE-2013-3567" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1370-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00019.html" source="SUSE-SU"/>
    <description>
    Puppet 2.7.x before 2.7.22 and 3.2.x before 3.2.2, and Puppet Enterprise before 2.8.2, deserializes untrusted YAML, which allows remote attackers to instantiate arbitrary Ruby classes and execute arbitrary code via a crafted REST API call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-3567/">CVE-2013-3567</cve>
	<bugzilla href="https://bugzilla.suse.com/1040151">SUSE bug 1040151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/825878">SUSE bug 825878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880224">SUSE bug 880224</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591530" comment="puppet-2.6.18-0.8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3571</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3571" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3571" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3571" ref_url="https://www.suse.com/security/cve/CVE-2013-3571" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001850.html" source="SUSE-SU"/>
    <description>
    socat 1.2.0.0 before 1.7.2.2 and 2.0.0-b1 before 2.0.0-b6, when used for a listen type address and the fork option is enabled, allows remote attackers to cause a denial of service (file descriptor consumption) via multiple request that are refused based on the (1) sourceport, (2) lowport, (3) range, or (4) tcpwrap restrictions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3571/">CVE-2013-3571</cve>
	<bugzilla href="https://bugzilla.suse.com/821985">SUSE bug 821985</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567448" comment="socat-1.7.0.0-1.18.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3704</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3704" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3704" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3704" ref_url="https://www.suse.com/security/cve/CVE-2013-3704" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1432-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1433-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00023.html" source="SUSE-SU"/>
    <description>
    The RPM GPG key import and handling feature in libzypp 12.15.0 and earlier reports a different key fingerprint than the one used to sign a repository when multiple key blobs are used, which might allow remote attackers to trick users into believing that the repository was signed by a more-trustworthy key.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-3704/">CVE-2013-3704</cve>
	<bugzilla href="https://bugzilla.suse.com/828672">SUSE bug 828672</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591533" comment="libzypp-9.16.1-0.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591534" comment="libzypp-9.37.1-0.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3718</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3718" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3718" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3718" ref_url="https://www.suse.com/security/cve/CVE-2013-3718" source="SUSE CVE"/>
    <description>
    evince is missing a check on number of pages which can lead to a segmentation fault
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3718/">CVE-2013-3718</cve>
	<bugzilla href="https://bugzilla.suse.com/970030">SUSE bug 970030</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334136" comment="evince is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3783</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3783" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3783" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3783" ref_url="https://www.suse.com/security/cve/CVE-2013-3783" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.31 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Parser.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3783/">CVE-2013-3783</cve>
	<bugzilla href="https://bugzilla.suse.com/830086">SUSE bug 830086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591077" comment="libmysql55client18-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591078" comment="libmysql55client18-32bit-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591079" comment="libmysql55client_r18-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591080" comment="libmysql55client_r18-32bit-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591081" comment="libmysqlclient15-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591082" comment="libmysqlclient15-32bit-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591083" comment="libmysqlclient_r15-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591084" comment="libmysqlclient_r15-32bit-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591085" comment="mysql-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591086" comment="mysql-client-5.5.33-0.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3793</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3793" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3793" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3793" ref_url="https://www.suse.com/security/cve/CVE-2013-3793" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.31 and earlier and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Data Manipulation Language.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3793/">CVE-2013-3793</cve>
	<bugzilla href="https://bugzilla.suse.com/830086">SUSE bug 830086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591077" comment="libmysql55client18-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591078" comment="libmysql55client18-32bit-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591079" comment="libmysql55client_r18-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591080" comment="libmysql55client_r18-32bit-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591081" comment="libmysqlclient15-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591082" comment="libmysqlclient15-32bit-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591083" comment="libmysqlclient_r15-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591084" comment="libmysqlclient_r15-32bit-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591085" comment="mysql-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591086" comment="mysql-client-5.5.33-0.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3794</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3794" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3794" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3794" ref_url="https://www.suse.com/security/cve/CVE-2013-3794" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.30 and earlier and 5.6.10 allows remote authenticated users to affect availability via unknown vectors related to Server Partition.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3794/">CVE-2013-3794</cve>
	<bugzilla href="https://bugzilla.suse.com/830086">SUSE bug 830086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591077" comment="libmysql55client18-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591078" comment="libmysql55client18-32bit-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591079" comment="libmysql55client_r18-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591080" comment="libmysql55client_r18-32bit-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591081" comment="libmysqlclient15-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591082" comment="libmysqlclient15-32bit-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591083" comment="libmysqlclient_r15-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591084" comment="libmysqlclient_r15-32bit-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591085" comment="mysql-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591086" comment="mysql-client-5.5.33-0.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3795</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3795" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3795" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3795" ref_url="https://www.suse.com/security/cve/CVE-2013-3795" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Data Manipulation Language.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3795/">CVE-2013-3795</cve>
	<bugzilla href="https://bugzilla.suse.com/830086">SUSE bug 830086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591077" comment="libmysql55client18-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591078" comment="libmysql55client18-32bit-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591079" comment="libmysql55client_r18-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591080" comment="libmysql55client_r18-32bit-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591081" comment="libmysqlclient15-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591082" comment="libmysqlclient15-32bit-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591083" comment="libmysqlclient_r15-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591084" comment="libmysqlclient_r15-32bit-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591085" comment="mysql-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591086" comment="mysql-client-5.5.33-0.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3796</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3796" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3796" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3796" ref_url="https://www.suse.com/security/cve/CVE-2013-3796" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3796/">CVE-2013-3796</cve>
	<bugzilla href="https://bugzilla.suse.com/830086">SUSE bug 830086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591077" comment="libmysql55client18-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591078" comment="libmysql55client18-32bit-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591079" comment="libmysql55client_r18-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591080" comment="libmysql55client_r18-32bit-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591081" comment="libmysqlclient15-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591082" comment="libmysqlclient15-32bit-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591083" comment="libmysqlclient_r15-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591084" comment="libmysqlclient_r15-32bit-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591085" comment="mysql-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591086" comment="mysql-client-5.5.33-0.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3798</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3798" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3798" ref_url="https://www.suse.com/security/cve/CVE-2013-3798" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.6.11 and earlier allows remote attackers to affect integrity and availability via unknown vectors related to MemCached.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3798/">CVE-2013-3798</cve>
	<bugzilla href="https://bugzilla.suse.com/830086">SUSE bug 830086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591077" comment="libmysql55client18-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591078" comment="libmysql55client18-32bit-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591079" comment="libmysql55client_r18-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591080" comment="libmysql55client_r18-32bit-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591081" comment="libmysqlclient15-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591082" comment="libmysqlclient15-32bit-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591083" comment="libmysqlclient_r15-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591084" comment="libmysqlclient_r15-32bit-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591085" comment="mysql-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591086" comment="mysql-client-5.5.33-0.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3801</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3801" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3801" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3801" ref_url="https://www.suse.com/security/cve/CVE-2013-3801" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.30 and earlier and 5.6.10 allows remote authenticated users to affect availability via unknown vectors related to Server Options.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3801/">CVE-2013-3801</cve>
	<bugzilla href="https://bugzilla.suse.com/830086">SUSE bug 830086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591077" comment="libmysql55client18-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591078" comment="libmysql55client18-32bit-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591079" comment="libmysql55client_r18-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591080" comment="libmysql55client_r18-32bit-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591081" comment="libmysqlclient15-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591082" comment="libmysqlclient15-32bit-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591083" comment="libmysqlclient_r15-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591084" comment="libmysqlclient_r15-32bit-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591085" comment="mysql-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591086" comment="mysql-client-5.5.33-0.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3802</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3802" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3802" ref_url="https://www.suse.com/security/cve/CVE-2013-3802" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.69 and earlier, 5.5.31 and earlier, and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Full Text Search.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3802/">CVE-2013-3802</cve>
	<bugzilla href="https://bugzilla.suse.com/830086">SUSE bug 830086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591077" comment="libmysql55client18-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591078" comment="libmysql55client18-32bit-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591079" comment="libmysql55client_r18-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591080" comment="libmysql55client_r18-32bit-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591081" comment="libmysqlclient15-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591082" comment="libmysqlclient15-32bit-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591083" comment="libmysqlclient_r15-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591084" comment="libmysqlclient_r15-32bit-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591085" comment="mysql-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591086" comment="mysql-client-5.5.33-0.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3804</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3804" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3804" ref_url="https://www.suse.com/security/cve/CVE-2013-3804" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.69 and earlier, 5.5.31 and earlier, and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3804/">CVE-2013-3804</cve>
	<bugzilla href="https://bugzilla.suse.com/830086">SUSE bug 830086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591077" comment="libmysql55client18-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591078" comment="libmysql55client18-32bit-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591079" comment="libmysql55client_r18-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591080" comment="libmysql55client_r18-32bit-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591081" comment="libmysqlclient15-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591082" comment="libmysqlclient15-32bit-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591083" comment="libmysqlclient_r15-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591084" comment="libmysqlclient_r15-32bit-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591085" comment="mysql-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591086" comment="mysql-client-5.5.33-0.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3805</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3805" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3805" ref_url="https://www.suse.com/security/cve/CVE-2013-3805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.30 and earlier and 5.6.10 allows remote authenticated users to affect availability via unknown vectors related to Prepared Statements.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3805/">CVE-2013-3805</cve>
	<bugzilla href="https://bugzilla.suse.com/830086">SUSE bug 830086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591077" comment="libmysql55client18-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591078" comment="libmysql55client18-32bit-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591079" comment="libmysql55client_r18-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591080" comment="libmysql55client_r18-32bit-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591081" comment="libmysqlclient15-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591082" comment="libmysqlclient15-32bit-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591083" comment="libmysqlclient_r15-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591084" comment="libmysqlclient_r15-32bit-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591085" comment="mysql-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591086" comment="mysql-client-5.5.33-0.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3806</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3806" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3806" ref_url="https://www.suse.com/security/cve/CVE-2013-3806" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB, a different vulnerability than CVE-2013-3811.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3806/">CVE-2013-3806</cve>
	<bugzilla href="https://bugzilla.suse.com/830086">SUSE bug 830086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591077" comment="libmysql55client18-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591078" comment="libmysql55client18-32bit-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591079" comment="libmysql55client_r18-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591080" comment="libmysql55client_r18-32bit-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591081" comment="libmysqlclient15-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591082" comment="libmysqlclient15-32bit-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591083" comment="libmysqlclient_r15-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591084" comment="libmysqlclient_r15-32bit-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591085" comment="mysql-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591086" comment="mysql-client-5.5.33-0.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3807</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3807" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3807" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3807" ref_url="https://www.suse.com/security/cve/CVE-2013-3807" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.6.11 and earlier allows remote attackers to affect confidentiality and integrity via unknown vectors related to Server Privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3807/">CVE-2013-3807</cve>
	<bugzilla href="https://bugzilla.suse.com/830086">SUSE bug 830086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591077" comment="libmysql55client18-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591078" comment="libmysql55client18-32bit-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591079" comment="libmysql55client_r18-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591080" comment="libmysql55client_r18-32bit-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591081" comment="libmysqlclient15-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591082" comment="libmysqlclient15-32bit-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591083" comment="libmysqlclient_r15-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591084" comment="libmysqlclient_r15-32bit-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591085" comment="mysql-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591086" comment="mysql-client-5.5.33-0.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3808</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3808" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3808" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3808" ref_url="https://www.suse.com/security/cve/CVE-2013-3808" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 allows remote authenticated users to affect availability via unknown vectors related to Server Options.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3808/">CVE-2013-3808</cve>
	<bugzilla href="https://bugzilla.suse.com/830086">SUSE bug 830086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591077" comment="libmysql55client18-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591078" comment="libmysql55client18-32bit-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591079" comment="libmysql55client_r18-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591080" comment="libmysql55client_r18-32bit-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591081" comment="libmysqlclient15-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591082" comment="libmysqlclient15-32bit-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591083" comment="libmysqlclient_r15-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591084" comment="libmysqlclient_r15-32bit-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591085" comment="mysql-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591086" comment="mysql-client-5.5.33-0.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3809</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3809" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3809" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3809" ref_url="https://www.suse.com/security/cve/CVE-2013-3809" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.31 and earlier and 5.6.11 and earlier allows remote authenticated users to affect integrity via unknown vectors related to Audit Log.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3809/">CVE-2013-3809</cve>
	<bugzilla href="https://bugzilla.suse.com/830086">SUSE bug 830086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591077" comment="libmysql55client18-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591078" comment="libmysql55client18-32bit-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591079" comment="libmysql55client_r18-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591080" comment="libmysql55client_r18-32bit-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591081" comment="libmysqlclient15-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591082" comment="libmysqlclient15-32bit-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591083" comment="libmysqlclient_r15-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591084" comment="libmysqlclient_r15-32bit-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591085" comment="mysql-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591086" comment="mysql-client-5.5.33-0.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3810</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3810" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3810" ref_url="https://www.suse.com/security/cve/CVE-2013-3810" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to XA Transactions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3810/">CVE-2013-3810</cve>
	<bugzilla href="https://bugzilla.suse.com/830086">SUSE bug 830086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591077" comment="libmysql55client18-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591078" comment="libmysql55client18-32bit-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591079" comment="libmysql55client_r18-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591080" comment="libmysql55client_r18-32bit-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591081" comment="libmysqlclient15-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591082" comment="libmysqlclient15-32bit-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591083" comment="libmysqlclient_r15-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591084" comment="libmysqlclient_r15-32bit-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591085" comment="mysql-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591086" comment="mysql-client-5.5.33-0.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3811</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3811" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3811" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3811" ref_url="https://www.suse.com/security/cve/CVE-2013-3811" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB, a different vulnerability than CVE-2013-3806.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3811/">CVE-2013-3811</cve>
	<bugzilla href="https://bugzilla.suse.com/830086">SUSE bug 830086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591077" comment="libmysql55client18-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591078" comment="libmysql55client18-32bit-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591079" comment="libmysql55client_r18-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591080" comment="libmysql55client_r18-32bit-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591081" comment="libmysqlclient15-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591082" comment="libmysqlclient15-32bit-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591083" comment="libmysqlclient_r15-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591084" comment="libmysqlclient_r15-32bit-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591085" comment="mysql-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591086" comment="mysql-client-5.5.33-0.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3812</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3812" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3812" ref_url="https://www.suse.com/security/cve/CVE-2013-3812" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.31 and earlier and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Replication.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3812/">CVE-2013-3812</cve>
	<bugzilla href="https://bugzilla.suse.com/830086">SUSE bug 830086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591077" comment="libmysql55client18-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591078" comment="libmysql55client18-32bit-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591079" comment="libmysql55client_r18-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591080" comment="libmysql55client_r18-32bit-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591081" comment="libmysqlclient15-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591082" comment="libmysqlclient15-32bit-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591083" comment="libmysqlclient_r15-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591084" comment="libmysqlclient_r15-32bit-5.0.96-0.6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591085" comment="mysql-5.5.33-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591086" comment="mysql-client-5.5.33-0.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3829</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3829" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3829" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3829" ref_url="https://www.suse.com/security/cve/CVE-2013-3829" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java SE, Java SE Embedded component in Oracle Java SE Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality and integrity via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3829/">CVE-2013-3829</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566027" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566028" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566029" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591540" comment="java-1_7_0-openjdk-1.7.0.6-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591541" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591542" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4002</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4002" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4002" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4002" ref_url="https://www.suse.com/security/cve/CVE-2013-4002" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    XMLscanner.java in Apache Xerces2 Java Parser before 2.12.0, as used in the Java Runtime Environment (JRE) in IBM Java 5.0 before 5.0 SR16-FP3, 6 before 6 SR14, 6.0.1 before 6.0.1 SR6, and 7 before 7 SR5 as well as Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, Java SE Embedded 7u40 and earlier, and possibly other products allows remote attackers to cause a denial of service via vectors related to XML attribute names.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4002/">CVE-2013-4002</cve>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566027" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566028" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566029" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591540" comment="java-1_7_0-openjdk-1.7.0.6-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591541" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591542" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4073</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4073" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4073" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4073" ref_url="https://www.suse.com/security/cve/CVE-2013-4073" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1260-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1260-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-March/000748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000889.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1179-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1181-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1186-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00044.html" source="SUSE-SU"/>
    <description>
    The OpenSSL::SSL.verify_certificate_identity function in lib/openssl/ssl.rb in Ruby 1.8 before 1.8.7-p374, 1.9 before 1.9.3-p448, and 2.0 before 2.0.0-p247 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4073/">CVE-2013-4073</cve>
	<bugzilla href="https://bugzilla.suse.com/827265">SUSE bug 827265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834601">SUSE bug 834601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839107">SUSE bug 839107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876588">SUSE bug 876588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880222">SUSE bug 880222</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591543" comment="ruby-1.8.7.p357-0.9.11.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567073" comment="libpython2_6-1_0-2.6.9-0.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567074" comment="libpython2_6-1_0-32bit-2.6.9-0.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567075" comment="python-2.6.9-0.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567076" comment="python-base-2.6.9-0.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567077" comment="python-base-32bit-2.6.9-0.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567078" comment="python-curses-2.6.9-0.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567079" comment="python-devel-2.6.9-0.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563796" comment="python-tk-2.6.9-0.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567080" comment="python-xml-2.6.9-0.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591543" comment="ruby-1.8.7.p357-0.9.11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4074</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4074" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4074" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4074" ref_url="https://www.suse.com/security/cve/CVE-2013-4074" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000561.html" source="SUSE-SU"/>
    <description>
    The dissect_capwap_data function in epan/dissectors/packet-capwap.c in the CAPWAP dissector in Wireshark 1.6.x before 1.6.16 and 1.8.x before 1.8.8 incorrectly uses a -1 data value to represent an error condition, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4074/">CVE-2013-4074</cve>
	<bugzilla href="https://bugzilla.suse.com/824900">SUSE bug 824900</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591443" comment="wireshark-1.8.8-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4075</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4075" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4075" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4075" ref_url="https://www.suse.com/security/cve/CVE-2013-4075" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000561.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-gmr1_bcch.c in the GMR-1 BCCH dissector in Wireshark 1.8.x before 1.8.8 does not properly initialize memory, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4075/">CVE-2013-4075</cve>
	<bugzilla href="https://bugzilla.suse.com/824900">SUSE bug 824900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/836146">SUSE bug 836146</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591443" comment="wireshark-1.8.8-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4076</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4076" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4076" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4076" ref_url="https://www.suse.com/security/cve/CVE-2013-4076" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000561.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the dissect_iphc_crtp_fh function in epan/dissectors/packet-ppp.c in the PPP dissector in Wireshark 1.8.x before 1.8.8 allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4076/">CVE-2013-4076</cve>
	<bugzilla href="https://bugzilla.suse.com/824900">SUSE bug 824900</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591443" comment="wireshark-1.8.8-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4077</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4077" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4077" ref_url="https://www.suse.com/security/cve/CVE-2013-4077" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000561.html" source="SUSE-SU"/>
    <description>
    Array index error in the NBAP dissector in Wireshark 1.8.x before 1.8.8 allows remote attackers to cause a denial of service (application crash) via a crafted packet, related to nbap.cnf and packet-nbap.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4077/">CVE-2013-4077</cve>
	<bugzilla href="https://bugzilla.suse.com/824900">SUSE bug 824900</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591443" comment="wireshark-1.8.8-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4078</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4078" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4078" ref_url="https://www.suse.com/security/cve/CVE-2013-4078" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000561.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-rdp.c in the RDP dissector in Wireshark 1.8.x before 1.8.8 does not validate return values during checks for data availability, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4078/">CVE-2013-4078</cve>
	<bugzilla href="https://bugzilla.suse.com/824900">SUSE bug 824900</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591443" comment="wireshark-1.8.8-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4079</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4079" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4079" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4079" ref_url="https://www.suse.com/security/cve/CVE-2013-4079" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000561.html" source="SUSE-SU"/>
    <description>
    The dissect_schedule_message function in epan/dissectors/packet-gsm_cbch.c in the GSM CBCH dissector in Wireshark 1.8.x before 1.8.8 allows remote attackers to cause a denial of service (infinite loop and application hang) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4079/">CVE-2013-4079</cve>
	<bugzilla href="https://bugzilla.suse.com/824900">SUSE bug 824900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/836146">SUSE bug 836146</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591443" comment="wireshark-1.8.8-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4080</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4080" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4080" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4080" ref_url="https://www.suse.com/security/cve/CVE-2013-4080" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000561.html" source="SUSE-SU"/>
    <description>
    The dissect_r3_upstreamcommand_queryconfig function in epan/dissectors/packet-assa_r3.c in the Assa Abloy R3 dissector in Wireshark 1.8.x before 1.8.8 does not properly handle a zero-length item, which allows remote attackers to cause a denial of service (infinite loop, and CPU and memory consumption) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4080/">CVE-2013-4080</cve>
	<bugzilla href="https://bugzilla.suse.com/824900">SUSE bug 824900</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591443" comment="wireshark-1.8.8-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4081</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4081" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4081" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4081" ref_url="https://www.suse.com/security/cve/CVE-2013-4081" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000561.html" source="SUSE-SU"/>
    <description>
    The http_payload_subdissector function in epan/dissectors/packet-http.c in the HTTP dissector in Wireshark 1.6.x before 1.6.16 and 1.8.x before 1.8.8 does not properly determine when to use a recursive approach, which allows remote attackers to cause a denial of service (stack consumption) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4081/">CVE-2013-4081</cve>
	<bugzilla href="https://bugzilla.suse.com/824900">SUSE bug 824900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/836116">SUSE bug 836116</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591443" comment="wireshark-1.8.8-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134082" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4082</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4082" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4082" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4082" ref_url="https://www.suse.com/security/cve/CVE-2013-4082" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000561.html" source="SUSE-SU"/>
    <description>
    The vwr_read function in wiretap/vwr.c in the Ixia IxVeriWave file parser in Wireshark 1.8.x before 1.8.8 does not validate the relationship between a record length and a trailer length, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4082/">CVE-2013-4082</cve>
	<bugzilla href="https://bugzilla.suse.com/824900">SUSE bug 824900</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591443" comment="wireshark-1.8.8-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4083</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4083" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4083" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4083" ref_url="https://www.suse.com/security/cve/CVE-2013-4083" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000561.html" source="SUSE-SU"/>
    <description>
    The dissect_pft function in epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector in Wireshark 1.6.x before 1.6.16, 1.8.x before 1.8.8, and 1.10.0 does not validate a certain fragment length value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4083/">CVE-2013-4083</cve>
	<bugzilla href="https://bugzilla.suse.com/824900">SUSE bug 824900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/831718">SUSE bug 831718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591443" comment="wireshark-1.8.8-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4118</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4118" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4118" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4118" ref_url="https://www.suse.com/security/cve/CVE-2013-4118" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002324.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2400-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00101.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2402-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00102.html" source="SUSE-SU"/>
    <description>
    FreeRDP before 1.1.0-beta1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4118/">CVE-2013-4118</cve>
	<bugzilla href="https://bugzilla.suse.com/829013">SUSE bug 829013</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334232" comment="freerdp is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4119</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4119" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4119" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4119" ref_url="https://www.suse.com/security/cve/CVE-2013-4119" source="SUSE CVE"/>
    <description>
    FreeRDP before 1.1.0-beta+2013071101 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) by disconnecting before authentication has finished.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4119/">CVE-2013-4119</cve>
	<bugzilla href="https://bugzilla.suse.com/829013">SUSE bug 829013</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334232" comment="freerdp is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4124</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4124" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4124" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4124" ref_url="https://www.suse.com/security/cve/CVE-2013-4124" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-September/000595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-September/000596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000831.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1339-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1349-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00015.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the read_nttrans_ea_list function in nttrans.c in smbd in Samba 3.x before 3.5.22, 3.6.x before 3.6.17, and 4.x before 4.0.8 allows remote attackers to cause a denial of service (memory consumption) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4124/">CVE-2013-4124</cve>
	<bugzilla href="https://bugzilla.suse.com/829969">SUSE bug 829969</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591603" comment="libldb1-3.6.3-0.33.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591604" comment="libldb1-32bit-3.6.3-0.33.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591605" comment="libsmbclient0-3.6.3-0.33.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591606" comment="libsmbclient0-32bit-3.6.3-0.33.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591607" comment="libtalloc1-3.4.3-1.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591608" comment="libtalloc1-32bit-3.4.3-1.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591609" comment="libtalloc2-3.6.3-0.33.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591610" comment="libtalloc2-32bit-3.6.3-0.33.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591611" comment="libtdb1-3.6.3-0.33.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591612" comment="libtdb1-32bit-3.6.3-0.33.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591613" comment="libtevent0-3.6.3-0.33.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591614" comment="libtevent0-32bit-3.6.3-0.33.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591615" comment="libwbclient0-3.6.3-0.33.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591616" comment="libwbclient0-32bit-3.6.3-0.33.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591617" comment="samba-3.6.3-0.33.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591618" comment="samba-32bit-3.6.3-0.33.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591619" comment="samba-client-3.6.3-0.33.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591620" comment="samba-client-32bit-3.6.3-0.33.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591621" comment="samba-doc-3.6.3-0.33.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591622" comment="samba-krb-printing-3.6.3-0.33.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591623" comment="samba-winbind-3.6.3-0.33.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591624" comment="samba-winbind-32bit-3.6.3-0.33.35.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591625" comment="libldb1-3.6.3-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591626" comment="libldb1-32bit-3.6.3-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591627" comment="libsmbclient0-3.6.3-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591628" comment="libsmbclient0-32bit-3.6.3-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591629" comment="libtalloc2-3.6.3-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591630" comment="libtalloc2-32bit-3.6.3-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591631" comment="libtdb1-3.6.3-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591632" comment="libtdb1-32bit-3.6.3-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591633" comment="libtevent0-3.6.3-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591634" comment="libtevent0-32bit-3.6.3-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591635" comment="libwbclient0-3.6.3-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591636" comment="libwbclient0-32bit-3.6.3-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591637" comment="samba-3.6.3-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591638" comment="samba-32bit-3.6.3-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591639" comment="samba-client-3.6.3-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591640" comment="samba-client-32bit-3.6.3-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591641" comment="samba-doc-3.6.3-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591642" comment="samba-krb-printing-3.6.3-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591643" comment="samba-winbind-3.6.3-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591644" comment="samba-winbind-32bit-3.6.3-0.42.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4132</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4132" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4132" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4132" ref_url="https://www.suse.com/security/cve/CVE-2013-4132" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000907.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1253-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1291-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00002.html" source="SUSE-SU"/>
    <description>
    KDE-Workspace 4.10.5 and earlier does not properly handle the return value of the glibc 2.17 crypt and pw_encrypt functions, which allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via (1) an invalid salt or a (2) DES or (3) MD5 encrypted password, when FIPS-140 is enable, to KDM or an (4) invalid password to KCheckPass.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4132/">CVE-2013-4132</cve>
	<bugzilla href="https://bugzilla.suse.com/829857">SUSE bug 829857</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566652" comment="kde4-kgreeter-plugins-4.3.5-0.12.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566653" comment="kdebase4-wallpapers-4.3.5-0.11.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566654" comment="kdebase4-workspace-4.3.5-0.12.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566655" comment="kdebase4-workspace-ksysguardd-4.3.5-0.12.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566656" comment="kdm-4.3.5-0.12.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566657" comment="kwin-4.3.5-0.12.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4133</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4133" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4133" ref_url="https://www.suse.com/security/cve/CVE-2013-4133" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000907.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1291-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00002.html" source="SUSE-SU"/>
    <description>
    kde-workspace before 4.10.5 has a memory leak in plasma desktop
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4133/">CVE-2013-4133</cve>
	<bugzilla href="https://bugzilla.suse.com/829857">SUSE bug 829857</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566652" comment="kde4-kgreeter-plugins-4.3.5-0.12.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566653" comment="kdebase4-wallpapers-4.3.5-0.11.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566654" comment="kdebase4-workspace-4.3.5-0.12.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566655" comment="kdebase4-workspace-ksysguardd-4.3.5-0.12.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566656" comment="kdm-4.3.5-0.12.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566657" comment="kwin-4.3.5-0.12.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4156</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4156" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4156" ref_url="https://www.suse.com/security/cve/CVE-2013-4156" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1116-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00018.html" source="SUSE-SU"/>
    <description>
    Apache OpenOffice.org (OOo) before 4.0 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted element in an OOXML document file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4156/">CVE-2013-4156</cve>
	<bugzilla href="https://bugzilla.suse.com/831578">SUSE bug 831578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/893141">SUSE bug 893141</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009563580" comment="libreoffice-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563581" comment="libreoffice-base-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563582" comment="libreoffice-base-drivers-postgresql-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563583" comment="libreoffice-base-extensions-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563585" comment="libreoffice-calc-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563586" comment="libreoffice-calc-extensions-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563587" comment="libreoffice-draw-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563588" comment="libreoffice-draw-extensions-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563589" comment="libreoffice-filters-optional-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563590" comment="libreoffice-gnome-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563591" comment="libreoffice-help-cs-4.0.3.3.26-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563592" comment="libreoffice-help-da-4.0.3.3.26-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563593" comment="libreoffice-help-de-4.0.3.3.26-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563594" comment="libreoffice-help-en-GB-4.0.3.3.26-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563595" comment="libreoffice-help-en-US-4.0.3.3.26-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563596" comment="libreoffice-help-es-4.0.3.3.26-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563597" comment="libreoffice-help-fr-4.0.3.3.26-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563598" comment="libreoffice-help-gu-IN-4.0.3.3.26-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563599" comment="libreoffice-help-hi-IN-4.0.3.3.26-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563600" comment="libreoffice-help-hu-4.0.3.3.26-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563601" comment="libreoffice-help-it-4.0.3.3.26-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563602" comment="libreoffice-help-ja-4.0.3.3.26-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563603" comment="libreoffice-help-ko-4.0.3.3.26-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563604" comment="libreoffice-help-nl-4.0.3.3.26-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563605" comment="libreoffice-help-pl-4.0.3.3.26-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563606" comment="libreoffice-help-pt-4.0.3.3.26-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563607" comment="libreoffice-help-pt-BR-4.0.3.3.26-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563608" comment="libreoffice-help-ru-4.0.3.3.26-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563609" comment="libreoffice-help-sv-4.0.3.3.26-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563610" comment="libreoffice-help-zh-CN-4.0.3.3.26-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563611" comment="libreoffice-help-zh-TW-4.0.3.3.26-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563612" comment="libreoffice-icon-themes-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563613" comment="libreoffice-impress-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563614" comment="libreoffice-impress-extensions-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563615" comment="libreoffice-kde-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563616" comment="libreoffice-kde4-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563617" comment="libreoffice-l10n-af-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563618" comment="libreoffice-l10n-ar-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563619" comment="libreoffice-l10n-ca-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563620" comment="libreoffice-l10n-cs-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563621" comment="libreoffice-l10n-da-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563622" comment="libreoffice-l10n-de-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563624" comment="libreoffice-l10n-en-GB-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563625" comment="libreoffice-l10n-es-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563626" comment="libreoffice-l10n-fi-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563627" comment="libreoffice-l10n-fr-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563628" comment="libreoffice-l10n-gu-IN-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563629" comment="libreoffice-l10n-hi-IN-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563630" comment="libreoffice-l10n-hu-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563631" comment="libreoffice-l10n-it-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563632" comment="libreoffice-l10n-ja-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563633" comment="libreoffice-l10n-ko-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563634" comment="libreoffice-l10n-nb-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563635" comment="libreoffice-l10n-nl-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563636" comment="libreoffice-l10n-nn-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563637" comment="libreoffice-l10n-pl-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563639" comment="libreoffice-l10n-pt-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563640" comment="libreoffice-l10n-pt-BR-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563641" comment="libreoffice-l10n-ru-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563642" comment="libreoffice-l10n-sk-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563643" comment="libreoffice-l10n-sv-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563644" comment="libreoffice-l10n-xh-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563645" comment="libreoffice-l10n-zh-CN-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563646" comment="libreoffice-l10n-zh-TW-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563647" comment="libreoffice-l10n-zu-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563648" comment="libreoffice-mailmerge-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563649" comment="libreoffice-math-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563650" comment="libreoffice-mono-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563651" comment="libreoffice-officebean-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563652" comment="libreoffice-pyuno-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563654" comment="libreoffice-writer-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563655" comment="libreoffice-writer-extensions-4.0.3.3.26-0.6.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4162</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4162" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4162" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4162" ref_url="https://www.suse.com/security/cve/CVE-2013-4162" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1474-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1619-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1773-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00106.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1971-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00129.html" source="SUSE-SU"/>
    <description>
    The udp_v6_push_pending_frames function in net/ipv6/udp.c in the IPv6 implementation in the Linux kernel through 3.10.3 makes an incorrect function call for pending data, which allows local users to cause a denial of service (BUG and system crash) via a crafted application that uses the UDP_CORK option in a setsockopt system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4162/">CVE-2013-4162</cve>
	<bugzilla href="https://bugzilla.suse.com/831058">SUSE bug 831058</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590816" comment="kernel-default-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590817" comment="kernel-default-base-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590818" comment="kernel-default-devel-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590819" comment="kernel-default-extra-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590820" comment="kernel-source-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590821" comment="kernel-syms-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590822" comment="kernel-trace-devel-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590823" comment="kernel-xen-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590824" comment="kernel-xen-base-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590825" comment="kernel-xen-devel-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590826" comment="kernel-xen-extra-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590827" comment="xen-kmp-default-4.2.2_06_3.0.93_0.8-0.7.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590800" comment="kernel-default-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590801" comment="kernel-default-base-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590802" comment="kernel-default-devel-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590803" comment="kernel-default-extra-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590804" comment="kernel-source-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590805" comment="kernel-syms-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590806" comment="kernel-trace-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590807" comment="kernel-trace-base-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590808" comment="kernel-trace-devel-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590809" comment="kernel-trace-extra-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590810" comment="kernel-xen-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590811" comment="kernel-xen-base-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590812" comment="kernel-xen-devel-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590813" comment="kernel-xen-extra-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590814" comment="xen-kmp-default-4.1.5_02_3.0.93_0.5-0.5.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590815" comment="xen-kmp-trace-4.1.5_02_3.0.93_0.5-0.5.39 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4163</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4163" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4163" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4163" ref_url="https://www.suse.com/security/cve/CVE-2013-4163" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1474-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000608.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1619-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1773-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00106.html" source="SUSE-SU"/>
    <description>
    The ip6_append_data_mtu function in net/ipv6/ip6_output.c in the IPv6 implementation in the Linux kernel through 3.10.3 does not properly maintain information about whether the IPV6_MTU setsockopt option had been specified, which allows local users to cause a denial of service (BUG and system crash) via a crafted application that uses the UDP_CORK option in a setsockopt system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4163/">CVE-2013-4163</cve>
	<bugzilla href="https://bugzilla.suse.com/831055">SUSE bug 831055</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590816" comment="kernel-default-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590817" comment="kernel-default-base-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590818" comment="kernel-default-devel-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590819" comment="kernel-default-extra-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590820" comment="kernel-source-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590821" comment="kernel-syms-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590822" comment="kernel-trace-devel-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590823" comment="kernel-xen-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590824" comment="kernel-xen-base-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590825" comment="kernel-xen-devel-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590826" comment="kernel-xen-extra-3.0.93-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590827" comment="xen-kmp-default-4.2.2_06_3.0.93_0.8-0.7.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590800" comment="kernel-default-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590801" comment="kernel-default-base-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590802" comment="kernel-default-devel-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590803" comment="kernel-default-extra-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590804" comment="kernel-source-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590805" comment="kernel-syms-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590806" comment="kernel-trace-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590807" comment="kernel-trace-base-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590808" comment="kernel-trace-devel-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590809" comment="kernel-trace-extra-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590810" comment="kernel-xen-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590811" comment="kernel-xen-base-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590812" comment="kernel-xen-devel-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590813" comment="kernel-xen-extra-3.0.93-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590814" comment="xen-kmp-default-4.1.5_02_3.0.93_0.5-0.5.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590815" comment="xen-kmp-trace-4.1.5_02_3.0.93_0.5-0.5.39 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4164</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4164" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4164" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4164" ref_url="https://www.suse.com/security/cve/CVE-2013-4164" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1828-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1897-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000889.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1834-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1835-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00028.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Ruby 1.8, 1.9 before 1.9.3-p484, 2.0 before 2.0.0-p353, 2.1 before 2.1.0 preview2, and trunk before revision 43780 allows context-dependent attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a string that is converted to a floating point value, as demonstrated using (1) the to_f method or (2) JSON.parse.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-4164/">CVE-2013-4164</cve>
	<bugzilla href="https://bugzilla.suse.com/851803">SUSE bug 851803</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566185" comment="ruby-1.8.7.p357-0.9.13.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4231</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4231" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4231" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4231" ref_url="https://www.suse.com/security/cve/CVE-2013-4231" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000623.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1482-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1484-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00053.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in libtiff before 4.0.3 allow remote attackers to cause a denial of service (out-of-bounds write) via a crafted (1) extension block in a GIF image or (2) GIF raster image to tools/gif2tiff.c or (3) a long filename for a TIFF image to tools/rgb2ycbcr.c.  NOTE: vectors 1 and 3 are disputed by Red Hat, which states that the input cannot exceed the allocated buffer size.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4231/">CVE-2013-4231</cve>
	<bugzilla href="https://bugzilla.suse.com/834477">SUSE bug 834477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854393">SUSE bug 854393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566131" comment="libtiff3-3.8.2-141.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566132" comment="libtiff3-32bit-3.8.2-141.154.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4232</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4232" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4232" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4232" ref_url="https://www.suse.com/security/cve/CVE-2013-4232" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000623.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1482-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1484-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00053.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the t2p_readwrite_pdf_image function in tools/tiff2pdf.c in libtiff 4.0.3 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted TIFF image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4232/">CVE-2013-4232</cve>
	<bugzilla href="https://bugzilla.suse.com/834477">SUSE bug 834477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854393">SUSE bug 854393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566131" comment="libtiff3-3.8.2-141.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566132" comment="libtiff3-32bit-3.8.2-141.154.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4237</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4237" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4237" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4237" ref_url="https://www.suse.com/security/cve/CVE-2013-4237" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1122-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1128-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1510-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00072.html" source="SUSE-SU"/>
    <description>
    sysdeps/posix/readdir_r.c in the GNU C Library (aka glibc or libc6) 2.18 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted (1) NTFS or (2) CIFS image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4237/">CVE-2013-4237</cve>
	<bugzilla href="https://bugzilla.suse.com/834594">SUSE bug 834594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882910">SUSE bug 882910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883022">SUSE bug 883022</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566000" comment="glibc-2.11.3-17.45.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566001" comment="glibc-32bit-2.11.3-17.45.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566002" comment="glibc-devel-2.11.3-17.45.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566003" comment="glibc-devel-32bit-2.11.3-17.45.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566004" comment="glibc-i18ndata-2.11.3-17.45.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566005" comment="glibc-locale-2.11.3-17.45.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566006" comment="glibc-locale-32bit-2.11.3-17.45.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566007" comment="nscd-2.11.3-17.45.49.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590138" comment="glibc-2.11.3-17.56.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590139" comment="glibc-32bit-2.11.3-17.56.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590140" comment="glibc-devel-2.11.3-17.56.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590141" comment="glibc-devel-32bit-2.11.3-17.56.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590142" comment="glibc-i18ndata-2.11.3-17.56.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590143" comment="glibc-locale-2.11.3-17.56.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590144" comment="glibc-locale-32bit-2.11.3-17.56.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590145" comment="nscd-2.11.3-17.56.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4238</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4238" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4238" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-March/000748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1437-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1438-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1439-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1440-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1462-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1463-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0380-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0498-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-17"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238</cve>
	<bugzilla href="https://bugzilla.suse.com/834601">SUSE bug 834601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839107">SUSE bug 839107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882915">SUSE bug 882915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912739">SUSE bug 912739</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566177" comment="libpython2_6-1_0-2.6.8-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566178" comment="libpython2_6-1_0-32bit-2.6.8-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566179" comment="python-2.6.8-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566180" comment="python-base-2.6.8-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566181" comment="python-base-32bit-2.6.8-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566182" comment="python-curses-2.6.8-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566183" comment="python-devel-2.6.8-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563127" comment="python-tk-2.6.8-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566184" comment="python-xml-2.6.8-0.23.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567073" comment="libpython2_6-1_0-2.6.9-0.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567074" comment="libpython2_6-1_0-32bit-2.6.9-0.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567075" comment="python-2.6.9-0.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567076" comment="python-base-2.6.9-0.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567077" comment="python-base-32bit-2.6.9-0.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567078" comment="python-curses-2.6.9-0.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567079" comment="python-devel-2.6.9-0.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563796" comment="python-tk-2.6.9-0.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567080" comment="python-xml-2.6.9-0.25.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4242</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4242" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4242" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4242" ref_url="https://www.suse.com/security/cve/CVE-2013-4242" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-August/000581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000829.html" source="SUSE-SU"/>
    <description>
    GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4242/">CVE-2013-4242</cve>
	<bugzilla href="https://bugzilla.suse.com/831359">SUSE bug 831359</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566104" comment="libgcrypt11-1.5.0-0.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566105" comment="libgcrypt11-32bit-1.5.0-0.15.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4243</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4243" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4243" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4243" ref_url="https://www.suse.com/security/cve/CVE-2013-4243" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000623.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1482-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1484-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00053.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the readgifimage function in the gif2tiff tool in libtiff 4.0.3 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted height and width values in a GIF image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4243/">CVE-2013-4243</cve>
	<bugzilla href="https://bugzilla.suse.com/834779">SUSE bug 834779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854393">SUSE bug 854393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566131" comment="libtiff3-3.8.2-141.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566132" comment="libtiff3-32bit-3.8.2-141.154.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4244</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4244" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4244" ref_url="https://www.suse.com/security/cve/CVE-2013-4244" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000623.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1482-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1484-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00053.html" source="SUSE-SU"/>
    <description>
    The LZW decompressor in the gif2tiff tool in libtiff 4.0.3 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted GIF image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4244/">CVE-2013-4244</cve>
	<bugzilla href="https://bugzilla.suse.com/834788">SUSE bug 834788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854393">SUSE bug 854393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566131" comment="libtiff3-3.8.2-141.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566132" comment="libtiff3-32bit-3.8.2-141.154.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4245</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4245" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4245" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4245" ref_url="https://www.suse.com/security/cve/CVE-2013-4245" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001710.html" source="SUSE-SU"/>
    <description>
    Orca has arbitrary code execution due to insecure Python module load
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4245/">CVE-2013-4245</cve>
	<bugzilla href="https://bugzilla.suse.com/916835">SUSE bug 916835</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567029" comment="orca-2.28.3-0.5.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567030" comment="orca-lang-2.28.3-0.5.10 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134270" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4270</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4270" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4270" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4270" ref_url="https://www.suse.com/security/cve/CVE-2013-4270" source="SUSE CVE"/>
    <description>
    The net_ctl_permissions function in net/sysctl_net.c in the Linux kernel before 3.11.5 does not properly determine uid and gid values, which allows local users to bypass intended /proc/sys/net restrictions via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4270/">CVE-2013-4270</cve>
	<bugzilla href="https://bugzilla.suse.com/836949">SUSE bug 836949</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134276" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4276</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4276" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4276" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4276" ref_url="https://www.suse.com/security/cve/CVE-2013-4276" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000645.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1547-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1560-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00029.html" source="SUSE-SU"/>
    <description>
    Multiple stack-based buffer overflows in LittleCMS (aka lcms or liblcms) 1.19 and earlier allow remote attackers to cause a denial of service (crash) via a crafted (1) ICC color profile to the icctrans utility or (2) TIFF image to the tiffdiff utility.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4276/">CVE-2013-4276</cve>
	<bugzilla href="https://bugzilla.suse.com/843716">SUSE bug 843716</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566059" comment="lcms-1.17-77.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566060" comment="liblcms1-1.17-77.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566061" comment="liblcms1-32bit-1.17-77.16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4296</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4296" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4296" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4296" ref_url="https://www.suse.com/security/cve/CVE-2013-4296" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000625.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1549-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1550-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00024.html" source="SUSE-SU"/>
    <description>
    The remoteDispatchDomainMemoryStats function in daemon/remote.c in libvirt 0.9.1 through 0.10.1.x, 0.10.2.x before 0.10.2.8, 1.0.x before 1.0.5.6, and 1.1.x before 1.1.2 allows remote authenticated users to cause a denial of service (uninitialized pointer dereference and crash) via a crafted RPC call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4296/">CVE-2013-4296</cve>
	<bugzilla href="https://bugzilla.suse.com/836931">SUSE bug 836931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/838638">SUSE bug 838638</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566133" comment="libvirt-0.9.6-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566134" comment="libvirt-client-0.9.6-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566135" comment="libvirt-client-32bit-0.9.6-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566136" comment="libvirt-doc-0.9.6-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566137" comment="libvirt-python-0.9.6-0.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591817" comment="libvirt-1.0.5.6-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591818" comment="libvirt-client-1.0.5.6-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591819" comment="libvirt-client-32bit-1.0.5.6-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591820" comment="libvirt-doc-1.0.5.6-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591821" comment="libvirt-python-1.0.5.6-0.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134298" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4298</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4298" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4298" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4298" ref_url="https://www.suse.com/security/cve/CVE-2013-4298" source="SUSE CVE"/>
    <description>
    The ReadGIFImage function in coders/gif.c in ImageMagick before 6.7.8-8 allows remote attackers to cause a denial of service (memory corruption and application crash) via a crafted comment in a GIF image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4298/">CVE-2013-4298</cve>
	<bugzilla href="https://bugzilla.suse.com/844157">SUSE bug 844157</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134299" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4299</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4299" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4299" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4299" ref_url="https://www.suse.com/security/cve/CVE-2013-4299" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html" source="SUSE-SU"/>
    <description>
    Interpretation conflict in drivers/md/dm-snap-persistent.c in the Linux kernel through 3.11.6 allows remote authenticated users to obtain sensitive information or modify data via a crafted mapping to a snapshot block device.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4299/">CVE-2013-4299</cve>
	<bugzilla href="https://bugzilla.suse.com/846404">SUSE bug 846404</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589697" comment="kernel-default-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589698" comment="kernel-default-base-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589699" comment="kernel-default-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589700" comment="kernel-default-extra-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589701" comment="kernel-source-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589702" comment="kernel-syms-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589703" comment="kernel-trace-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589704" comment="kernel-xen-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589705" comment="kernel-xen-base-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589706" comment="kernel-xen-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589707" comment="kernel-xen-extra-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589708" comment="xen-kmp-default-4.2.4_02_3.0.101_0.35-0.7.45 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134316" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4316</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4316" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4316" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4316" ref_url="https://www.suse.com/security/cve/CVE-2013-4316" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00012.html" source="SUSE-SU"/>
    <description>
    Apache Struts 2.0.0 through 2.3.15.1 enables Dynamic Method Invocation by default, which has unknown impact and attack vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4316/">CVE-2013-4316</cve>
	<bugzilla href="https://bugzilla.suse.com/858823">SUSE bug 858823</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591847" comment="libmysql55client18-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591848" comment="libmysql55client18-32bit-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591849" comment="libmysql55client_r18-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591850" comment="libmysql55client_r18-32bit-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591851" comment="libmysqlclient15-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591852" comment="libmysqlclient15-32bit-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591853" comment="libmysqlclient_r15-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591854" comment="libmysqlclient_r15-32bit-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591855" comment="mysql-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591856" comment="mysql-client-5.5.37-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134325" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4325</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4325" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4325" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4325" ref_url="https://www.suse.com/security/cve/CVE-2013-4325" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0188-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000717.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1617-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1620-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00000.html" source="SUSE-SU"/>
    <description>
    The check_permission_v1 function in base/pkit.py in HP Linux Imaging and Printing (HPLIP) through 3.13.9 does not properly use D-Bus for communication with a polkit authority, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4325/">CVE-2013-4325</cve>
	<bugzilla href="https://bugzilla.suse.com/808355">SUSE bug 808355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/836931">SUSE bug 836931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/836932">SUSE bug 836932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/836937">SUSE bug 836937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852368">SUSE bug 852368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864716">SUSE bug 864716</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566017" comment="hplip-3.11.10-0.6.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566018" comment="hplip-hpijs-3.11.10-0.6.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134329" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4329</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4329" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4329" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4329" ref_url="https://www.suse.com/security/cve/CVE-2013-4329" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
    <description>
    The xenlight library (libxl) in Xen 4.0.x through 4.2.x, when IOMMU is disabled, provides access to a busmastering-capable PCI passthrough device before the IOMMU setup is complete, which allows local HVM guest domains to gain privileges or cause a denial of service via a DMA instruction.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4329/">CVE-2013-4329</cve>
	<bugzilla href="https://bugzilla.suse.com/839618">SUSE bug 839618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566249" comment="xen-4.1.6_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566250" comment="xen-doc-html-4.1.6_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566251" comment="xen-doc-pdf-4.1.6_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566252" comment="xen-kmp-default-4.1.6_02_3.0.93_0.5-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566253" comment="xen-kmp-pae-4.1.6_02_3.0.93_0.5-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566254" comment="xen-kmp-trace-4.1.6_02_3.0.93_0.5-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566255" comment="xen-libs-4.1.6_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566256" comment="xen-libs-32bit-4.1.6_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566257" comment="xen-tools-4.1.6_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566258" comment="xen-tools-domU-4.1.6_02-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134332" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4332</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4332" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4332" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4332" ref_url="https://www.suse.com/security/cve/CVE-2013-4332" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1122-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1128-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1510-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00072.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in malloc/malloc.c in the GNU C Library (aka glibc or libc6) 2.18 and earlier allow context-dependent attackers to cause a denial of service (heap corruption) via a large value to the (1) pvalloc, (2) valloc, (3) posix_memalign, (4) memalign, or (5) aligned_alloc functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4332/">CVE-2013-4332</cve>
	<bugzilla href="https://bugzilla.suse.com/839870">SUSE bug 839870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882910">SUSE bug 882910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566000" comment="glibc-2.11.3-17.45.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566001" comment="glibc-32bit-2.11.3-17.45.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566002" comment="glibc-devel-2.11.3-17.45.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566003" comment="glibc-devel-32bit-2.11.3-17.45.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566004" comment="glibc-i18ndata-2.11.3-17.45.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566005" comment="glibc-locale-2.11.3-17.45.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566006" comment="glibc-locale-32bit-2.11.3-17.45.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566007" comment="nscd-2.11.3-17.45.49.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590138" comment="glibc-2.11.3-17.56.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590139" comment="glibc-32bit-2.11.3-17.56.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590140" comment="glibc-devel-2.11.3-17.56.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590141" comment="glibc-devel-32bit-2.11.3-17.56.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590142" comment="glibc-i18ndata-2.11.3-17.56.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590143" comment="glibc-locale-2.11.3-17.56.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590144" comment="glibc-locale-32bit-2.11.3-17.56.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590145" comment="nscd-2.11.3-17.56.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4342</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4342" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4342" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4342" ref_url="https://www.suse.com/security/cve/CVE-2013-4342" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-March/000774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000898.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0494-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0517-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00034.html" source="SUSE-SU"/>
    <description>
    xinetd does not enforce the user and group configuration directives for TCPMUX services, which causes these services to be run as root and makes it easier for remote attackers to gain privileges by leveraging another vulnerability in a service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4342/">CVE-2013-4342</cve>
	<bugzilla href="https://bugzilla.suse.com/844230">SUSE bug 844230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/855685">SUSE bug 855685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882917">SUSE bug 882917</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567271" comment="xinetd-2.3.14-130.133.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134343" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4343</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4343" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4343" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4343" ref_url="https://www.suse.com/security/cve/CVE-2013-4343" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005576.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in drivers/net/tun.c in the Linux kernel through 3.11.1 allows local users to gain privileges by leveraging the CAP_NET_ADMIN capability and providing an invalid tuntap interface name in a TUNSETIFF ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4343/">CVE-2013-4343</cve>
	<bugzilla href="https://bugzilla.suse.com/1135603">SUSE bug 1135603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839965">SUSE bug 839965</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134344" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4344</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4344" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4344" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4344" ref_url="https://www.suse.com/security/cve/CVE-2013-4344" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0623-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0200-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00003.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the SCSI implementation in QEMU, as used in Xen, when a SCSI controller has more than 256 attached devices, allows local users to gain privileges via a small transfer buffer in a REPORT LUNS command.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4344/">CVE-2013-4344</cve>
	<bugzilla href="https://bugzilla.suse.com/842006">SUSE bug 842006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880751">SUSE bug 880751</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591216" comment="kvm-1.4.2-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567234" comment="xen-4.2.4_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567235" comment="xen-doc-html-4.2.4_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567236" comment="xen-doc-pdf-4.2.4_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567237" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567238" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567239" comment="xen-libs-4.2.4_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567240" comment="xen-libs-32bit-4.2.4_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567241" comment="xen-tools-4.2.4_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567242" comment="xen-tools-domU-4.2.4_04-0.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4345</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4345" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4345" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4345" ref_url="https://www.suse.com/security/cve/CVE-2013-4345" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0766-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00013.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in the get_prng_bytes function in crypto/ansi_cprng.c in the Linux kernel through 3.11.4 makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms via multiple requests for small amounts of data, leading to improper management of the state of the consumed data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4345/">CVE-2013-4345</cve>
	<bugzilla href="https://bugzilla.suse.com/840226">SUSE bug 840226</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591274" comment="kernel-default-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591275" comment="kernel-default-base-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591276" comment="kernel-default-devel-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591277" comment="kernel-default-extra-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591278" comment="kernel-source-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591279" comment="kernel-syms-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591280" comment="kernel-trace-devel-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591281" comment="kernel-xen-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591282" comment="kernel-xen-base-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591283" comment="kernel-xen-devel-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591284" comment="kernel-xen-extra-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591285" comment="xen-kmp-default-4.2.3_08_3.0.101_0.15-0.7.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591868" comment="kernel-default-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591869" comment="kernel-default-base-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591870" comment="kernel-default-devel-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591871" comment="kernel-default-extra-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591872" comment="kernel-source-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591873" comment="kernel-syms-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591874" comment="kernel-trace-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591875" comment="kernel-trace-base-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591876" comment="kernel-trace-devel-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591877" comment="kernel-trace-extra-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591878" comment="kernel-xen-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591879" comment="kernel-xen-base-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591880" comment="kernel-xen-devel-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591881" comment="kernel-xen-extra-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591882" comment="xen-kmp-default-4.1.6_04_3.0.101_0.7.15-0.5.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591883" comment="xen-kmp-trace-4.1.6_04_3.0.101_0.7.15-0.5.12 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4349</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4349" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4349" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4349" ref_url="https://www.suse.com/security/cve/CVE-2013-4349" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1520-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1509-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1511-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00073.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-4540.  Reason: This candidate was MERGED into CVE-2012-4540, since it was later discovered that it affected an additional version, but it does not constitute a regression error.  Notes: All CVE users should reference CVE-2012-4540 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4349/">CVE-2013-4349</cve>
	<bugzilla href="https://bugzilla.suse.com/840572">SUSE bug 840572</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566019" comment="icedtea-web-1.4.1-0.8.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590204" comment="icedtea-web-1.4.1-0.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4351</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4351" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4351" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4351" ref_url="https://www.suse.com/security/cve/CVE-2013-4351" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000612.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1494-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1526-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1532-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00006.html" source="SUSE-SU"/>
    <description>
    GnuPG 1.4.x, 2.0.x, and 2.1.x treats a key flags subpacket with all bits cleared (no usage permitted) as if it has all bits set (all usage permitted), which might allow remote attackers to bypass intended cryptographic protection mechanisms by leveraging the subkey.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4351/">CVE-2013-4351</cve>
	<bugzilla href="https://bugzilla.suse.com/840510">SUSE bug 840510</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566011" comment="gpg2-2.0.9-25.33.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566012" comment="gpg2-lang-2.0.9-25.33.37.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4353</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4353" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4353" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4353" ref_url="https://www.suse.com/security/cve/CVE-2013-4353" source="SUSE CVE"/>
		<reference ref_id="TID7021300" ref_url="https://www.suse.com/support/kb/doc/?id=7021300" source="SUSE-SU"/>
		<reference ref_id="TID7021448" ref_url="https://www.suse.com/support/kb/doc/?id=7021448" source="SUSE-SU"/>
		<reference ref_id="TID7021676" ref_url="https://www.suse.com/support/kb/doc/?id=7021676" source="SUSE-SU"/>
		<reference ref_id="TID7021738" ref_url="https://www.suse.com/support/kb/doc/?id=7021738" source="SUSE-SU"/>
		<reference ref_id="TID7021992" ref_url="https://www.suse.com/support/kb/doc/?id=7021992" source="SUSE-SU"/>
		<reference ref_id="TID7022038" ref_url="https://www.suse.com/support/kb/doc/?id=7022038" source="SUSE-SU"/>
		<reference ref_id="TID7022768" ref_url="https://www.suse.com/support/kb/doc/?id=7022768" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0094-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0096-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00070.html" source="SUSE-SU"/>
    <description>
    The ssl3_take_mac function in ssl/s3_both.c in OpenSSL 1.0.1 before 1.0.1f allows remote TLS servers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Next Protocol Negotiation record in a TLS handshake.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4353/">CVE-2013-4353</cve>
	<bugzilla href="https://bugzilla.suse.com/857640">SUSE bug 857640</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334233" comment="compat-openssl097g is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4355</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4355" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4355" ref_url="https://www.suse.com/security/cve/CVE-2013-4355" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1636-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1953-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00115.html" source="SUSE-SU"/>
    <description>
    Xen 4.3.x and earlier does not properly handle certain errors, which allows local HVM guests to obtain hypervisor stack memory via a (1) port or (2) memory mapped I/O write or (3) other unspecified operations related to addresses without associated memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4355/">CVE-2013-4355</cve>
	<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566249" comment="xen-4.1.6_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566250" comment="xen-doc-html-4.1.6_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566251" comment="xen-doc-pdf-4.1.6_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566252" comment="xen-kmp-default-4.1.6_02_3.0.93_0.5-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566253" comment="xen-kmp-pae-4.1.6_02_3.0.93_0.5-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566254" comment="xen-kmp-trace-4.1.6_02_3.0.93_0.5-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566255" comment="xen-libs-4.1.6_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566256" comment="xen-libs-32bit-4.1.6_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566257" comment="xen-tools-4.1.6_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566258" comment="xen-tools-domU-4.1.6_02-0.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567207" comment="xen-4.2.3_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567208" comment="xen-doc-html-4.2.3_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567209" comment="xen-doc-pdf-4.2.3_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567210" comment="xen-kmp-default-4.2.3_02_3.0.93_0.8-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567211" comment="xen-kmp-pae-4.2.3_02_3.0.93_0.8-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567212" comment="xen-libs-4.2.3_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567213" comment="xen-libs-32bit-4.2.3_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567214" comment="xen-tools-4.2.3_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567215" comment="xen-tools-domU-4.2.3_02-0.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134357" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4357</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4357" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4357" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4357" ref_url="https://www.suse.com/security/cve/CVE-2013-4357" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1129-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001194.html" source="SUSE-SU"/>
    <description>
    The eglibc package before 2.14 incorrectly handled the getaddrinfo() function. An attacker could use this issue to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4357/">CVE-2013-4357</cve>
	<bugzilla href="https://bugzilla.suse.com/844309">SUSE bug 844309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883217">SUSE bug 883217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903057">SUSE bug 903057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591898" comment="glibc-2.11.3-17.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591899" comment="glibc-32bit-2.11.3-17.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591900" comment="glibc-devel-2.11.3-17.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591901" comment="glibc-devel-32bit-2.11.3-17.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591902" comment="glibc-i18ndata-2.11.3-17.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591903" comment="glibc-locale-2.11.3-17.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591904" comment="glibc-locale-32bit-2.11.3-17.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591905" comment="nscd-2.11.3-17.62.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134361" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4361</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4361" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4361" ref_url="https://www.suse.com/security/cve/CVE-2013-4361" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1636-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1953-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00115.html" source="SUSE-SU"/>
    <description>
    The fbld instruction emulation in Xen 3.3.x through 4.3.x does not use the correct variable for the source effective address, which allows local HVM guests to obtain hypervisor stack information by reading the values used by the instruction.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4361/">CVE-2013-4361</cve>
	<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/841766">SUSE bug 841766</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566249" comment="xen-4.1.6_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566250" comment="xen-doc-html-4.1.6_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566251" comment="xen-doc-pdf-4.1.6_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566252" comment="xen-kmp-default-4.1.6_02_3.0.93_0.5-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566253" comment="xen-kmp-pae-4.1.6_02_3.0.93_0.5-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566254" comment="xen-kmp-trace-4.1.6_02_3.0.93_0.5-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566255" comment="xen-libs-4.1.6_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566256" comment="xen-libs-32bit-4.1.6_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566257" comment="xen-tools-4.1.6_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566258" comment="xen-tools-domU-4.1.6_02-0.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567207" comment="xen-4.2.3_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567208" comment="xen-doc-html-4.2.3_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567209" comment="xen-doc-pdf-4.2.3_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567210" comment="xen-kmp-default-4.2.3_02_3.0.93_0.8-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567211" comment="xen-kmp-pae-4.2.3_02_3.0.93_0.8-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567212" comment="xen-libs-4.2.3_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567213" comment="xen-libs-32bit-4.2.3_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567214" comment="xen-tools-4.2.3_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567215" comment="xen-tools-domU-4.2.3_02-0.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4368</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4368" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4368" ref_url="https://www.suse.com/security/cve/CVE-2013-4368" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1636-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1953-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00115.html" source="SUSE-SU"/>
    <description>
    The outs instruction emulation in Xen 3.1.x, 4.2.x, 4.3.x, and earlier, when using FS: or GS: segment override, uses an uninitialized variable as a segment base, which allows local 64-bit PV guests to obtain sensitive information (hypervisor stack content) via unspecified vectors related to stale data in a segment register.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4368/">CVE-2013-4368</cve>
	<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/842511">SUSE bug 842511</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566249" comment="xen-4.1.6_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566250" comment="xen-doc-html-4.1.6_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566251" comment="xen-doc-pdf-4.1.6_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566252" comment="xen-kmp-default-4.1.6_02_3.0.93_0.5-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566253" comment="xen-kmp-pae-4.1.6_02_3.0.93_0.5-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566254" comment="xen-kmp-trace-4.1.6_02_3.0.93_0.5-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566255" comment="xen-libs-4.1.6_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566256" comment="xen-libs-32bit-4.1.6_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566257" comment="xen-tools-4.1.6_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566258" comment="xen-tools-domU-4.1.6_02-0.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567207" comment="xen-4.2.3_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567208" comment="xen-doc-html-4.2.3_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567209" comment="xen-doc-pdf-4.2.3_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567210" comment="xen-kmp-default-4.2.3_02_3.0.93_0.8-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567211" comment="xen-kmp-pae-4.2.3_02_3.0.93_0.8-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567212" comment="xen-libs-4.2.3_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567213" comment="xen-libs-32bit-4.2.3_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567214" comment="xen-tools-4.2.3_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567215" comment="xen-tools-domU-4.2.3_02-0.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134369" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4369</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4369" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4369" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4369" ref_url="https://www.suse.com/security/cve/CVE-2013-4369" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000651.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1953-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00115.html" source="SUSE-SU"/>
    <description>
    The xlu_vif_parse_rate function in the libxlu library in Xen 4.2.x and 4.3.x allows local users to cause a denial of service (NULL pointer dereference) by using the "@" character as the VIF rate configuration.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4369/">CVE-2013-4369</cve>
	<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/842512">SUSE bug 842512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567207" comment="xen-4.2.3_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567208" comment="xen-doc-html-4.2.3_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567209" comment="xen-doc-pdf-4.2.3_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567210" comment="xen-kmp-default-4.2.3_02_3.0.93_0.8-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567211" comment="xen-kmp-pae-4.2.3_02_3.0.93_0.8-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567212" comment="xen-libs-4.2.3_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567213" comment="xen-libs-32bit-4.2.3_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567214" comment="xen-tools-4.2.3_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567215" comment="xen-tools-domU-4.2.3_02-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4370</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4370" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4370" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4370" ref_url="https://www.suse.com/security/cve/CVE-2013-4370" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000651.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1953-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00115.html" source="SUSE-SU"/>
    <description>
    The ocaml binding for the xc_vcpu_getaffinity function in Xen 4.2.x and 4.3.x frees certain memory that may still be intended for use, which allows local users to cause a denial of service (heap corruption and crash) and possibly execute arbitrary code via unspecified vectors that trigger a (1) use-after-free or (2) double free.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4370/">CVE-2013-4370</cve>
	<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/842513">SUSE bug 842513</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567207" comment="xen-4.2.3_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567208" comment="xen-doc-html-4.2.3_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567209" comment="xen-doc-pdf-4.2.3_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567210" comment="xen-kmp-default-4.2.3_02_3.0.93_0.8-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567211" comment="xen-kmp-pae-4.2.3_02_3.0.93_0.8-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567212" comment="xen-libs-4.2.3_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567213" comment="xen-libs-32bit-4.2.3_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567214" comment="xen-tools-4.2.3_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567215" comment="xen-tools-domU-4.2.3_02-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4371</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4371" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4371" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4371" ref_url="https://www.suse.com/security/cve/CVE-2013-4371" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000651.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1953-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00115.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the libxl_list_cpupool function in the libxl toolstack library in Xen 4.2.x and 4.3.x, when running "under memory pressure," returns the original pointer when the realloc function fails, which allows local users to cause a denial of service (heap corruption and crash) and possibly execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4371/">CVE-2013-4371</cve>
	<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/842514">SUSE bug 842514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567207" comment="xen-4.2.3_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567208" comment="xen-doc-html-4.2.3_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567209" comment="xen-doc-pdf-4.2.3_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567210" comment="xen-kmp-default-4.2.3_02_3.0.93_0.8-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567211" comment="xen-kmp-pae-4.2.3_02_3.0.93_0.8-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567212" comment="xen-libs-4.2.3_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567213" comment="xen-libs-32bit-4.2.3_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567214" comment="xen-tools-4.2.3_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567215" comment="xen-tools-domU-4.2.3_02-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4375</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4375" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4375" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4375" ref_url="https://www.suse.com/security/cve/CVE-2013-4375" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000672.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1953-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00115.html" source="SUSE-SU"/>
    <description>
    The qdisk PV disk backend in qemu-xen in Xen 4.2.x and 4.3.x before 4.3.1, and qemu 1.1 and other versions, allows local HVM guests to cause a denial of service (domain grant reference consumption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4375/">CVE-2013-4375</cve>
	<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/842515">SUSE bug 842515</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567216" comment="xen-4.2.3_08-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567217" comment="xen-doc-html-4.2.3_08-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567218" comment="xen-doc-pdf-4.2.3_08-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567219" comment="xen-kmp-default-4.2.3_08_3.0.101_0.8-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567220" comment="xen-kmp-pae-4.2.3_08_3.0.101_0.8-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567221" comment="xen-libs-4.2.3_08-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567222" comment="xen-libs-32bit-4.2.3_08-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567223" comment="xen-tools-4.2.3_08-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567224" comment="xen-tools-domU-4.2.3_08-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134396" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4396</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4396" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4396" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4396" ref_url="https://www.suse.com/security/cve/CVE-2013-4396" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000844.html" source="SUSE-SU"/>
		<reference ref_id="TID7021434" ref_url="https://www.suse.com/support/kb/doc/?id=7021434" source="SUSE-SU"/>
		<reference ref_id="TID7021676" ref_url="https://www.suse.com/support/kb/doc/?id=7021676" source="SUSE-SU"/>
		<reference ref_id="TID7021738" ref_url="https://www.suse.com/support/kb/doc/?id=7021738" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1610-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1614-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00060.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the doImageText function in dix/dixfonts.c in the xorg-server module before 1.14.4 in X.Org X11 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted ImageText request that triggers memory-allocation failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4396/">CVE-2013-4396</cve>
	<bugzilla href="https://bugzilla.suse.com/843652">SUSE bug 843652</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591928" comment="xorg-x11-Xvnc-7.4-27.70.74.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591929" comment="xorg-x11-server-7.4-27.70.74.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591930" comment="xorg-x11-server-extra-7.4-27.70.74.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591931" comment="xorg-x11-Xvnc-7.4-27.83.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591932" comment="xorg-x11-server-7.4-27.83.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591933" comment="xorg-x11-server-extra-7.4-27.83.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4402</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4402" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4402" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4402" ref_url="https://www.suse.com/security/cve/CVE-2013-4402" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000611.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1546-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1552-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00025.html" source="SUSE-SU"/>
    <description>
    The compressed packet parser in GnuPG 1.4.x before 1.4.15 and 2.0.x before 2.0.22 allows remote attackers to cause a denial of service (infinite recursion) via a crafted OpenPGP message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4402/">CVE-2013-4402</cve>
	<bugzilla href="https://bugzilla.suse.com/844175">SUSE bug 844175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941439">SUSE bug 941439</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566011" comment="gpg2-2.0.9-25.33.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566012" comment="gpg2-lang-2.0.9-25.33.37.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4408</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4408" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4408" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4408" ref_url="https://www.suse.com/security/cve/CVE-2013-4408" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0024-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000831.html" source="SUSE-SU"/>
		<reference ref_id="TID7014420" ref_url="https://www.suse.com/support/kb/doc/?id=7014420" source="SUSE-SU"/>
		<reference ref_id="TID7016875" ref_url="https://www.suse.com/support/kb/doc/?id=7016875" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1921-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0405-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1106-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the dcerpc_read_ncacn_packet_done function in librpc/rpc/dcerpc_util.c in winbindd in Samba 3.x before 3.6.22, 4.0.x before 4.0.13, and 4.1.x before 4.1.3 allows remote AD domain controllers to execute arbitrary code via an invalid fragment length in a DCE-RPC packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4408/">CVE-2013-4408</cve>
	<bugzilla href="https://bugzilla.suse.com/844720">SUSE bug 844720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/848101">SUSE bug 848101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882906">SUSE bug 882906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565877" comment="libldb1-3.6.3-0.33.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565878" comment="libldb1-32bit-3.6.3-0.33.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565879" comment="libsmbclient0-3.6.3-0.33.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565880" comment="libsmbclient0-32bit-3.6.3-0.33.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565881" comment="libtalloc1-3.4.3-1.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565882" comment="libtalloc1-32bit-3.4.3-1.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565883" comment="libtalloc2-3.6.3-0.33.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565884" comment="libtalloc2-32bit-3.6.3-0.33.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565885" comment="libtdb1-3.6.3-0.33.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565886" comment="libtdb1-32bit-3.6.3-0.33.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565887" comment="libtevent0-3.6.3-0.33.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565888" comment="libtevent0-32bit-3.6.3-0.33.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565889" comment="libwbclient0-3.6.3-0.33.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565890" comment="libwbclient0-32bit-3.6.3-0.33.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565891" comment="samba-3.6.3-0.33.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565892" comment="samba-32bit-3.6.3-0.33.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565893" comment="samba-client-3.6.3-0.33.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565894" comment="samba-client-32bit-3.6.3-0.33.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565895" comment="samba-doc-3.6.3-0.33.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565896" comment="samba-krb-printing-3.6.3-0.33.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565897" comment="samba-winbind-3.6.3-0.33.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565898" comment="samba-winbind-32bit-3.6.3-0.33.39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590340" comment="libldb1-3.6.3-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590341" comment="libldb1-32bit-3.6.3-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590342" comment="libsmbclient0-3.6.3-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590343" comment="libsmbclient0-32bit-3.6.3-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590344" comment="libtalloc2-3.6.3-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590345" comment="libtalloc2-32bit-3.6.3-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590346" comment="libtdb1-3.6.3-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590347" comment="libtdb1-32bit-3.6.3-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590348" comment="libtevent0-3.6.3-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590349" comment="libtevent0-32bit-3.6.3-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590350" comment="libwbclient0-3.6.3-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590351" comment="libwbclient0-32bit-3.6.3-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590352" comment="samba-3.6.3-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590353" comment="samba-32bit-3.6.3-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590354" comment="samba-client-3.6.3-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590355" comment="samba-client-32bit-3.6.3-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590356" comment="samba-doc-3.6.3-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590357" comment="samba-krb-printing-3.6.3-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590358" comment="samba-winbind-3.6.3-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590359" comment="samba-winbind-32bit-3.6.3-0.46.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4416</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4416" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4416" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4416" ref_url="https://www.suse.com/security/cve/CVE-2013-4416" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000672.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1636-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1876-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1953-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00115.html" source="SUSE-SU"/>
    <description>
    The Ocaml xenstored implementation (oxenstored) in Xen 4.1.x, 4.2.x, and 4.3.x allows local guest domains to cause a denial of service (domain shutdown) via a large message reply.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4416/">CVE-2013-4416</cve>
	<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/845520">SUSE bug 845520</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566249" comment="xen-4.1.6_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566250" comment="xen-doc-html-4.1.6_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566251" comment="xen-doc-pdf-4.1.6_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566252" comment="xen-kmp-default-4.1.6_02_3.0.93_0.5-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566253" comment="xen-kmp-pae-4.1.6_02_3.0.93_0.5-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566254" comment="xen-kmp-trace-4.1.6_02_3.0.93_0.5-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566255" comment="xen-libs-4.1.6_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566256" comment="xen-libs-32bit-4.1.6_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566257" comment="xen-tools-4.1.6_02-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566258" comment="xen-tools-domU-4.1.6_02-0.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567216" comment="xen-4.2.3_08-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567217" comment="xen-doc-html-4.2.3_08-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567218" comment="xen-doc-pdf-4.2.3_08-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567219" comment="xen-kmp-default-4.2.3_08_3.0.101_0.8-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567220" comment="xen-kmp-pae-4.2.3_08_3.0.101_0.8-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567221" comment="xen-libs-4.2.3_08-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567222" comment="xen-libs-32bit-4.2.3_08-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567223" comment="xen-tools-4.2.3_08-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567224" comment="xen-tools-domU-4.2.3_08-0.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4449</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4449" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4449" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4449" ref_url="https://www.suse.com/security/cve/CVE-2013-4449" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001389.html" source="SUSE-SU"/>
    <description>
    The rwm overlay in OpenLDAP 2.4.23, 2.4.36, and earlier does not properly count references, which allows remote attackers to cause a denial of service (slapd crash) by unbinding immediately after a search request, which triggers rwm_conn_destroy to free the session context while it is being used by rwm_op_search.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4449/">CVE-2013-4449</cve>
	<bugzilla href="https://bugzilla.suse.com/846389">SUSE bug 846389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916897">SUSE bug 916897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916914">SUSE bug 916914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567007" comment="libldap-2_4-2-2.4.26-0.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567008" comment="libldap-2_4-2-32bit-2.4.26-0.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567009" comment="openldap2-client-2.4.26-0.30.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4458</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4458" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4458" ref_url="https://www.suse.com/security/cve/CVE-2013-4458" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in GNU C Library (aka glibc or libc6) 2.18 and earlier allows remote attackers to cause a denial of service (crash) via a (1) hostname or (2) IP address that triggers a large number of AF_INET6 address results.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1914.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4458/">CVE-2013-4458</cve>
	<bugzilla href="https://bugzilla.suse.com/847227">SUSE bug 847227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883217">SUSE bug 883217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941444">SUSE bug 941444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955181">SUSE bug 955181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967023">SUSE bug 967023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980483">SUSE bug 980483</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591898" comment="glibc-2.11.3-17.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591899" comment="glibc-32bit-2.11.3-17.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591900" comment="glibc-devel-2.11.3-17.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591901" comment="glibc-devel-32bit-2.11.3-17.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591902" comment="glibc-i18ndata-2.11.3-17.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591903" comment="glibc-locale-2.11.3-17.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591904" comment="glibc-locale-32bit-2.11.3-17.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591905" comment="nscd-2.11.3-17.62.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4470</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4470" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4470" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4470" ref_url="https://www.suse.com/security/cve/CVE-2013-4470" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0531-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0537-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000880.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0766-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00013.html" source="SUSE-SU"/>
    <description>
    The Linux kernel before 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not properly initialize certain data structures, which allows local users to cause a denial of service (memory corruption and system crash) or possibly gain privileges via a crafted application that uses the UDP_CORK option in a setsockopt system call and sends both short and long packets, related to the ip_ufo_append_data function in net/ipv4/ip_output.c and the ip6_ufo_append_data function in net/ipv6/ip6_output.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4470/">CVE-2013-4470</cve>
	<bugzilla href="https://bugzilla.suse.com/847672">SUSE bug 847672</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591945" comment="kernel-default-3.0.101-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591946" comment="kernel-default-base-3.0.101-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591947" comment="kernel-default-devel-3.0.101-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591948" comment="kernel-default-extra-3.0.101-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591949" comment="kernel-source-3.0.101-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591950" comment="kernel-syms-3.0.101-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591951" comment="kernel-trace-devel-3.0.101-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591952" comment="kernel-xen-3.0.101-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591953" comment="kernel-xen-base-3.0.101-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591954" comment="kernel-xen-devel-3.0.101-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591955" comment="kernel-xen-extra-3.0.101-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591956" comment="xen-kmp-default-4.2.4_02_3.0.101_0.21-0.7.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4475</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4475" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4475" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4475" ref_url="https://www.suse.com/security/cve/CVE-2013-4475" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0024-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000886.html" source="SUSE-SU"/>
		<reference ref_id="TID7014420" ref_url="https://www.suse.com/support/kb/doc/?id=7014420" source="SUSE-SU"/>
		<reference ref_id="TID7016875" ref_url="https://www.suse.com/support/kb/doc/?id=7016875" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1742-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1787-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00115.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1790-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00117.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1921-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00088.html" source="SUSE-SU"/>
    <description>
    Samba 3.2.x through 3.6.x before 3.6.20, 4.0.x before 4.0.11, and 4.1.x before 4.1.1, when vfs_streams_depot or vfs_streams_xattr is enabled, allows remote attackers to bypass intended file restrictions by leveraging ACL differences between a file and an associated alternate data stream (ADS).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4475/">CVE-2013-4475</cve>
	<bugzilla href="https://bugzilla.suse.com/848101">SUSE bug 848101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880220">SUSE bug 880220</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565877" comment="libldb1-3.6.3-0.33.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565878" comment="libldb1-32bit-3.6.3-0.33.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565879" comment="libsmbclient0-3.6.3-0.33.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565880" comment="libsmbclient0-32bit-3.6.3-0.33.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565881" comment="libtalloc1-3.4.3-1.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565882" comment="libtalloc1-32bit-3.4.3-1.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565883" comment="libtalloc2-3.6.3-0.33.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565884" comment="libtalloc2-32bit-3.6.3-0.33.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565885" comment="libtdb1-3.6.3-0.33.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565886" comment="libtdb1-32bit-3.6.3-0.33.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565887" comment="libtevent0-3.6.3-0.33.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565888" comment="libtevent0-32bit-3.6.3-0.33.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565889" comment="libwbclient0-3.6.3-0.33.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565890" comment="libwbclient0-32bit-3.6.3-0.33.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565891" comment="samba-3.6.3-0.33.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565892" comment="samba-32bit-3.6.3-0.33.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565893" comment="samba-client-3.6.3-0.33.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565894" comment="samba-client-32bit-3.6.3-0.33.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565895" comment="samba-doc-3.6.3-0.33.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565896" comment="samba-krb-printing-3.6.3-0.33.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565897" comment="samba-winbind-3.6.3-0.33.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565898" comment="samba-winbind-32bit-3.6.3-0.33.39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590340" comment="libldb1-3.6.3-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590341" comment="libldb1-32bit-3.6.3-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590342" comment="libsmbclient0-3.6.3-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590343" comment="libsmbclient0-32bit-3.6.3-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590344" comment="libtalloc2-3.6.3-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590345" comment="libtalloc2-32bit-3.6.3-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590346" comment="libtdb1-3.6.3-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590347" comment="libtdb1-32bit-3.6.3-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590348" comment="libtevent0-3.6.3-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590349" comment="libtevent0-32bit-3.6.3-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590350" comment="libwbclient0-3.6.3-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590351" comment="libwbclient0-32bit-3.6.3-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590352" comment="samba-3.6.3-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590353" comment="samba-32bit-3.6.3-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590354" comment="samba-client-3.6.3-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590355" comment="samba-client-32bit-3.6.3-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590356" comment="samba-doc-3.6.3-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590357" comment="samba-krb-printing-3.6.3-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590358" comment="samba-winbind-3.6.3-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590359" comment="samba-winbind-32bit-3.6.3-0.46.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4483</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4483" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4483" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4483" ref_url="https://www.suse.com/security/cve/CVE-2013-4483" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000880.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00045.html" source="SUSE-SU"/>
    <description>
    The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4483/">CVE-2013-4483</cve>
	<bugzilla href="https://bugzilla.suse.com/848321">SUSE bug 848321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591274" comment="kernel-default-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591275" comment="kernel-default-base-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591276" comment="kernel-default-devel-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591277" comment="kernel-default-extra-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591278" comment="kernel-source-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591279" comment="kernel-syms-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591280" comment="kernel-trace-devel-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591281" comment="kernel-xen-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591282" comment="kernel-xen-base-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591283" comment="kernel-xen-devel-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591284" comment="kernel-xen-extra-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591285" comment="xen-kmp-default-4.2.3_08_3.0.101_0.15-0.7.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591868" comment="kernel-default-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591869" comment="kernel-default-base-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591870" comment="kernel-default-devel-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591871" comment="kernel-default-extra-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591872" comment="kernel-source-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591873" comment="kernel-syms-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591874" comment="kernel-trace-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591875" comment="kernel-trace-base-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591876" comment="kernel-trace-devel-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591877" comment="kernel-trace-extra-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591878" comment="kernel-xen-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591879" comment="kernel-xen-base-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591880" comment="kernel-xen-devel-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591881" comment="kernel-xen-extra-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591882" comment="xen-kmp-default-4.1.6_04_3.0.101_0.7.15-0.5.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591883" comment="xen-kmp-trace-4.1.6_04_3.0.101_0.7.15-0.5.12 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4494</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4494" ref_url="https://www.suse.com/security/cve/CVE-2013-4494" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1876-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0483-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00010.html" source="SUSE-SU"/>
    <description>
    Xen before 4.1.x, 4.2.x, and 4.3.x does not take the page_alloc_lock and grant_table.lock in the same order, which allows local guest administrators with access to multiple vcpus to cause a denial of service (host deadlock) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4494/">CVE-2013-4494</cve>
	<bugzilla href="https://bugzilla.suse.com/848657">SUSE bug 848657</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566259" comment="xen-4.1.6_04-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566260" comment="xen-doc-html-4.1.6_04-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566261" comment="xen-doc-pdf-4.1.6_04-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566262" comment="xen-kmp-default-4.1.6_04_3.0.101_0.5-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566263" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.5-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566264" comment="xen-kmp-trace-4.1.6_04_3.0.101_0.5-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566265" comment="xen-libs-4.1.6_04-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566266" comment="xen-libs-32bit-4.1.6_04-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566267" comment="xen-tools-4.1.6_04-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566268" comment="xen-tools-domU-4.1.6_04-0.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567216" comment="xen-4.2.3_08-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567217" comment="xen-doc-html-4.2.3_08-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567218" comment="xen-doc-pdf-4.2.3_08-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567219" comment="xen-kmp-default-4.2.3_08_3.0.101_0.8-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567220" comment="xen-kmp-pae-4.2.3_08_3.0.101_0.8-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567221" comment="xen-libs-4.2.3_08-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567222" comment="xen-libs-32bit-4.2.3_08-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567223" comment="xen-tools-4.2.3_08-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567224" comment="xen-tools-domU-4.2.3_08-0.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134496" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4496</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4496" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4496" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4496" ref_url="https://www.suse.com/security/cve/CVE-2013-4496" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000917.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0404-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0405-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1106-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" source="SUSE-SU"/>
    <description>
    Samba 3.x before 3.6.23, 4.0.x before 4.0.16, and 4.1.x before 4.1.6 does not enforce the password-guessing protection mechanism for all interfaces, which makes it easier for remote attackers to obtain access via brute-force ChangePasswordUser2 (1) SAMR or (2) RAP attempts.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4496/">CVE-2013-4496</cve>
	<bugzilla href="https://bugzilla.suse.com/849224">SUSE bug 849224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866844">SUSE bug 866844</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592009" comment="libldb1-3.6.3-0.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592010" comment="libldb1-32bit-3.6.3-0.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592011" comment="libsmbclient0-3.6.3-0.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592012" comment="libsmbclient0-32bit-3.6.3-0.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592013" comment="libtalloc2-3.6.3-0.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592014" comment="libtalloc2-32bit-3.6.3-0.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592015" comment="libtdb1-3.6.3-0.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592016" comment="libtdb1-32bit-3.6.3-0.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592017" comment="libtevent0-3.6.3-0.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592018" comment="libtevent0-32bit-3.6.3-0.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592019" comment="libwbclient0-3.6.3-0.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592020" comment="libwbclient0-32bit-3.6.3-0.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592021" comment="samba-3.6.3-0.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592022" comment="samba-32bit-3.6.3-0.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592023" comment="samba-client-3.6.3-0.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592024" comment="samba-client-32bit-3.6.3-0.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592025" comment="samba-doc-3.6.3-0.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592026" comment="samba-krb-printing-3.6.3-0.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592027" comment="samba-winbind-3.6.3-0.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592028" comment="samba-winbind-32bit-3.6.3-0.50.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4511</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4511" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4511" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4511" ref_url="https://www.suse.com/security/cve/CVE-2013-4511" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0204-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0205-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0766-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00013.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in Alchemy LCD frame-buffer drivers in the Linux kernel before 3.12 allow local users to create a read-write memory mapping for the entirety of kernel memory, and consequently gain privileges, via crafted mmap operations, related to the (1) au1100fb_fb_mmap function in drivers/video/au1100fb.c and the (2) au1200fb_fb_mmap function in drivers/video/au1200fb.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4511/">CVE-2013-4511</cve>
	<bugzilla href="https://bugzilla.suse.com/849021">SUSE bug 849021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/850263">SUSE bug 850263</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591274" comment="kernel-default-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591275" comment="kernel-default-base-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591276" comment="kernel-default-devel-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591277" comment="kernel-default-extra-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591278" comment="kernel-source-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591279" comment="kernel-syms-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591280" comment="kernel-trace-devel-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591281" comment="kernel-xen-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591282" comment="kernel-xen-base-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591283" comment="kernel-xen-devel-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591284" comment="kernel-xen-extra-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591285" comment="xen-kmp-default-4.2.3_08_3.0.101_0.15-0.7.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591868" comment="kernel-default-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591869" comment="kernel-default-base-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591870" comment="kernel-default-devel-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591871" comment="kernel-default-extra-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591872" comment="kernel-source-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591873" comment="kernel-syms-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591874" comment="kernel-trace-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591875" comment="kernel-trace-base-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591876" comment="kernel-trace-devel-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591877" comment="kernel-trace-extra-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591878" comment="kernel-xen-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591879" comment="kernel-xen-base-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591880" comment="kernel-xen-devel-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591881" comment="kernel-xen-extra-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591882" comment="xen-kmp-default-4.1.6_04_3.0.101_0.7.15-0.5.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591883" comment="xen-kmp-trace-4.1.6_04_3.0.101_0.7.15-0.5.12 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134514" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4514</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4514" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4514" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4514" ref_url="https://www.suse.com/security/cve/CVE-2013-4514" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000716.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0204-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00045.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in drivers/staging/wlags49_h2/wl_priv.c in the Linux kernel before 3.12 allow local users to cause a denial of service or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability and providing a long station-name string, related to the (1) wvlan_uil_put_info and (2) wvlan_set_station_nickname functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4514/">CVE-2013-4514</cve>
	<bugzilla href="https://bugzilla.suse.com/849029">SUSE bug 849029</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591274" comment="kernel-default-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591275" comment="kernel-default-base-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591276" comment="kernel-default-devel-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591277" comment="kernel-default-extra-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591278" comment="kernel-source-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591279" comment="kernel-syms-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591280" comment="kernel-trace-devel-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591281" comment="kernel-xen-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591282" comment="kernel-xen-base-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591283" comment="kernel-xen-devel-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591284" comment="kernel-xen-extra-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591285" comment="xen-kmp-default-4.2.3_08_3.0.101_0.15-0.7.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591868" comment="kernel-default-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591869" comment="kernel-default-base-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591870" comment="kernel-default-devel-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591871" comment="kernel-default-extra-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591872" comment="kernel-source-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591873" comment="kernel-syms-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591874" comment="kernel-trace-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591875" comment="kernel-trace-base-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591876" comment="kernel-trace-devel-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591877" comment="kernel-trace-extra-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591878" comment="kernel-xen-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591879" comment="kernel-xen-base-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591880" comment="kernel-xen-devel-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591881" comment="kernel-xen-extra-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591882" comment="xen-kmp-default-4.1.6_04_3.0.101_0.7.15-0.5.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591883" comment="xen-kmp-trace-4.1.6_04_3.0.101_0.7.15-0.5.12 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4515</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4515" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4515" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4515" ref_url="https://www.suse.com/security/cve/CVE-2013-4515" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000716.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0204-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00045.html" source="SUSE-SU"/>
    <description>
    The bcm_char_ioctl function in drivers/staging/bcm/Bcmchar.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory via an IOCTL_BCM_GET_DEVICE_DRIVER_INFO ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4515/">CVE-2013-4515</cve>
	<bugzilla href="https://bugzilla.suse.com/849034">SUSE bug 849034</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591274" comment="kernel-default-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591275" comment="kernel-default-base-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591276" comment="kernel-default-devel-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591277" comment="kernel-default-extra-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591278" comment="kernel-source-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591279" comment="kernel-syms-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591280" comment="kernel-trace-devel-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591281" comment="kernel-xen-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591282" comment="kernel-xen-base-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591283" comment="kernel-xen-devel-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591284" comment="kernel-xen-extra-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591285" comment="xen-kmp-default-4.2.3_08_3.0.101_0.15-0.7.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591868" comment="kernel-default-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591869" comment="kernel-default-base-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591870" comment="kernel-default-devel-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591871" comment="kernel-default-extra-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591872" comment="kernel-source-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591873" comment="kernel-syms-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591874" comment="kernel-trace-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591875" comment="kernel-trace-base-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591876" comment="kernel-trace-devel-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591877" comment="kernel-trace-extra-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591878" comment="kernel-xen-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591879" comment="kernel-xen-base-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591880" comment="kernel-xen-devel-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591881" comment="kernel-xen-extra-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591882" comment="xen-kmp-default-4.1.6_04_3.0.101_0.7.15-0.5.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591883" comment="xen-kmp-trace-4.1.6_04_3.0.101_0.7.15-0.5.12 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4527</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4527" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4527" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4527" ref_url="https://www.suse.com/security/cve/CVE-2013-4527" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in hw/timer/hpet.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via vectors related to the number of timers.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4527/">CVE-2013-4527</cve>
	<bugzilla href="https://bugzilla.suse.com/864673">SUSE bug 864673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964746">SUSE bug 964746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567467" comment="xen-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567468" comment="xen-doc-html-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567469" comment="xen-kmp-default-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567470" comment="xen-kmp-pae-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567471" comment="xen-libs-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567472" comment="xen-libs-32bit-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567473" comment="xen-tools-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567474" comment="xen-tools-domU-4.4.4_02-32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4529</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4529" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4529" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4529" ref_url="https://www.suse.com/security/cve/CVE-2013-4529" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in hw/pci/pcie_aer.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a large log_num value in a savevm image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4529/">CVE-2013-4529</cve>
	<bugzilla href="https://bugzilla.suse.com/864678">SUSE bug 864678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964929">SUSE bug 964929</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567467" comment="xen-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567468" comment="xen-doc-html-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567469" comment="xen-kmp-default-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567470" comment="xen-kmp-pae-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567471" comment="xen-libs-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567472" comment="xen-libs-32bit-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567473" comment="xen-tools-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567474" comment="xen-tools-domU-4.4.4_02-32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4530</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4530" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4530" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4530" ref_url="https://www.suse.com/security/cve/CVE-2013-4530" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in hw/ssi/pl022.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service or possibly execute arbitrary code via crafted tx_fifo_head and rx_fifo_head values in a savevm image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4530/">CVE-2013-4530</cve>
	<bugzilla href="https://bugzilla.suse.com/864682">SUSE bug 864682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964950">SUSE bug 964950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567467" comment="xen-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567468" comment="xen-doc-html-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567469" comment="xen-kmp-default-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567470" comment="xen-kmp-pae-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567471" comment="xen-libs-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567472" comment="xen-libs-32bit-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567473" comment="xen-tools-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567474" comment="xen-tools-domU-4.4.4_02-32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4533</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4533" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4533" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4533" ref_url="https://www.suse.com/security/cve/CVE-2013-4533" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the pxa2xx_ssp_load function in hw/arm/pxa2xx.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service or possibly execute arbitrary code via a crafted s-&gt;rx_level value in a savevm image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4533/">CVE-2013-4533</cve>
	<bugzilla href="https://bugzilla.suse.com/864655">SUSE bug 864655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964644">SUSE bug 964644</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567467" comment="xen-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567468" comment="xen-doc-html-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567469" comment="xen-kmp-default-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567470" comment="xen-kmp-pae-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567471" comment="xen-libs-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567472" comment="xen-libs-32bit-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567473" comment="xen-tools-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567474" comment="xen-tools-domU-4.4.4_02-32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4534</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4534" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4534" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4534" ref_url="https://www.suse.com/security/cve/CVE-2013-4534" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in hw/intc/openpic.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service or possibly execute arbitrary code via vectors related to IRQDest elements.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4534/">CVE-2013-4534</cve>
	<bugzilla href="https://bugzilla.suse.com/864811">SUSE bug 864811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964452">SUSE bug 964452</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567467" comment="xen-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567468" comment="xen-doc-html-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567469" comment="xen-kmp-default-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567470" comment="xen-kmp-pae-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567471" comment="xen-libs-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567472" comment="xen-libs-32bit-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567473" comment="xen-tools-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567474" comment="xen-tools-domU-4.4.4_02-32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4537</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4537" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4537" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4537" ref_url="https://www.suse.com/security/cve/CVE-2013-4537" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
    <description>
    The ssi_sd_transfer function in hw/sd/ssi-sd.c in QEMU before 1.7.2 allows remote attackers to execute arbitrary code via a crafted arglen value in a savevm image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4537/">CVE-2013-4537</cve>
	<bugzilla href="https://bugzilla.suse.com/864391">SUSE bug 864391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962642">SUSE bug 962642</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567467" comment="xen-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567468" comment="xen-doc-html-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567469" comment="xen-kmp-default-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567470" comment="xen-kmp-pae-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567471" comment="xen-libs-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567472" comment="xen-libs-32bit-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567473" comment="xen-tools-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567474" comment="xen-tools-domU-4.4.4_02-32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4538</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4538" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4538" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4538" ref_url="https://www.suse.com/security/cve/CVE-2013-4538" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in the ssd0323_load function in hw/display/ssd0323.c in QEMU before 1.7.2 allow remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via crafted (1) cmd_len, (2) row, or (3) col values; (4) row_start and row_end values; or (5) col_star and col_end values in a savevm image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4538/">CVE-2013-4538</cve>
	<bugzilla href="https://bugzilla.suse.com/864769">SUSE bug 864769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962335">SUSE bug 962335</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567467" comment="xen-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567468" comment="xen-doc-html-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567469" comment="xen-kmp-default-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567470" comment="xen-kmp-pae-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567471" comment="xen-libs-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567472" comment="xen-libs-32bit-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567473" comment="xen-tools-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567474" comment="xen-tools-domU-4.4.4_02-32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4539</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4539" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4539" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4539" ref_url="https://www.suse.com/security/cve/CVE-2013-4539" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in the tsc210x_load function in hw/input/tsc210x.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a crafted (1) precision, (2) nextprecision, (3) function, or (4) nextfunction value in a savevm image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4539/">CVE-2013-4539</cve>
	<bugzilla href="https://bugzilla.suse.com/864805">SUSE bug 864805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962758">SUSE bug 962758</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567467" comment="xen-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567468" comment="xen-doc-html-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567469" comment="xen-kmp-default-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567470" comment="xen-kmp-pae-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567471" comment="xen-libs-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567472" comment="xen-libs-32bit-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567473" comment="xen-tools-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567474" comment="xen-tools-domU-4.4.4_02-32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4540</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4540" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4540" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4540" ref_url="https://www.suse.com/security/cve/CVE-2013-4540" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00003.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in scoop_gpio_handler_update in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a large (1) prev_level, (2) gpio_level, or (3) gpio_dir value in a savevm image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4540/">CVE-2013-4540</cve>
	<bugzilla href="https://bugzilla.suse.com/864801">SUSE bug 864801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880751">SUSE bug 880751</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567234" comment="xen-4.2.4_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567235" comment="xen-doc-html-4.2.4_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567236" comment="xen-doc-pdf-4.2.4_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567237" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567238" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567239" comment="xen-libs-4.2.4_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567240" comment="xen-libs-32bit-4.2.4_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567241" comment="xen-tools-4.2.4_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567242" comment="xen-tools-domU-4.2.4_04-0.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4541</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4541" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4541" ref_url="https://www.suse.com/security/cve/CVE-2013-4541" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0623-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00002.html" source="SUSE-SU"/>
    <description>
    The usb_device_post_load function in hw/usb/bus.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a crafted savevm image, related to a negative setup_len or setup_index value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4541/">CVE-2013-4541</cve>
	<bugzilla href="https://bugzilla.suse.com/864802">SUSE bug 864802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591216" comment="kvm-1.4.2-0.11.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4545</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4545" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4545" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4545" ref_url="https://www.suse.com/security/cve/CVE-2013-4545" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000678.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1859-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1865-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00053.html" source="SUSE-SU"/>
    <description>
    cURL and libcurl 7.18.0 through 7.32.0, when built with OpenSSL, disables the certificate CN and SAN name field verification (CURLOPT_SSL_VERIFYHOST) when the digital signature verification (CURLOPT_SSL_VERIFYPEER) is disabled, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4545/">CVE-2013-4545</cve>
	<bugzilla href="https://bugzilla.suse.com/849596">SUSE bug 849596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870444">SUSE bug 870444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880252">SUSE bug 880252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882520">SUSE bug 882520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924250">SUSE bug 924250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592089" comment="curl-7.19.7-1.20.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592090" comment="libcurl4-7.19.7-1.20.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592091" comment="libcurl4-32bit-7.19.7-1.20.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592092" comment="curl-7.19.7-1.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592093" comment="libcurl4-7.19.7-1.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592094" comment="libcurl4-32bit-7.19.7-1.30.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4549</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4549" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4549" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4549" ref_url="https://www.suse.com/security/cve/CVE-2013-4549" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000731.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0067-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0070-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0125-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0176-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00106.html" source="SUSE-SU"/>
    <description>
    QXmlSimpleReader in Qt before 5.2 allows context-dependent attackers to cause a denial of service (memory consumption) via an XML Entity Expansion (XEE) attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4549/">CVE-2013-4549</cve>
	<bugzilla href="https://bugzilla.suse.com/1039291">SUSE bug 1039291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/856832">SUSE bug 856832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566789" comment="libQtWebKit4-4.6.3-5.29.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566790" comment="libQtWebKit4-32bit-4.6.3-5.29.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566791" comment="libqt4-4.6.3-5.29.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566792" comment="libqt4-32bit-4.6.3-5.29.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566793" comment="libqt4-qt3support-4.6.3-5.29.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566794" comment="libqt4-qt3support-32bit-4.6.3-5.29.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566795" comment="libqt4-sql-4.6.3-5.29.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566796" comment="libqt4-sql-32bit-4.6.3-5.29.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566797" comment="libqt4-sql-mysql-4.6.3-5.29.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566798" comment="libqt4-sql-mysql-32bit-4.6.3-5.29.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566799" comment="libqt4-sql-postgresql-4.6.3-5.29.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566800" comment="libqt4-sql-postgresql-32bit-4.6.3-5.29.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566801" comment="libqt4-sql-sqlite-4.6.3-5.29.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566802" comment="libqt4-sql-sqlite-32bit-4.6.3-5.29.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566803" comment="libqt4-sql-unixODBC-4.6.3-5.29.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566804" comment="libqt4-sql-unixODBC-32bit-4.6.3-5.29.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566805" comment="libqt4-x11-4.6.3-5.29.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566806" comment="libqt4-x11-32bit-4.6.3-5.29.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4551</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4551" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4551" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4551" ref_url="https://www.suse.com/security/cve/CVE-2013-4551" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000672.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1876-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0483-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00010.html" source="SUSE-SU"/>
    <description>
    Xen 4.2.x and 4.3.x, when nested virtualization is disabled, does not properly check the emulation paths for (1) VMLAUNCH and (2) VMRESUME, which allows local HVM guest users to cause a denial of service (host crash) via unspecified vectors related to "guest VMX instruction execution."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4551/">CVE-2013-4551</cve>
	<bugzilla href="https://bugzilla.suse.com/848657">SUSE bug 848657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849665">SUSE bug 849665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567216" comment="xen-4.2.3_08-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567217" comment="xen-doc-html-4.2.3_08-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567218" comment="xen-doc-pdf-4.2.3_08-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567219" comment="xen-kmp-default-4.2.3_08_3.0.101_0.8-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567220" comment="xen-kmp-pae-4.2.3_08_3.0.101_0.8-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567221" comment="xen-libs-4.2.3_08-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567222" comment="xen-libs-32bit-4.2.3_08-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567223" comment="xen-tools-4.2.3_08-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567224" comment="xen-tools-domU-4.2.3_08-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4553</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4553" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4553" ref_url="https://www.suse.com/security/cve/CVE-2013-4553" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0372-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1876-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0482-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0483-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00010.html" source="SUSE-SU"/>
    <description>
    The XEN_DOMCTL_getmemlist hypercall in Xen 3.4.x through 4.3.x (possibly 4.3.1) does not always obtain the page_alloc_lock and mm_rwlock in the same order, which allows local guest administrators to cause a denial of service (host deadlock).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4553/">CVE-2013-4553</cve>
	<bugzilla href="https://bugzilla.suse.com/848657">SUSE bug 848657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849667">SUSE bug 849667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849668">SUSE bug 849668</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567216" comment="xen-4.2.3_08-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567217" comment="xen-doc-html-4.2.3_08-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567218" comment="xen-doc-pdf-4.2.3_08-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567219" comment="xen-kmp-default-4.2.3_08_3.0.101_0.8-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567220" comment="xen-kmp-pae-4.2.3_08_3.0.101_0.8-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567221" comment="xen-libs-4.2.3_08-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567222" comment="xen-libs-32bit-4.2.3_08-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567223" comment="xen-tools-4.2.3_08-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567224" comment="xen-tools-domU-4.2.3_08-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4554</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4554" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4554" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4554" ref_url="https://www.suse.com/security/cve/CVE-2013-4554" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0372-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1876-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0482-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0483-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00010.html" source="SUSE-SU"/>
    <description>
    Xen 3.0.3 through 4.1.x (possibly 4.1.6.1), 4.2.x (possibly 4.2.3), and 4.3.x (possibly 4.3.1) does not properly prevent access to hypercalls, which allows local guest users to gain privileges via a crafted application running in ring 1 or 2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4554/">CVE-2013-4554</cve>
	<bugzilla href="https://bugzilla.suse.com/848657">SUSE bug 848657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849668">SUSE bug 849668</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567216" comment="xen-4.2.3_08-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567217" comment="xen-doc-html-4.2.3_08-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567218" comment="xen-doc-pdf-4.2.3_08-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567219" comment="xen-kmp-default-4.2.3_08_3.0.101_0.8-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567220" comment="xen-kmp-pae-4.2.3_08_3.0.101_0.8-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567221" comment="xen-libs-4.2.3_08-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567222" comment="xen-libs-32bit-4.2.3_08-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567223" comment="xen-tools-4.2.3_08-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567224" comment="xen-tools-domU-4.2.3_08-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134579" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4579</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4579" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4579" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4579" ref_url="https://www.suse.com/security/cve/CVE-2013-4579" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0766-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00013.html" source="SUSE-SU"/>
    <description>
    The ath9k_htc_set_bssid_mask function in drivers/net/wireless/ath/ath9k/htc_drv_main.c in the Linux kernel through 3.12 uses a BSSID masking approach to determine the set of MAC addresses on which a Wi-Fi device is listening, which allows remote attackers to discover the original MAC address after spoofing by sending a series of packets to MAC addresses with certain bit manipulations.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4579/">CVE-2013-4579</cve>
	<bugzilla href="https://bugzilla.suse.com/851426">SUSE bug 851426</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566375" comment="compat-wireless-kmp-default-3.13_3.0.101_0.31-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566376" comment="compat-wireless-kmp-pae-3.13_3.0.101_0.31-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566377" comment="compat-wireless-kmp-xen-3.13_3.0.101_0.31-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589697" comment="kernel-default-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589698" comment="kernel-default-base-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589699" comment="kernel-default-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589700" comment="kernel-default-extra-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589701" comment="kernel-source-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589702" comment="kernel-syms-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589703" comment="kernel-trace-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589704" comment="kernel-xen-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589705" comment="kernel-xen-base-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589706" comment="kernel-xen-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589707" comment="kernel-xen-extra-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589708" comment="xen-kmp-default-4.2.4_02_3.0.101_0.35-0.7.45 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4587</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4587" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4587" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4587" ref_url="https://www.suse.com/security/cve/CVE-2013-4587" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0204-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0205-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00045.html" source="SUSE-SU"/>
    <description>
    Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4587/">CVE-2013-4587</cve>
	<bugzilla href="https://bugzilla.suse.com/853050">SUSE bug 853050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882914">SUSE bug 882914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591274" comment="kernel-default-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591275" comment="kernel-default-base-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591276" comment="kernel-default-devel-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591277" comment="kernel-default-extra-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591278" comment="kernel-source-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591279" comment="kernel-syms-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591280" comment="kernel-trace-devel-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591281" comment="kernel-xen-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591282" comment="kernel-xen-base-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591283" comment="kernel-xen-devel-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591284" comment="kernel-xen-extra-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591285" comment="xen-kmp-default-4.2.3_08_3.0.101_0.15-0.7.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591868" comment="kernel-default-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591869" comment="kernel-default-base-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591870" comment="kernel-default-devel-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591871" comment="kernel-default-extra-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591872" comment="kernel-source-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591873" comment="kernel-syms-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591874" comment="kernel-trace-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591875" comment="kernel-trace-base-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591876" comment="kernel-trace-devel-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591877" comment="kernel-trace-extra-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591878" comment="kernel-xen-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591879" comment="kernel-xen-base-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591880" comment="kernel-xen-devel-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591881" comment="kernel-xen-extra-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591882" comment="xen-kmp-default-4.1.6_04_3.0.101_0.7.15-0.5.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591883" comment="xen-kmp-trace-4.1.6_04_3.0.101_0.7.15-0.5.12 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4592</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4592" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4592" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4592" ref_url="https://www.suse.com/security/cve/CVE-2013-4592" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000716.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00045.html" source="SUSE-SU"/>
    <description>
    Memory leak in the __kvm_set_memory_region function in virt/kvm/kvm_main.c in the Linux kernel before 3.9 allows local users to cause a denial of service (memory consumption) by leveraging certain device access to trigger movement of memory slots.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4592/">CVE-2013-4592</cve>
	<bugzilla href="https://bugzilla.suse.com/851101">SUSE bug 851101</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591274" comment="kernel-default-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591275" comment="kernel-default-base-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591276" comment="kernel-default-devel-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591277" comment="kernel-default-extra-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591278" comment="kernel-source-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591279" comment="kernel-syms-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591280" comment="kernel-trace-devel-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591281" comment="kernel-xen-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591282" comment="kernel-xen-base-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591283" comment="kernel-xen-devel-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591284" comment="kernel-xen-extra-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591285" comment="xen-kmp-default-4.2.3_08_3.0.101_0.15-0.7.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591868" comment="kernel-default-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591869" comment="kernel-default-base-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591870" comment="kernel-default-devel-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591871" comment="kernel-default-extra-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591872" comment="kernel-source-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591873" comment="kernel-syms-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591874" comment="kernel-trace-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591875" comment="kernel-trace-base-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591876" comment="kernel-trace-devel-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591877" comment="kernel-trace-extra-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591878" comment="kernel-xen-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591879" comment="kernel-xen-base-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591880" comment="kernel-xen-devel-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591881" comment="kernel-xen-extra-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591882" comment="xen-kmp-default-4.1.6_04_3.0.101_0.7.15-0.5.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591883" comment="xen-kmp-trace-4.1.6_04_3.0.101_0.7.15-0.5.12 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4761</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4761" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4761" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4761" ref_url="https://www.suse.com/security/cve/CVE-2013-4761" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-01/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00009.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Puppet 2.7.x before 2.7.23 and 3.2.x before 3.2.4, and Puppet Enterprise 2.8.x before 2.8.3 and 3.0.x before 3.0.1, allows remote attackers to execute arbitrary Ruby programs from the master via the resource_type service.  NOTE: this vulnerability can only be exploited utilizing unspecified "local file system access" to the Puppet Master.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4761/">CVE-2013-4761</cve>
	<bugzilla href="https://bugzilla.suse.com/835122">SUSE bug 835122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/836962">SUSE bug 836962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880224">SUSE bug 880224</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566176" comment="puppet-2.6.18-0.12.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592111" comment="puppet-2.6.18-0.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4788</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4788" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4788" ref_url="https://www.suse.com/security/cve/CVE-2013-4788" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1122-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00013.html" source="SUSE-SU"/>
    <description>
    The PTR_MANGLE implementation in the GNU C Library (aka glibc or libc6) 2.4, 2.17, and earlier, and Embedded GLIBC (EGLIBC) does not initialize the random value for the pointer guard, which makes it easier for context-dependent attackers to control execution flow by leveraging a buffer-overflow vulnerability in an application and using the known zero value pointer guard to calculate a pointer address.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4788/">CVE-2013-4788</cve>
	<bugzilla href="https://bugzilla.suse.com/830268">SUSE bug 830268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882910">SUSE bug 882910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950944">SUSE bug 950944</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566000" comment="glibc-2.11.3-17.45.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566001" comment="glibc-32bit-2.11.3-17.45.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566002" comment="glibc-devel-2.11.3-17.45.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566003" comment="glibc-devel-32bit-2.11.3-17.45.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566004" comment="glibc-i18ndata-2.11.3-17.45.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566005" comment="glibc-locale-2.11.3-17.45.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566006" comment="glibc-locale-32bit-2.11.3-17.45.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566007" comment="nscd-2.11.3-17.45.49.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590138" comment="glibc-2.11.3-17.56.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590139" comment="glibc-32bit-2.11.3-17.56.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590140" comment="glibc-devel-2.11.3-17.56.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590141" comment="glibc-devel-32bit-2.11.3-17.56.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590142" comment="glibc-i18ndata-2.11.3-17.56.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590143" comment="glibc-locale-2.11.3-17.56.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590144" comment="glibc-locale-32bit-2.11.3-17.56.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590145" comment="nscd-2.11.3-17.56.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134854" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4854</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4854" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4854" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4854" ref_url="https://www.suse.com/security/cve/CVE-2013-4854" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1310-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1353-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1354-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00018.html" source="SUSE-SU"/>
    <description>
    The RFC 5011 implementation in rdata.c in ISC BIND 9.7.x and 9.8.x before 9.8.5-P2, 9.8.6b1, 9.9.x before 9.9.3-P2, and 9.9.4b1, and DNSco BIND 9.9.3-S1 before 9.9.3-S1-P1 and 9.9.4-S1b1, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query with a malformed RDATA section that is not properly handled during construction of a log message, as exploited in the wild in July 2013.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4854/">CVE-2013-4854</cve>
	<bugzilla href="https://bugzilla.suse.com/831899">SUSE bug 831899</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592114" comment="bind-libs-9.9.3P2-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592115" comment="bind-libs-32bit-9.9.3P2-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592116" comment="bind-utils-9.9.3P2-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4929</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4929" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4929" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4929" ref_url="https://www.suse.com/security/cve/CVE-2013-4929" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-September/000592.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1295-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1300-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00009.html" source="SUSE-SU"/>
    <description>
    The parseFields function in epan/dissectors/packet-dis-pdus.c in the DIS dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not terminate packet-data processing after finding zero remaining bytes, which allows remote attackers to cause a denial of service (loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4929/">CVE-2013-4929</cve>
	<bugzilla href="https://bugzilla.suse.com/831718">SUSE bug 831718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592124" comment="wireshark-1.8.9-0.2.5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4930</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4930" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4930" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4930" ref_url="https://www.suse.com/security/cve/CVE-2013-4930" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-September/000592.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1295-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1300-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00009.html" source="SUSE-SU"/>
    <description>
    The dissect_dvbci_tpdu_hdr function in epan/dissectors/packet-dvbci.c in the DVB-CI dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not validate a certain length value before decrementing it, which allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4930/">CVE-2013-4930</cve>
	<bugzilla href="https://bugzilla.suse.com/831718">SUSE bug 831718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592124" comment="wireshark-1.8.9-0.2.5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4931</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4931" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4931" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4931" ref_url="https://www.suse.com/security/cve/CVE-2013-4931" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-September/000592.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1295-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1300-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00009.html" source="SUSE-SU"/>
    <description>
    epan/proto.c in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (loop) via a crafted packet that is not properly handled by the GSM RR dissector.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4931/">CVE-2013-4931</cve>
	<bugzilla href="https://bugzilla.suse.com/831718">SUSE bug 831718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592124" comment="wireshark-1.8.9-0.2.5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4932</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4932" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4932" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4932" ref_url="https://www.suse.com/security/cve/CVE-2013-4932" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-September/000592.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1295-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1300-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00009.html" source="SUSE-SU"/>
    <description>
    Multiple array index errors in epan/dissectors/packet-gsm_a_common.c in the GSM A Common dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allow remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4932/">CVE-2013-4932</cve>
	<bugzilla href="https://bugzilla.suse.com/831718">SUSE bug 831718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592124" comment="wireshark-1.8.9-0.2.5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4933</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4933" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4933" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4933" ref_url="https://www.suse.com/security/cve/CVE-2013-4933" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-September/000592.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1295-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1300-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00009.html" source="SUSE-SU"/>
    <description>
    The netmon_open function in wiretap/netmon.c in the Netmon file parser in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not properly allocate memory, which allows remote attackers to cause a denial of service (application crash) via a crafted packet-trace file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4933/">CVE-2013-4933</cve>
	<bugzilla href="https://bugzilla.suse.com/831718">SUSE bug 831718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592124" comment="wireshark-1.8.9-0.2.5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4934</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4934" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4934" ref_url="https://www.suse.com/security/cve/CVE-2013-4934" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-September/000592.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1295-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1300-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00009.html" source="SUSE-SU"/>
    <description>
    The netmon_open function in wiretap/netmon.c in the Netmon file parser in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not initialize certain structure members, which allows remote attackers to cause a denial of service (application crash) via a crafted packet-trace file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4934/">CVE-2013-4934</cve>
	<bugzilla href="https://bugzilla.suse.com/831718">SUSE bug 831718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592124" comment="wireshark-1.8.9-0.2.5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4935</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4935" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4935" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4935" ref_url="https://www.suse.com/security/cve/CVE-2013-4935" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-September/000592.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1295-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1300-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00009.html" source="SUSE-SU"/>
    <description>
    The dissect_per_length_determinant function in epan/dissectors/packet-per.c in the ASN.1 PER dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not initialize a length field in certain abnormal situations, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4935/">CVE-2013-4935</cve>
	<bugzilla href="https://bugzilla.suse.com/831718">SUSE bug 831718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592124" comment="wireshark-1.8.9-0.2.5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4969</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4969" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4969" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4969" ref_url="https://www.suse.com/security/cve/CVE-2013-4969" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000903.html" source="SUSE-SU"/>
    <description>
    Puppet before 3.3.3 and 3.4 before 3.4.1 and Puppet Enterprise (PE) before 2.8.4 and 3.1 before 3.1.1 allows local users to overwrite arbitrary files via a symlink attack on unspecified files.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4969/">CVE-2013-4969</cve>
	<bugzilla href="https://bugzilla.suse.com/856843">SUSE bug 856843</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567060" comment="puppet-2.6.18-0.16.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5018</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5018" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5018" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5018" ref_url="https://www.suse.com/security/cve/CVE-2013-5018" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1866-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1866-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000675.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1332-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1333-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1372-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00050.html" source="SUSE-SU"/>
    <description>
    The is_asn1 function in strongSwan 4.1.11 through 5.0.4 does not properly validate the return value of the asn1_length function, which allows remote attackers to cause a denial of service (segmentation fault) via a (1) XAuth username, (2) EAP identity, or (3) PEM encoded file that starts with a 0x04, 0x30, or 0x31 character followed by an ASN.1 length value that triggers an integer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5018/">CVE-2013-5018</cve>
	<bugzilla href="https://bugzilla.suse.com/833278">SUSE bug 833278</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566186" comment="strongswan-4.4.0-6.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566187" comment="strongswan-doc-4.4.0-6.21.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5211</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5211" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5211" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5211" ref_url="https://www.suse.com/security/cve/CVE-2013-5211" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2014:001" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000934.html" source="SUSE-SU"/>
		<reference ref_id="TID7014543" ref_url="https://www.suse.com/support/kb/doc?id=7014543" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0949-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1149-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00031.html" source="SUSE-SU"/>
    <description>
    The monlist feature in ntp_request.c in ntpd in NTP before 4.2.7p26 allows remote attackers to cause a denial of service (traffic amplification) via forged (1) REQ_MON_GETLIST or (2) REQ_MON_GETLIST_1 requests, as exploited in the wild in December 2013.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5211/">CVE-2013-5211</cve>
	<bugzilla href="https://bugzilla.suse.com/857195">SUSE bug 857195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889447">SUSE bug 889447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592127" comment="ntp-4.2.4p8-1.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592128" comment="ntp-doc-4.2.4p8-1.24.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135324" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5324</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5324" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5324" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5324" ref_url="https://www.suse.com/security/cve/CVE-2013-5324" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1456-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1459-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00040.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 11.7.700.242 and 11.8.x before 11.8.800.168 on Windows and Mac OS X, before 11.2.202.310 on Linux, before 11.1.111.73 on Android 2.x and 3.x, and before 11.1.115.81 on Android 4.x; Adobe AIR before 3.8.0.1430; and Adobe AIR SDK &amp; Compiler before 3.8.0.1430 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-3361, CVE-2013-3362, and CVE-2013-3363.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5324/">CVE-2013-5324</cve>
	<bugzilla href="https://bugzilla.suse.com/839897">SUSE bug 839897</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591519" comment="flash-player-11.2.202.310-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591520" comment="flash-player-gnome-11.2.202.310-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591521" comment="flash-player-kde4-11.2.202.310-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135329" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5329</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5329" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5329" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5329" ref_url="https://www.suse.com/security/cve/CVE-2013-5329" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1717-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1737-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00019.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 11.7.700.252 and 11.8.x and 11.9.x before 11.9.900.152 on Windows and Mac OS X and before 11.2.202.327 on Linux, Adobe AIR before 3.9.0.1210, Adobe AIR SDK before 3.9.0.1210, and Adobe AIR SDK &amp; Compiler before 3.9.0.1210 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-5330.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5329/">CVE-2013-5329</cve>
	<bugzilla href="https://bugzilla.suse.com/850220">SUSE bug 850220</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592131" comment="flash-player-11.2.202.327-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592132" comment="flash-player-gnome-11.2.202.327-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592133" comment="flash-player-kde4-11.2.202.327-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135330" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5330</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5330" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5330" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5330" ref_url="https://www.suse.com/security/cve/CVE-2013-5330" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1717-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1737-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00019.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 11.7.700.252 and 11.8.x and 11.9.x before 11.9.900.152 on Windows and Mac OS X and before 11.2.202.327 on Linux, Adobe AIR before 3.9.0.1210, Adobe AIR SDK before 3.9.0.1210, and Adobe AIR SDK &amp; Compiler before 3.9.0.1210 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-5329.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5330/">CVE-2013-5330</cve>
	<bugzilla href="https://bugzilla.suse.com/850220">SUSE bug 850220</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592131" comment="flash-player-11.2.202.327-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592132" comment="flash-player-gnome-11.2.202.327-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592133" comment="flash-player-kde4-11.2.202.327-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135331" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5331</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5331" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5331" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5331" ref_url="https://www.suse.com/security/cve/CVE-2013-5331" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1898-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00084.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 11.7.700.257 and 11.8.x and 11.9.x before 11.9.900.170 on Windows and Mac OS X and before 11.2.202.332 on Linux, Adobe AIR before 3.9.0.1380, Adobe AIR SDK before 3.9.0.1380, and Adobe AIR SDK &amp; Compiler before 3.9.0.1380 allow remote attackers to execute arbitrary code via crafted .swf content that leverages an unspecified "type confusion," as exploited in the wild in December 2013.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5331/">CVE-2013-5331</cve>
	<bugzilla href="https://bugzilla.suse.com/854881">SUSE bug 854881</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592134" comment="flash-player-11.2.202.332-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592135" comment="flash-player-gnome-11.2.202.332-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592136" comment="flash-player-kde4-11.2.202.332-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135332" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5332</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5332" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5332" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5332" ref_url="https://www.suse.com/security/cve/CVE-2013-5332" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1898-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00084.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 11.7.700.257 and 11.8.x and 11.9.x before 11.9.900.170 on Windows and Mac OS X and before 11.2.202.332 on Linux, Adobe AIR before 3.9.0.1380, Adobe AIR SDK before 3.9.0.1380, and Adobe AIR SDK &amp; Compiler before 3.9.0.1380 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5332/">CVE-2013-5332</cve>
	<bugzilla href="https://bugzilla.suse.com/854881">SUSE bug 854881</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592134" comment="flash-player-11.2.202.332-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592135" comment="flash-player-gnome-11.2.202.332-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592136" comment="flash-player-kde4-11.2.202.332-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5605</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5605" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5605" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5605" ref_url="https://www.suse.com/security/cve/CVE-2013-5605" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1730-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1732-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00080.html" source="SUSE-SU"/>
    <description>
    Mozilla Network Security Services (NSS) 3.14 before 3.14.5 and 3.15 before 3.15.3 allows remote attackers to cause a denial of service or possibly have unspecified other impact via invalid handshake packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5605/">CVE-2013-5605</cve>
	<bugzilla href="https://bugzilla.suse.com/850148">SUSE bug 850148</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566155" comment="libfreebl3-3.15.3-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566156" comment="libfreebl3-32bit-3.15.3-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566157" comment="mozilla-nspr-4.10.2-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566158" comment="mozilla-nspr-32bit-4.10.2-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566159" comment="mozilla-nss-3.15.3-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566160" comment="mozilla-nss-32bit-3.15.3-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566161" comment="mozilla-nss-tools-3.15.3-0.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566997" comment="libfreebl3-3.15.3-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566998" comment="libfreebl3-32bit-3.15.3-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566999" comment="libsoftokn3-3.15.3-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567000" comment="libsoftokn3-32bit-3.15.3-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566157" comment="mozilla-nspr-4.10.2-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566158" comment="mozilla-nspr-32bit-4.10.2-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567001" comment="mozilla-nss-3.15.3-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567002" comment="mozilla-nss-32bit-3.15.3-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567003" comment="mozilla-nss-tools-3.15.3-0.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135606" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5606</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5606" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5606" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5606" ref_url="https://www.suse.com/security/cve/CVE-2013-5606" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1732-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00080.html" source="SUSE-SU"/>
    <description>
    The CERT_VerifyCert function in lib/certhigh/certvfy.c in Mozilla Network Security Services (NSS) 3.15 before 3.15.3 provides an unexpected return value for an incompatible key-usage certificate when the CERTVerifyLog argument is valid, which might allow remote attackers to bypass intended access restrictions via a crafted certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5606/">CVE-2013-5606</cve>
	<bugzilla href="https://bugzilla.suse.com/850148">SUSE bug 850148</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566155" comment="libfreebl3-3.15.3-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566156" comment="libfreebl3-32bit-3.15.3-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566157" comment="mozilla-nspr-4.10.2-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566158" comment="mozilla-nspr-32bit-4.10.2-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566159" comment="mozilla-nss-3.15.3-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566160" comment="mozilla-nss-32bit-3.15.3-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566161" comment="mozilla-nss-tools-3.15.3-0.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566997" comment="libfreebl3-3.15.3-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566998" comment="libfreebl3-32bit-3.15.3-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566999" comment="libsoftokn3-3.15.3-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567000" comment="libsoftokn3-32bit-3.15.3-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566157" comment="mozilla-nspr-4.10.2-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566158" comment="mozilla-nspr-32bit-4.10.2-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567001" comment="mozilla-nss-3.15.3-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567002" comment="mozilla-nss-32bit-3.15.3-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567003" comment="mozilla-nss-tools-3.15.3-0.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5607</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5607" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5607" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5607" ref_url="https://www.suse.com/security/cve/CVE-2013-5607" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1732-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00080.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the PL_ArenaAllocate function in Mozilla Netscape Portable Runtime (NSPR) before 4.10.2, as used in Firefox before 25.0.1, Firefox ESR 17.x before 17.0.11 and 24.x before 24.1.1, and SeaMonkey before 2.22.1, allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted X.509 certificate, a related issue to CVE-2013-1741.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5607/">CVE-2013-5607</cve>
	<bugzilla href="https://bugzilla.suse.com/850148">SUSE bug 850148</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566155" comment="libfreebl3-3.15.3-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566156" comment="libfreebl3-32bit-3.15.3-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566157" comment="mozilla-nspr-4.10.2-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566158" comment="mozilla-nspr-32bit-4.10.2-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566159" comment="mozilla-nss-3.15.3-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566160" comment="mozilla-nss-32bit-3.15.3-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566161" comment="mozilla-nss-tools-3.15.3-0.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566997" comment="libfreebl3-3.15.3-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566998" comment="libfreebl3-32bit-3.15.3-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566999" comment="libsoftokn3-3.15.3-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567000" comment="libsoftokn3-32bit-3.15.3-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566157" comment="mozilla-nspr-4.10.2-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566158" comment="mozilla-nspr-32bit-4.10.2-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567001" comment="mozilla-nss-3.15.3-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567002" comment="mozilla-nss-32bit-3.15.3-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567003" comment="mozilla-nss-tools-3.15.3-0.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5609</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5609" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5609" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5609" ref_url="https://www.suse.com/security/cve/CVE-2013-5609" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1919-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1916-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1917-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1918-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1957-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00119.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1958-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1959-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0008-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5609/">CVE-2013-5609</cve>
	<bugzilla href="https://bugzilla.suse.com/854370">SUSE bug 854370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566500" comment="MozillaFirefox-24.2.0esr-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566501" comment="MozillaFirefox-branding-SLED-24-0.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566502" comment="MozillaFirefox-translations-24.2.0esr-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566503" comment="libfreebl3-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566504" comment="libfreebl3-32bit-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566505" comment="libsoftokn3-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566506" comment="libsoftokn3-32bit-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566507" comment="mozilla-nss-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566508" comment="mozilla-nss-32bit-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566509" comment="mozilla-nss-tools-3.15.3.1-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5610</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5610" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5610" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5610" ref_url="https://www.suse.com/security/cve/CVE-2013-5610" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1919-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1916-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1917-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1918-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1957-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00119.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1958-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1959-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0008-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 26.0 and SeaMonkey before 2.23 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5610/">CVE-2013-5610</cve>
	<bugzilla href="https://bugzilla.suse.com/854370">SUSE bug 854370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566500" comment="MozillaFirefox-24.2.0esr-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566501" comment="MozillaFirefox-branding-SLED-24-0.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566502" comment="MozillaFirefox-translations-24.2.0esr-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566503" comment="libfreebl3-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566504" comment="libfreebl3-32bit-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566505" comment="libsoftokn3-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566506" comment="libsoftokn3-32bit-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566507" comment="mozilla-nss-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566508" comment="mozilla-nss-32bit-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566509" comment="mozilla-nss-tools-3.15.3.1-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5611</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5611" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5611" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5611" ref_url="https://www.suse.com/security/cve/CVE-2013-5611" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1919-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1916-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1917-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1918-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0008-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 26.0 does not properly remove the Application Installation doorhanger, which makes it easier for remote attackers to spoof a Web App installation site by controlling the timing of page navigation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5611/">CVE-2013-5611</cve>
	<bugzilla href="https://bugzilla.suse.com/854370">SUSE bug 854370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566500" comment="MozillaFirefox-24.2.0esr-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566501" comment="MozillaFirefox-branding-SLED-24-0.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566502" comment="MozillaFirefox-translations-24.2.0esr-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566503" comment="libfreebl3-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566504" comment="libfreebl3-32bit-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566505" comment="libsoftokn3-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566506" comment="libsoftokn3-32bit-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566507" comment="mozilla-nss-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566508" comment="mozilla-nss-32bit-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566509" comment="mozilla-nss-tools-3.15.3.1-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5612</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5612" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5612" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5612" ref_url="https://www.suse.com/security/cve/CVE-2013-5612" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1919-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1916-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1917-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1918-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0008-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 26.0 and SeaMonkey before 2.23 makes it easier for remote attackers to inject arbitrary web script or HTML by leveraging a Same Origin Policy violation triggered by lack of a charset parameter in a Content-Type HTTP header.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5612/">CVE-2013-5612</cve>
	<bugzilla href="https://bugzilla.suse.com/854370">SUSE bug 854370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566500" comment="MozillaFirefox-24.2.0esr-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566501" comment="MozillaFirefox-branding-SLED-24-0.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566502" comment="MozillaFirefox-translations-24.2.0esr-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566503" comment="libfreebl3-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566504" comment="libfreebl3-32bit-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566505" comment="libsoftokn3-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566506" comment="libsoftokn3-32bit-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566507" comment="mozilla-nss-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566508" comment="mozilla-nss-32bit-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566509" comment="mozilla-nss-tools-3.15.3.1-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5613</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5613" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5613" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5613" ref_url="https://www.suse.com/security/cve/CVE-2013-5613" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1919-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1916-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1917-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1918-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1957-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00119.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1958-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1959-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0008-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the PresShell::DispatchSynthMouseMove function in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving synthetic mouse movement, related to the RestyleManager::GetHoverGeneration function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5613/">CVE-2013-5613</cve>
	<bugzilla href="https://bugzilla.suse.com/854370">SUSE bug 854370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566500" comment="MozillaFirefox-24.2.0esr-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566501" comment="MozillaFirefox-branding-SLED-24-0.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566502" comment="MozillaFirefox-translations-24.2.0esr-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566503" comment="libfreebl3-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566504" comment="libfreebl3-32bit-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566505" comment="libsoftokn3-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566506" comment="libsoftokn3-32bit-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566507" comment="mozilla-nss-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566508" comment="mozilla-nss-32bit-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566509" comment="mozilla-nss-tools-3.15.3.1-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5614</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5614" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5614" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5614" ref_url="https://www.suse.com/security/cve/CVE-2013-5614" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1919-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1916-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1917-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1918-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0008-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 26.0 and SeaMonkey before 2.23 do not properly consider the sandbox attribute of an IFRAME element during processing of a contained OBJECT element, which allows remote attackers to bypass intended sandbox restrictions via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5614/">CVE-2013-5614</cve>
	<bugzilla href="https://bugzilla.suse.com/854370">SUSE bug 854370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566500" comment="MozillaFirefox-24.2.0esr-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566501" comment="MozillaFirefox-branding-SLED-24-0.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566502" comment="MozillaFirefox-translations-24.2.0esr-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566503" comment="libfreebl3-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566504" comment="libfreebl3-32bit-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566505" comment="libsoftokn3-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566506" comment="libsoftokn3-32bit-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566507" comment="mozilla-nss-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566508" comment="mozilla-nss-32bit-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566509" comment="mozilla-nss-tools-3.15.3.1-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5615</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5615" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5615" ref_url="https://www.suse.com/security/cve/CVE-2013-5615" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1919-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1916-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1917-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1918-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1957-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00119.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1958-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1959-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0008-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The JavaScript implementation in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 does not properly enforce certain typeset restrictions on the generation of GetElementIC typed array stubs, which has unspecified impact and remote attack vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5615/">CVE-2013-5615</cve>
	<bugzilla href="https://bugzilla.suse.com/854370">SUSE bug 854370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566500" comment="MozillaFirefox-24.2.0esr-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566501" comment="MozillaFirefox-branding-SLED-24-0.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566502" comment="MozillaFirefox-translations-24.2.0esr-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566503" comment="libfreebl3-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566504" comment="libfreebl3-32bit-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566505" comment="libsoftokn3-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566506" comment="libsoftokn3-32bit-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566507" comment="mozilla-nss-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566508" comment="mozilla-nss-32bit-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566509" comment="mozilla-nss-tools-3.15.3.1-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5616</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5616" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5616" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5616" ref_url="https://www.suse.com/security/cve/CVE-2013-5616" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1919-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1916-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1917-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1918-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1957-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00119.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1958-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1959-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0008-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsEventListenerManager::HandleEventSubType function in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors related to mListeners event listeners.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5616/">CVE-2013-5616</cve>
	<bugzilla href="https://bugzilla.suse.com/854370">SUSE bug 854370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566500" comment="MozillaFirefox-24.2.0esr-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566501" comment="MozillaFirefox-branding-SLED-24-0.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566502" comment="MozillaFirefox-translations-24.2.0esr-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566503" comment="libfreebl3-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566504" comment="libfreebl3-32bit-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566505" comment="libsoftokn3-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566506" comment="libsoftokn3-32bit-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566507" comment="mozilla-nss-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566508" comment="mozilla-nss-32bit-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566509" comment="mozilla-nss-tools-3.15.3.1-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5618</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5618" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5618" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5618" ref_url="https://www.suse.com/security/cve/CVE-2013-5618" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1919-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1916-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1917-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1918-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1957-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00119.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1958-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1959-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0008-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsNodeUtils::LastRelease function in the table-editing user interface in the editor component in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code by triggering improper garbage collection.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5618/">CVE-2013-5618</cve>
	<bugzilla href="https://bugzilla.suse.com/854370">SUSE bug 854370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566500" comment="MozillaFirefox-24.2.0esr-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566501" comment="MozillaFirefox-branding-SLED-24-0.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566502" comment="MozillaFirefox-translations-24.2.0esr-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566503" comment="libfreebl3-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566504" comment="libfreebl3-32bit-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566505" comment="libsoftokn3-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566506" comment="libsoftokn3-32bit-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566507" comment="mozilla-nss-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566508" comment="mozilla-nss-32bit-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566509" comment="mozilla-nss-tools-3.15.3.1-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5619</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5619" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5619" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5619" ref_url="https://www.suse.com/security/cve/CVE-2013-5619" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1919-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1916-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1917-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1918-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0008-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the binary-search implementation in SpiderMonkey in Mozilla Firefox before 26.0 and SeaMonkey before 2.23 might allow remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted JavaScript code.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5619/">CVE-2013-5619</cve>
	<bugzilla href="https://bugzilla.suse.com/854370">SUSE bug 854370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566500" comment="MozillaFirefox-24.2.0esr-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566501" comment="MozillaFirefox-branding-SLED-24-0.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566502" comment="MozillaFirefox-translations-24.2.0esr-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566503" comment="libfreebl3-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566504" comment="libfreebl3-32bit-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566505" comment="libsoftokn3-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566506" comment="libsoftokn3-32bit-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566507" comment="mozilla-nss-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566508" comment="mozilla-nss-32bit-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566509" comment="mozilla-nss-tools-3.15.3.1-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5651</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5651" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5651" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5651" ref_url="https://www.suse.com/security/cve/CVE-2013-5651" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000625.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1550-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00024.html" source="SUSE-SU"/>
    <description>
    The virBitmapParse function in util/virbitmap.c in libvirt before 1.1.2 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via a crafted bitmap, as demonstrated by a large nodeset value to numatune.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5651/">CVE-2013-5651</cve>
	<bugzilla href="https://bugzilla.suse.com/837999">SUSE bug 837999</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591817" comment="libvirt-1.0.5.6-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591818" comment="libvirt-client-1.0.5.6-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591819" comment="libvirt-client-32bit-1.0.5.6-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591820" comment="libvirt-doc-1.0.5.6-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591821" comment="libvirt-python-1.0.5.6-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5745</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5745" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5745" ref_url="https://www.suse.com/security/cve/CVE-2013-5745" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1631-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1631-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00004.html" source="SUSE-SU"/>
    <description>
    The vino_server_client_data_pending function in vino-server.c in GNOME Vino 2.26.1, 2.32.1, 3.7.3, and earlier, and 3.8 when encryption is disabled, does not properly clear client data when an error causes the connection to close during authentication, which allows remote attackers to cause a denial of service (infinite loop, CPU and disk consumption) via multiple crafted requests during authentication.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5745/">CVE-2013-5745</cve>
	<bugzilla href="https://bugzilla.suse.com/843174">SUSE bug 843174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880231">SUSE bug 880231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880271">SUSE bug 880271</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566191" comment="vino-2.28.1-2.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566192" comment="vino-lang-2.28.1-2.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5772</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5772" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5772" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5772" ref_url="https://www.suse.com/security/cve/CVE-2013-5772" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java SE component in Oracle Java SE Java SE 7u40 and earlier and Java SE 6u60 and earlier allows remote attackers to affect integrity via unknown vectors related to jhat.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5772/">CVE-2013-5772</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566027" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566028" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566029" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591540" comment="java-1_7_0-openjdk-1.7.0.6-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591541" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591542" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5774</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5774" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5774" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5774" ref_url="https://www.suse.com/security/cve/CVE-2013-5774" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, 6u60 and earlier, 5.0u51 and earlier, and Embedded 7u40 and earlier allows remote attackers to affect integrity via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5774/">CVE-2013-5774</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566027" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566028" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566029" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591540" comment="java-1_7_0-openjdk-1.7.0.6-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591541" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591542" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5778</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5778" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5778" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5778" ref_url="https://www.suse.com/security/cve/CVE-2013-5778" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, 6u60 and earlier, 5.0u51 and earlier, and Embedded 7u40 and earlier allows remote attackers to affect confidentiality via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5778/">CVE-2013-5778</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566027" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566028" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566029" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591540" comment="java-1_7_0-openjdk-1.7.0.6-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591541" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591542" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135780" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5780</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5780" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5780" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5780" ref_url="https://www.suse.com/security/cve/CVE-2013-5780" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5780/">CVE-2013-5780</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566027" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566028" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566029" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591540" comment="java-1_7_0-openjdk-1.7.0.6-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591541" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591542" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5782</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5782" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5782" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5782" ref_url="https://www.suse.com/security/cve/CVE-2013-5782" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5782/">CVE-2013-5782</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566027" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566028" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566029" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591540" comment="java-1_7_0-openjdk-1.7.0.6-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591541" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591542" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5783</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5783" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5783" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5783" ref_url="https://www.suse.com/security/cve/CVE-2013-5783" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality and integrity via unknown vectors related to Swing.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5783/">CVE-2013-5783</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566027" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566028" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566029" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591540" comment="java-1_7_0-openjdk-1.7.0.6-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591541" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591542" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5784</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5784" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5784" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5784" ref_url="https://www.suse.com/security/cve/CVE-2013-5784" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect integrity via vectors related to SCRIPTING.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5784/">CVE-2013-5784</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566027" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566028" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566029" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591540" comment="java-1_7_0-openjdk-1.7.0.6-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591541" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591542" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5790</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5790" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5790" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5790" ref_url="https://www.suse.com/security/cve/CVE-2013-5790" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality via vectors related to BEANS.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5790/">CVE-2013-5790</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566027" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566028" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566029" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591540" comment="java-1_7_0-openjdk-1.7.0.6-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591541" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591542" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5797</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5797" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5797" ref_url="https://www.suse.com/security/cve/CVE-2013-5797" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and JavaFX 2.2.40 and earlier allows remote authenticated users to affect integrity via unknown vectors related to Javadoc.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-5797/">CVE-2013-5797</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566027" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566028" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566029" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591540" comment="java-1_7_0-openjdk-1.7.0.6-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591541" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591542" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5800</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5800" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5800" ref_url="https://www.suse.com/security/cve/CVE-2013-5800" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality via vectors related to JGSS.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5800/">CVE-2013-5800</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591540" comment="java-1_7_0-openjdk-1.7.0.6-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591541" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591542" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.21.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5802</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5802" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5802" ref_url="https://www.suse.com/security/cve/CVE-2013-5802" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JAXP.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5802/">CVE-2013-5802</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566027" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566028" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566029" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591540" comment="java-1_7_0-openjdk-1.7.0.6-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591541" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591542" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5803</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5803" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5803" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5803" ref_url="https://www.suse.com/security/cve/CVE-2013-5803" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect availability via vectors related to JGSS.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5803/">CVE-2013-5803</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566027" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566028" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566029" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591540" comment="java-1_7_0-openjdk-1.7.0.6-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591541" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591542" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5804</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5804" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5804" ref_url="https://www.suse.com/security/cve/CVE-2013-5804" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, and JRockit R27.7.6 and earlier allows remote attackers to affect confidentiality and integrity via unknown vectors related to Javadoc.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5804/">CVE-2013-5804</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566027" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566028" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566029" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591540" comment="java-1_7_0-openjdk-1.7.0.6-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591541" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591542" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5805</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5805" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5805" ref_url="https://www.suse.com/security/cve/CVE-2013-5805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Swing, a different vulnerability than CVE-2013-5806.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5805/">CVE-2013-5805</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591540" comment="java-1_7_0-openjdk-1.7.0.6-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591541" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591542" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.21.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5806</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5806" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5806" ref_url="https://www.suse.com/security/cve/CVE-2013-5806" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Swing, a different vulnerability than CVE-2013-5805.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5806/">CVE-2013-5806</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591540" comment="java-1_7_0-openjdk-1.7.0.6-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591541" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591542" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.21.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5809</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5809" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5809" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5809" ref_url="https://www.suse.com/security/cve/CVE-2013-5809" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-5829.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5809/">CVE-2013-5809</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566027" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566028" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566029" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591540" comment="java-1_7_0-openjdk-1.7.0.6-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591541" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591542" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5814</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5814" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5814" ref_url="https://www.suse.com/security/cve/CVE-2013-5814" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5814/">CVE-2013-5814</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566027" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566028" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566029" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591540" comment="java-1_7_0-openjdk-1.7.0.6-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591541" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591542" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5817</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5817" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5817" ref_url="https://www.suse.com/security/cve/CVE-2013-5817" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JNDI.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5817/">CVE-2013-5817</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566027" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566028" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566029" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591540" comment="java-1_7_0-openjdk-1.7.0.6-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591541" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591542" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135820" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5820</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5820" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5820" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5820" ref_url="https://www.suse.com/security/cve/CVE-2013-5820" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect integrity via vectors related to JAX-WS.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5820/">CVE-2013-5820</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566027" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566028" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566029" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591540" comment="java-1_7_0-openjdk-1.7.0.6-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591541" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591542" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5823</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5823" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5823" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5823" ref_url="https://www.suse.com/security/cve/CVE-2013-5823" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect availability via unknown vectors related to Security.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5823/">CVE-2013-5823</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566027" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566028" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566029" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591540" comment="java-1_7_0-openjdk-1.7.0.6-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591541" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591542" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5825</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5825" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5825" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5825" ref_url="https://www.suse.com/security/cve/CVE-2013-5825" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect availability via vectors related to JAXP.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5825/">CVE-2013-5825</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566027" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566028" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566029" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591540" comment="java-1_7_0-openjdk-1.7.0.6-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591541" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591542" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5829</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5829" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5829" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5829" ref_url="https://www.suse.com/security/cve/CVE-2013-5829" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-5809.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5829/">CVE-2013-5829</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566027" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566028" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566029" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591540" comment="java-1_7_0-openjdk-1.7.0.6-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591541" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591542" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5830</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5830" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5830" ref_url="https://www.suse.com/security/cve/CVE-2013-5830" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5830/">CVE-2013-5830</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566027" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566028" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566029" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591540" comment="java-1_7_0-openjdk-1.7.0.6-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591541" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591542" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5840</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5840" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5840" ref_url="https://www.suse.com/security/cve/CVE-2013-5840" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5840/">CVE-2013-5840</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566027" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566028" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566029" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591540" comment="java-1_7_0-openjdk-1.7.0.6-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591541" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591542" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5842</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5842" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5842" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5842" ref_url="https://www.suse.com/security/cve/CVE-2013-5842" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-5850.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5842/">CVE-2013-5842</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566027" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566028" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566029" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591540" comment="java-1_7_0-openjdk-1.7.0.6-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591541" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591542" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5849</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5849" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5849" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5849" ref_url="https://www.suse.com/security/cve/CVE-2013-5849" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality via vectors related to AWT.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5849/">CVE-2013-5849</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566027" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566028" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566029" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591540" comment="java-1_7_0-openjdk-1.7.0.6-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591541" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591542" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5850</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5850" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5850" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5850" ref_url="https://www.suse.com/security/cve/CVE-2013-5850" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-5842.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5850/">CVE-2013-5850</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566027" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566028" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566029" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591540" comment="java-1_7_0-openjdk-1.7.0.6-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591541" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591542" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5851</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5851" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5851" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5851" ref_url="https://www.suse.com/security/cve/CVE-2013-5851" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality via vectors related to JAXP.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5851/">CVE-2013-5851</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566027" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566028" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566029" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591540" comment="java-1_7_0-openjdk-1.7.0.6-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591541" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591542" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5860</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5860" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5860" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5860" ref_url="https://www.suse.com/security/cve/CVE-2013-5860" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00012.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.6.14 and earlier allows remote authenticated users to affect availability via vectors related to GIS.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5860/">CVE-2013-5860</cve>
	<bugzilla href="https://bugzilla.suse.com/858823">SUSE bug 858823</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591847" comment="libmysql55client18-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591848" comment="libmysql55client18-32bit-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591849" comment="libmysql55client_r18-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591850" comment="libmysql55client_r18-32bit-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591851" comment="libmysqlclient15-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591852" comment="libmysqlclient15-32bit-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591853" comment="libmysqlclient_r15-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591854" comment="libmysqlclient_r15-32bit-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591855" comment="mysql-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591856" comment="mysql-client-5.5.37-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135878" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5878</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5878" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5878" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5878" ref_url="https://www.suse.com/security/cve/CVE-2013-5878" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0174-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0177-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u65 and 7u45, Java SE Embedded 7u45, and OpenJDK 7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Security.  NOTE: the previous information is from the January 2014 CPU.  Oracle has not commented on third-party claims that the Security component does not properly handle null XML namespace (xmlns) attributes during XML document canonicalization, which allows attackers to escape the sandbox.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5878/">CVE-2013-5878</cve>
	<bugzilla href="https://bugzilla.suse.com/858818">SUSE bug 858818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592137" comment="java-1_7_0-openjdk-1.7.0.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592138" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592139" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5881</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5881" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5881" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5881" ref_url="https://www.suse.com/security/cve/CVE-2013-5881" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00012.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.6.14 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB, a different vulnerability than CVE-2014-0431.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5881/">CVE-2013-5881</cve>
	<bugzilla href="https://bugzilla.suse.com/858823">SUSE bug 858823</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591847" comment="libmysql55client18-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591848" comment="libmysql55client18-32bit-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591849" comment="libmysql55client_r18-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591850" comment="libmysql55client_r18-32bit-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591851" comment="libmysqlclient15-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591852" comment="libmysqlclient15-32bit-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591853" comment="libmysqlclient_r15-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591854" comment="libmysqlclient_r15-32bit-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591855" comment="mysql-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591856" comment="mysql-client-5.5.37-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5882</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5882" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5882" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5882" ref_url="https://www.suse.com/security/cve/CVE-2013-5882" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00012.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.6.13 and earlier allows remote authenticated users to affect availability via unknown vectors related to Stored Procedures.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5882/">CVE-2013-5882</cve>
	<bugzilla href="https://bugzilla.suse.com/858823">SUSE bug 858823</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591847" comment="libmysql55client18-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591848" comment="libmysql55client18-32bit-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591849" comment="libmysql55client_r18-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591850" comment="libmysql55client_r18-32bit-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591851" comment="libmysqlclient15-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591852" comment="libmysqlclient15-32bit-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591853" comment="libmysqlclient_r15-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591854" comment="libmysqlclient_r15-32bit-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591855" comment="mysql-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591856" comment="mysql-client-5.5.37-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5884</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5884" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5884" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5884" ref_url="https://www.suse.com/security/cve/CVE-2013-5884" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0174-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0177-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; Java SE Embedded 7u45; and OpenJDK 7 allows remote attackers to affect confidentiality via vectors related to CORBA.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is related to an incorrect check for code permissions by CORBA stub factories.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5884/">CVE-2013-5884</cve>
	<bugzilla href="https://bugzilla.suse.com/858818">SUSE bug 858818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592137" comment="java-1_7_0-openjdk-1.7.0.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592138" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592139" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5891</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5891" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5891" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5891" ref_url="https://www.suse.com/security/cve/CVE-2013-5891" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00012.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.33 and earlier and 5.6.13 and earlier allows remote authenticated users to affect availability via unknown vectors related to Partition.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5891/">CVE-2013-5891</cve>
	<bugzilla href="https://bugzilla.suse.com/858823">SUSE bug 858823</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591847" comment="libmysql55client18-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591848" comment="libmysql55client18-32bit-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591849" comment="libmysql55client_r18-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591850" comment="libmysql55client_r18-32bit-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591851" comment="libmysqlclient15-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591852" comment="libmysqlclient15-32bit-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591853" comment="libmysqlclient_r15-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591854" comment="libmysqlclient_r15-32bit-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591855" comment="mysql-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591856" comment="mysql-client-5.5.37-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5893</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5893" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5893" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5893" ref_url="https://www.suse.com/security/cve/CVE-2013-5893" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000720.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0174-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0177-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u45 and Java SE Embedded 7u45, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is related to improper handling of methods in MethodHandles in HotSpot JVM, which allows attackers to escape the sandbox.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5893/">CVE-2013-5893</cve>
	<bugzilla href="https://bugzilla.suse.com/858818">SUSE bug 858818</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592137" comment="java-1_7_0-openjdk-1.7.0.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592138" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592139" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135894" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5894</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5894" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5894" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5894" ref_url="https://www.suse.com/security/cve/CVE-2013-5894" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00012.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.6.13 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5894/">CVE-2013-5894</cve>
	<bugzilla href="https://bugzilla.suse.com/858823">SUSE bug 858823</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591847" comment="libmysql55client18-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591848" comment="libmysql55client18-32bit-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591849" comment="libmysql55client_r18-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591850" comment="libmysql55client_r18-32bit-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591851" comment="libmysqlclient15-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591852" comment="libmysqlclient15-32bit-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591853" comment="libmysqlclient_r15-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591854" comment="libmysqlclient_r15-32bit-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591855" comment="mysql-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591856" comment="mysql-client-5.5.37-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5896</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5896" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5896" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5896" ref_url="https://www.suse.com/security/cve/CVE-2013-5896" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0174-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0177-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; Java SE Embedded 7u45; and OpenJDK 7 allows remote attackers to affect availability via vectors related to CORBA.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that com.sun.corba.se and its sub-packages are not included on the restricted package list.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5896/">CVE-2013-5896</cve>
	<bugzilla href="https://bugzilla.suse.com/858818">SUSE bug 858818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592137" comment="java-1_7_0-openjdk-1.7.0.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592138" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592139" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5907</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5907" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5907" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5907" ref_url="https://www.suse.com/security/cve/CVE-2013-5907" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0174-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0177-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; JRockit R27.7.7 and R28.2.9; Java SE Embedded 7u45; and OpenJDK 7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is due to incorrect input validation in LookupProcessor.cpp in the ICU Layout Engine, which allows attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted font file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5907/">CVE-2013-5907</cve>
	<bugzilla href="https://bugzilla.suse.com/858818">SUSE bug 858818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592137" comment="java-1_7_0-openjdk-1.7.0.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592138" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592139" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5908</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5908" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5908" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5908" ref_url="https://www.suse.com/security/cve/CVE-2013-5908" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00012.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.72 and earlier, 5.5.34 and earlier, and 5.6.14 and earlier allows remote attackers to affect availability via unknown vectors related to Error Handling.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-5908/">CVE-2013-5908</cve>
	<bugzilla href="https://bugzilla.suse.com/858823">SUSE bug 858823</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591847" comment="libmysql55client18-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591848" comment="libmysql55client18-32bit-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591849" comment="libmysql55client_r18-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591850" comment="libmysql55client_r18-32bit-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591851" comment="libmysqlclient15-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591852" comment="libmysqlclient15-32bit-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591853" comment="libmysqlclient_r15-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591854" comment="libmysqlclient_r15-32bit-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591855" comment="mysql-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591856" comment="mysql-client-5.5.37-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5910</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5910" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5910" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5910" ref_url="https://www.suse.com/security/cve/CVE-2013-5910" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0174-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0177-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u65 and 7u45, Java SE Embedded 7u45, and OpenJDK 7 allows remote attackers to affect integrity via unknown vectors related to Security.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that CanonicalizerBase.java in the XML canonicalizer allows untrusted code to access mutable byte arrays.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5910/">CVE-2013-5910</cve>
	<bugzilla href="https://bugzilla.suse.com/858818">SUSE bug 858818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592137" comment="java-1_7_0-openjdk-1.7.0.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592138" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592139" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136336" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6336</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6336" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6336" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6336" ref_url="https://www.suse.com/security/cve/CVE-2013-6336" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000653.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1671-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1675-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00027.html" source="SUSE-SU"/>
    <description>
    The ieee802154_map_rec function in epan/dissectors/packet-ieee802154.c in the IEEE 802.15.4 dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 uses an incorrect pointer chain, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6336/">CVE-2013-6336</cve>
	<bugzilla href="https://bugzilla.suse.com/848738">SUSE bug 848738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592154" comment="wireshark-1.8.11-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6337</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6337" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6337" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6337" ref_url="https://www.suse.com/security/cve/CVE-2013-6337" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000653.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1671-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1675-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00027.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the NBAP dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6337/">CVE-2013-6337</cve>
	<bugzilla href="https://bugzilla.suse.com/848738">SUSE bug 848738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592154" comment="wireshark-1.8.11-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136338" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6338</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6338" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6338" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6338" ref_url="https://www.suse.com/security/cve/CVE-2013-6338" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000653.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1671-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1675-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00027.html" source="SUSE-SU"/>
    <description>
    The dissect_sip_common function in epan/dissectors/packet-sip.c in the SIP dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 does not properly initialize a data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6338/">CVE-2013-6338</cve>
	<bugzilla href="https://bugzilla.suse.com/848738">SUSE bug 848738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592154" comment="wireshark-1.8.11-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6339</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6339" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6339" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6339" ref_url="https://www.suse.com/security/cve/CVE-2013-6339" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000653.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1671-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1675-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00027.html" source="SUSE-SU"/>
    <description>
    The dissect_openwire_type function in epan/dissectors/packet-openwire.c in the OpenWire dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 allows remote attackers to cause a denial of service (loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6339/">CVE-2013-6339</cve>
	<bugzilla href="https://bugzilla.suse.com/848738">SUSE bug 848738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592154" comment="wireshark-1.8.11-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6340</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6340" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6340" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6340" ref_url="https://www.suse.com/security/cve/CVE-2013-6340" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000653.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1671-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1675-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00027.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-tcp.c in the TCP dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 does not properly determine the amount of remaining data, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6340/">CVE-2013-6340</cve>
	<bugzilla href="https://bugzilla.suse.com/848738">SUSE bug 848738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592154" comment="wireshark-1.8.11-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136367" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6367</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6367" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6367" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6367" ref_url="https://www.suse.com/security/cve/CVE-2013-6367" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0204-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0205-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00045.html" source="SUSE-SU"/>
    <description>
    The apic_get_tmcct function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via crafted modifications of the TMICT value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6367/">CVE-2013-6367</cve>
	<bugzilla href="https://bugzilla.suse.com/853051">SUSE bug 853051</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591274" comment="kernel-default-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591275" comment="kernel-default-base-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591276" comment="kernel-default-devel-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591277" comment="kernel-default-extra-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591278" comment="kernel-source-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591279" comment="kernel-syms-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591280" comment="kernel-trace-devel-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591281" comment="kernel-xen-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591282" comment="kernel-xen-base-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591283" comment="kernel-xen-devel-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591284" comment="kernel-xen-extra-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591285" comment="xen-kmp-default-4.2.3_08_3.0.101_0.15-0.7.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591868" comment="kernel-default-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591869" comment="kernel-default-base-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591870" comment="kernel-default-devel-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591871" comment="kernel-default-extra-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591872" comment="kernel-source-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591873" comment="kernel-syms-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591874" comment="kernel-trace-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591875" comment="kernel-trace-base-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591876" comment="kernel-trace-devel-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591877" comment="kernel-trace-extra-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591878" comment="kernel-xen-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591879" comment="kernel-xen-base-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591880" comment="kernel-xen-devel-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591881" comment="kernel-xen-extra-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591882" comment="xen-kmp-default-4.1.6_04_3.0.101_0.7.15-0.5.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591883" comment="xen-kmp-trace-4.1.6_04_3.0.101_0.7.15-0.5.12 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6368</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6368" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6368" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6368" ref_url="https://www.suse.com/security/cve/CVE-2013-6368" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0537-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0204-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0205-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00045.html" source="SUSE-SU"/>
    <description>
    The KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges or cause a denial of service (system crash) via a VAPIC synchronization operation involving a page-end address.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6368/">CVE-2013-6368</cve>
	<bugzilla href="https://bugzilla.suse.com/853052">SUSE bug 853052</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591274" comment="kernel-default-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591275" comment="kernel-default-base-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591276" comment="kernel-default-devel-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591277" comment="kernel-default-extra-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591278" comment="kernel-source-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591279" comment="kernel-syms-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591280" comment="kernel-trace-devel-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591281" comment="kernel-xen-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591282" comment="kernel-xen-base-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591283" comment="kernel-xen-devel-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591284" comment="kernel-xen-extra-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591285" comment="xen-kmp-default-4.2.3_08_3.0.101_0.15-0.7.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591868" comment="kernel-default-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591869" comment="kernel-default-base-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591870" comment="kernel-default-devel-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591871" comment="kernel-default-extra-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591872" comment="kernel-source-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591873" comment="kernel-syms-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591874" comment="kernel-trace-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591875" comment="kernel-trace-base-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591876" comment="kernel-trace-devel-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591877" comment="kernel-trace-extra-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591878" comment="kernel-xen-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591879" comment="kernel-xen-base-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591880" comment="kernel-xen-devel-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591881" comment="kernel-xen-extra-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591882" comment="xen-kmp-default-4.1.6_04_3.0.101_0.7.15-0.5.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591883" comment="xen-kmp-trace-4.1.6_04_3.0.101_0.7.15-0.5.12 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6376</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6376" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6376" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6376" ref_url="https://www.suse.com/security/cve/CVE-2013-6376" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000716.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0204-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0205-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00003.html" source="SUSE-SU"/>
    <description>
    The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6376/">CVE-2013-6376</cve>
	<bugzilla href="https://bugzilla.suse.com/853053">SUSE bug 853053</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591274" comment="kernel-default-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591275" comment="kernel-default-base-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591276" comment="kernel-default-devel-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591277" comment="kernel-default-extra-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591278" comment="kernel-source-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591279" comment="kernel-syms-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591280" comment="kernel-trace-devel-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591281" comment="kernel-xen-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591282" comment="kernel-xen-base-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591283" comment="kernel-xen-devel-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591284" comment="kernel-xen-extra-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591285" comment="xen-kmp-default-4.2.3_08_3.0.101_0.15-0.7.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6378</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6378" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6378" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6378" ref_url="https://www.suse.com/security/cve/CVE-2013-6378" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0204-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00045.html" source="SUSE-SU"/>
    <description>
    The lbs_debugfs_write function in drivers/net/wireless/libertas/debugfs.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service (OOPS) by leveraging root privileges for a zero-length write operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6378/">CVE-2013-6378</cve>
	<bugzilla href="https://bugzilla.suse.com/852559">SUSE bug 852559</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591274" comment="kernel-default-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591275" comment="kernel-default-base-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591276" comment="kernel-default-devel-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591277" comment="kernel-default-extra-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591278" comment="kernel-source-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591279" comment="kernel-syms-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591280" comment="kernel-trace-devel-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591281" comment="kernel-xen-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591282" comment="kernel-xen-base-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591283" comment="kernel-xen-devel-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591284" comment="kernel-xen-extra-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591285" comment="xen-kmp-default-4.2.3_08_3.0.101_0.15-0.7.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591868" comment="kernel-default-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591869" comment="kernel-default-base-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591870" comment="kernel-default-devel-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591871" comment="kernel-default-extra-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591872" comment="kernel-source-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591873" comment="kernel-syms-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591874" comment="kernel-trace-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591875" comment="kernel-trace-base-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591876" comment="kernel-trace-devel-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591877" comment="kernel-trace-extra-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591878" comment="kernel-xen-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591879" comment="kernel-xen-base-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591880" comment="kernel-xen-devel-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591881" comment="kernel-xen-extra-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591882" comment="xen-kmp-default-4.1.6_04_3.0.101_0.7.15-0.5.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591883" comment="xen-kmp-trace-4.1.6_04_3.0.101_0.7.15-0.5.12 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6380</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6380" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6380" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6380" ref_url="https://www.suse.com/security/cve/CVE-2013-6380" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000716.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0204-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00045.html" source="SUSE-SU"/>
    <description>
    The aac_send_raw_srb function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 3.12.1 does not properly validate a certain size value, which allows local users to cause a denial of service (invalid pointer dereference) or possibly have unspecified other impact via an FSACTL_SEND_RAW_SRB ioctl call that triggers a crafted SRB command.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6380/">CVE-2013-6380</cve>
	<bugzilla href="https://bugzilla.suse.com/852373">SUSE bug 852373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591274" comment="kernel-default-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591275" comment="kernel-default-base-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591276" comment="kernel-default-devel-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591277" comment="kernel-default-extra-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591278" comment="kernel-source-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591279" comment="kernel-syms-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591280" comment="kernel-trace-devel-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591281" comment="kernel-xen-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591282" comment="kernel-xen-base-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591283" comment="kernel-xen-devel-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591284" comment="kernel-xen-extra-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591285" comment="xen-kmp-default-4.2.3_08_3.0.101_0.15-0.7.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591868" comment="kernel-default-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591869" comment="kernel-default-base-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591870" comment="kernel-default-devel-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591871" comment="kernel-default-extra-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591872" comment="kernel-source-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591873" comment="kernel-syms-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591874" comment="kernel-trace-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591875" comment="kernel-trace-base-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591876" comment="kernel-trace-devel-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591877" comment="kernel-trace-extra-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591878" comment="kernel-xen-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591879" comment="kernel-xen-base-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591880" comment="kernel-xen-devel-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591881" comment="kernel-xen-extra-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591882" comment="xen-kmp-default-4.1.6_04_3.0.101_0.7.15-0.5.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591883" comment="xen-kmp-trace-4.1.6_04_3.0.101_0.7.15-0.5.12 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6382</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6382" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6382" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6382" ref_url="https://www.suse.com/security/cve/CVE-2013-6382" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0766-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00013.html" source="SUSE-SU"/>
    <description>
    Multiple buffer underflows in the XFS implementation in the Linux kernel through 3.12.1 allow local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging the CAP_SYS_ADMIN capability for a (1) XFS_IOC_ATTRLIST_BY_HANDLE or (2) XFS_IOC_ATTRLIST_BY_HANDLE_32 ioctl call with a crafted length value, related to the xfs_attrlist_by_handle function in fs/xfs/xfs_ioctl.c and the xfs_compat_attrlist_by_handle function in fs/xfs/xfs_ioctl32.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6382/">CVE-2013-6382</cve>
	<bugzilla href="https://bugzilla.suse.com/852553">SUSE bug 852553</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589697" comment="kernel-default-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589698" comment="kernel-default-base-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589699" comment="kernel-default-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589700" comment="kernel-default-extra-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589701" comment="kernel-source-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589702" comment="kernel-syms-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589703" comment="kernel-trace-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589704" comment="kernel-xen-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589705" comment="kernel-xen-base-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589706" comment="kernel-xen-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589707" comment="kernel-xen-extra-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589708" comment="xen-kmp-default-4.2.4_02_3.0.101_0.35-0.7.45 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6383</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6383" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6383" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6383" ref_url="https://www.suse.com/security/cve/CVE-2013-6383" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000880.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0766-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00013.html" source="SUSE-SU"/>
    <description>
    The aac_compat_ioctl function in drivers/scsi/aacraid/linit.c in the Linux kernel before 3.11.8 does not require the CAP_SYS_RAWIO capability, which allows local users to bypass intended access restrictions via a crafted ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6383/">CVE-2013-6383</cve>
	<bugzilla href="https://bugzilla.suse.com/852558">SUSE bug 852558</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591274" comment="kernel-default-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591275" comment="kernel-default-base-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591276" comment="kernel-default-devel-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591277" comment="kernel-default-extra-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591278" comment="kernel-source-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591279" comment="kernel-syms-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591280" comment="kernel-trace-devel-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591281" comment="kernel-xen-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591282" comment="kernel-xen-base-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591283" comment="kernel-xen-devel-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591284" comment="kernel-xen-extra-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591285" comment="xen-kmp-default-4.2.3_08_3.0.101_0.15-0.7.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591868" comment="kernel-default-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591869" comment="kernel-default-base-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591870" comment="kernel-default-devel-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591871" comment="kernel-default-extra-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591872" comment="kernel-source-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591873" comment="kernel-syms-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591874" comment="kernel-trace-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591875" comment="kernel-trace-base-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591876" comment="kernel-trace-devel-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591877" comment="kernel-trace-extra-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591878" comment="kernel-xen-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591879" comment="kernel-xen-base-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591880" comment="kernel-xen-devel-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591881" comment="kernel-xen-extra-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591882" comment="xen-kmp-default-4.1.6_04_3.0.101_0.7.15-0.5.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591883" comment="xen-kmp-trace-4.1.6_04_3.0.101_0.7.15-0.5.12 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136400" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6400</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6400" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6400" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6400" ref_url="https://www.suse.com/security/cve/CVE-2013-6400" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0482-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0483-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00010.html" source="SUSE-SU"/>
    <description>
    Xen 4.2.x and 4.3.x, when using Intel VT-d and a PCI device has been assigned, does not clear the flag that suppresses IOMMU TLB flushes when unspecified errors occur, which causes the TLB entries to not be flushed and allows local guest administrators to cause a denial of service (host crash) or gain privileges via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6400/">CVE-2013-6400</cve>
	<bugzilla href="https://bugzilla.suse.com/853048">SUSE bug 853048</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567225" comment="xen-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567226" comment="xen-doc-html-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567227" comment="xen-doc-pdf-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567228" comment="xen-kmp-default-4.2.4_02_3.0.101_0.15-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567229" comment="xen-kmp-pae-4.2.4_02_3.0.101_0.15-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567230" comment="xen-libs-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567231" comment="xen-libs-32bit-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567232" comment="xen-tools-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567233" comment="xen-tools-domU-4.2.4_02-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6402</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6402" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6402" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6402" ref_url="https://www.suse.com/security/cve/CVE-2013-6402" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0188-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000717.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0127-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0146-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00098.html" source="SUSE-SU"/>
    <description>
    base/pkit.py in HP Linux Imaging and Printing (HPLIP) through 3.13.11 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/hp-pkservice.log temporary file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6402/">CVE-2013-6402</cve>
	<bugzilla href="https://bugzilla.suse.com/852368">SUSE bug 852368</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566017" comment="hplip-3.11.10-0.6.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566018" comment="hplip-hpijs-3.11.10-0.6.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6412</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6412" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6412" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6412" ref_url="https://www.suse.com/security/cve/CVE-2013-6412" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000961.html" source="SUSE-SU"/>
    <description>
    The transform_save function in transform.c in Augeas 1.0.0 through 1.1.0 does not properly calculate the permission values when the umask contains a "7," which causes world-writable permissions to be used for new files and allows local users to modify the files via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6412/">CVE-2013-6412</cve>
	<bugzilla href="https://bugzilla.suse.com/853044">SUSE bug 853044</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566350" comment="libaugeas0-0.9.0-3.15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6418</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6418" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6418" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6418" ref_url="https://www.suse.com/security/cve/CVE-2013-6418" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000804.html" source="SUSE-SU"/>
    <description>
    PyWBEM 0.7 and earlier uses a separate connection to validate X.509 certificates, which allows man-in-the-middle attackers to spoof a peer via an arbitrary certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6418/">CVE-2013-6418</cve>
	<bugzilla href="https://bugzilla.suse.com/856323">SUSE bug 856323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592158" comment="python-pywbem-0.7-6.20.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6424</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6424" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6424" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6424" ref_url="https://www.suse.com/security/cve/CVE-2013-6424" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0051-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000844.html" source="SUSE-SU"/>
		<reference ref_id="TID7021434" ref_url="https://www.suse.com/support/kb/doc/?id=7021434" source="SUSE-SU"/>
		<reference ref_id="TID7021676" ref_url="https://www.suse.com/support/kb/doc/?id=7021676" source="SUSE-SU"/>
		<reference ref_id="TID7021738" ref_url="https://www.suse.com/support/kb/doc/?id=7021738" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1965-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00127.html" source="SUSE-SU"/>
    <description>
    Integer underflow in the xTrapezoidValid macro in render/picture.h in X.Org allows context-dependent attackers to cause a denial of service (crash) via a negative bottom value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6424/">CVE-2013-6424</cve>
	<bugzilla href="https://bugzilla.suse.com/853846">SUSE bug 853846</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566269" comment="xorg-x11-Xvnc-7.4-27.70.76.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566270" comment="xorg-x11-server-7.4-27.70.76.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566271" comment="xorg-x11-server-extra-7.4-27.70.76.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592161" comment="xorg-x11-Xvnc-7.4-27.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592162" comment="xorg-x11-server-7.4-27.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592163" comment="xorg-x11-server-extra-7.4-27.85.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6425</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6425" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6425" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6425" ref_url="https://www.suse.com/security/cve/CVE-2013-6425" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000680.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0007-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0011-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0014-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0145-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00097.html" source="SUSE-SU"/>
    <description>
    Integer underflow in the pixman_trapezoid_valid macro in pixman.h in Pixman before 0.32.0, as used in X.Org server and cairo, allows context-dependent attackers to cause a denial of service (crash) via a negative bottom value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6425/">CVE-2013-6425</cve>
	<bugzilla href="https://bugzilla.suse.com/853824">SUSE bug 853824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566117" comment="libpixman-1-0-0.16.0-1.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566118" comment="libpixman-1-0-32bit-0.16.0-1.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566119" comment="libpixman-1-0-devel-0.16.0-1.4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566847" comment="libpixman-1-0-0.24.4-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566848" comment="libpixman-1-0-32bit-0.24.4-0.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6435</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6435" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6435" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6435" ref_url="https://www.suse.com/security/cve/CVE-2013-6435" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1697-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1716-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00100.html" source="SUSE-SU"/>
    <description>
    Race condition in RPM 4.11.1 and earlier allows remote attackers to execute arbitrary code via a crafted RPM file whose installation extracts the contents to temporary files before validating the signature, as demonstrated by installing a file in the /etc/cron.d directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-6435/">CVE-2013-6435</cve>
	<bugzilla href="https://bugzilla.suse.com/1101137">SUSE bug 1101137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906803">SUSE bug 906803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908128">SUSE bug 908128</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567040" comment="popt-1.7-37.60.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567041" comment="popt-32bit-1.7-37.60.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567042" comment="rpm-4.4.2.3-37.60.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567043" comment="rpm-32bit-4.4.2.3-37.60.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6436</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6436" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6436" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6436" ref_url="https://www.suse.com/security/cve/CVE-2013-6436" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000707.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0010-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00004.html" source="SUSE-SU"/>
    <description>
    The lxcDomainGetMemoryParameters method in lxc/lxc_driver.c in libvirt 1.0.5 through 1.2.0 does not properly check the status of LXC guests when reading memory tunables, which allows local users to cause a denial of service (NULL pointer dereference and libvirtd crash) via a guest in the shutdown status, as demonstrated by the "virsh memtune" command.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6436/">CVE-2013-6436</cve>
	<bugzilla href="https://bugzilla.suse.com/854486">SUSE bug 854486</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592175" comment="libvirt-1.0.5.8-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592176" comment="libvirt-client-1.0.5.8-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592177" comment="libvirt-client-32bit-1.0.5.8-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592178" comment="libvirt-doc-1.0.5.8-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592179" comment="libvirt-python-1.0.5.8-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6441</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6441" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6441" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6441" ref_url="https://www.suse.com/security/cve/CVE-2013-6441" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000815.html" source="SUSE-SU"/>
    <description>
    The lxc-sshd template (templates/lxc-sshd.in) in LXC before 1.0.0.beta2 uses read-write permissions when mounting /sbin/init, which allows local users to gain privileges by modifying the init file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-6441/">CVE-2013-6441</cve>
	<bugzilla href="https://bugzilla.suse.com/855809">SUSE bug 855809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563694" comment="lxc-0.8.0-0.21.6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6456</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6456" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6456" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6456" ref_url="https://www.suse.com/security/cve/CVE-2013-6456" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000863.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0593-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00004.html" source="SUSE-SU"/>
    <description>
    The LXC driver (lxc/lxc_driver.c) in libvirt 1.0.1 through 1.2.1 allows local users to (1) delete arbitrary host devices via the virDomainDeviceDettach API and a symlink attack on /dev in the container; (2) create arbitrary nodes (mknod) via the virDomainDeviceAttach API and a symlink attack on /dev in the container; and cause a denial of service (shutdown or reboot host OS) via the (3) virDomainShutdown or (4) virDomainReboot API and a symlink attack on /dev/initctl in the container, related to "paths under /proc/$PID/root" and the virInitctlSetRunLevel function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6456/">CVE-2013-6456</cve>
	<bugzilla href="https://bugzilla.suse.com/857490">SUSE bug 857490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/868943">SUSE bug 868943</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566926" comment="libvirt-1.0.5.9-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566927" comment="libvirt-client-1.0.5.9-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566928" comment="libvirt-client-32bit-1.0.5.9-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566929" comment="libvirt-doc-1.0.5.9-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566930" comment="libvirt-python-1.0.5.9-0.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6458</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6458" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6458" ref_url="https://www.suse.com/security/cve/CVE-2013-6458" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-March/000738.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0270-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00062.html" source="SUSE-SU"/>
    <description>
    Multiple race conditions in the (1) virDomainBlockStats, (2) virDomainGetBlockInf, (3) qemuDomainBlockJobImpl, and (4) virDomainGetBlockIoTune functions in libvirt before 1.2.1 do not properly verify that the disk is attached, which allows remote read-only attackers to cause a denial of service (libvirtd crash) via the virDomainDetachDeviceFlags command.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6458/">CVE-2013-6458</cve>
	<bugzilla href="https://bugzilla.suse.com/857492">SUSE bug 857492</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592201" comment="libvirt-1.0.5.9-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592202" comment="libvirt-client-1.0.5.9-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592203" comment="libvirt-client-32bit-1.0.5.9-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592204" comment="libvirt-doc-1.0.5.9-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592205" comment="libvirt-python-1.0.5.9-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6462</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6462" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6462" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6462" ref_url="https://www.suse.com/security/cve/CVE-2013-6462" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000904.html" source="SUSE-SU"/>
		<reference ref_id="TID7021434" ref_url="https://www.suse.com/support/kb/doc/?id=7021434" source="SUSE-SU"/>
		<reference ref_id="TID7021676" ref_url="https://www.suse.com/support/kb/doc/?id=7021676" source="SUSE-SU"/>
		<reference ref_id="TID7021738" ref_url="https://www.suse.com/support/kb/doc/?id=7021738" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0073-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0075-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00052.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the bdfReadCharacters function in bitmap/bdfread.c in X.Org libXfont 1.1 through 1.4.6 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string in a character name in a BDF font file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6462/">CVE-2013-6462</cve>
	<bugzilla href="https://bugzilla.suse.com/854915">SUSE bug 854915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882908">SUSE bug 882908</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566272" comment="xorg-x11-devel-7.4-8.26.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566273" comment="xorg-x11-libs-7.4-8.26.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566274" comment="xorg-x11-libs-32bit-7.4-8.26.40.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566273" comment="xorg-x11-libs-7.4-8.26.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566274" comment="xorg-x11-libs-32bit-7.4-8.26.40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6463</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6463" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6463" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6463" ref_url="https://www.suse.com/security/cve/CVE-2013-6463" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1246-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00056.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2013-7266, CVE-2013-7267, CVE-2013-7268, CVE-2013-7269, CVE-2013-7270, CVE-2013-7271.  Reason: This candidate is a duplicate of CVE-2013-7266, CVE-2013-7267, CVE-2013-7268, CVE-2013-7269, CVE-2013-7270, and CVE-2013-7271.  Notes: All CVE users should reference CVE-2013-7266, CVE-2013-7267, CVE-2013-7268, CVE-2013-7269, CVE-2013-7270, and/or CVE-2013-7271 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-6463/">CVE-2013-6463</cve>
	<bugzilla href="https://bugzilla.suse.com/854722">SUSE bug 854722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/857643">SUSE bug 857643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591274" comment="kernel-default-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591275" comment="kernel-default-base-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591276" comment="kernel-default-devel-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591277" comment="kernel-default-extra-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591278" comment="kernel-source-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591279" comment="kernel-syms-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591280" comment="kernel-trace-devel-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591281" comment="kernel-xen-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591282" comment="kernel-xen-base-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591283" comment="kernel-xen-devel-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591284" comment="kernel-xen-extra-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591285" comment="xen-kmp-default-4.2.3_08_3.0.101_0.15-0.7.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591868" comment="kernel-default-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591869" comment="kernel-default-base-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591870" comment="kernel-default-devel-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591871" comment="kernel-default-extra-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591872" comment="kernel-source-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591873" comment="kernel-syms-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591874" comment="kernel-trace-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591875" comment="kernel-trace-base-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591876" comment="kernel-trace-devel-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591877" comment="kernel-trace-extra-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591878" comment="kernel-xen-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591879" comment="kernel-xen-base-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591880" comment="kernel-xen-devel-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591881" comment="kernel-xen-extra-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591882" comment="xen-kmp-default-4.1.6_04_3.0.101_0.7.15-0.5.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591883" comment="xen-kmp-trace-4.1.6_04_3.0.101_0.7.15-0.5.12 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6477</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6477" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6477" ref_url="https://www.suse.com/security/cve/CVE-2013-6477" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000828.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0239-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0326-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00005.html" source="SUSE-SU"/>
    <description>
    Multiple integer signedness errors in libpurple in Pidgin before 2.10.8 allow remote attackers to cause a denial of service (application crash) via a crafted timestamp value in an XMPP message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6477/">CVE-2013-6477</cve>
	<bugzilla href="https://bugzilla.suse.com/861019">SUSE bug 861019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566424" comment="finch-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566425" comment="libpurple-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566426" comment="libpurple-lang-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566427" comment="libpurple-meanwhile-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566428" comment="libpurple-tcl-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566429" comment="pidgin-2.6.6-0.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6478</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6478" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6478" ref_url="https://www.suse.com/security/cve/CVE-2013-6478" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000828.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0239-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0326-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00005.html" source="SUSE-SU"/>
    <description>
    gtkimhtml.c in Pidgin before 2.10.8 does not properly interact with underlying library support for wide Pango layouts, which allows user-assisted remote attackers to cause a denial of service (application crash) via a long URL that is examined with a tooltip.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6478/">CVE-2013-6478</cve>
	<bugzilla href="https://bugzilla.suse.com/861019">SUSE bug 861019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566424" comment="finch-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566425" comment="libpurple-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566426" comment="libpurple-lang-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566427" comment="libpurple-meanwhile-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566428" comment="libpurple-tcl-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566429" comment="pidgin-2.6.6-0.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6479</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6479" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6479" ref_url="https://www.suse.com/security/cve/CVE-2013-6479" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000828.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0239-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0326-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00005.html" source="SUSE-SU"/>
    <description>
    util.c in libpurple in Pidgin before 2.10.8 does not properly allocate memory for HTTP responses that are inconsistent with the Content-Length header, which allows remote HTTP servers to cause a denial of service (application crash) via a crafted response.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6479/">CVE-2013-6479</cve>
	<bugzilla href="https://bugzilla.suse.com/861019">SUSE bug 861019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566424" comment="finch-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566425" comment="libpurple-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566426" comment="libpurple-lang-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566427" comment="libpurple-meanwhile-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566428" comment="libpurple-tcl-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566429" comment="pidgin-2.6.6-0.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136481" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6481</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6481" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6481" ref_url="https://www.suse.com/security/cve/CVE-2013-6481" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000828.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0239-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0326-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00005.html" source="SUSE-SU"/>
    <description>
    libpurple/protocols/yahoo/libymsg.c in Pidgin before 2.10.8 allows remote attackers to cause a denial of service (crash) via a Yahoo! P2P message with a crafted length field, which triggers a buffer over-read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6481/">CVE-2013-6481</cve>
	<bugzilla href="https://bugzilla.suse.com/861019">SUSE bug 861019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566424" comment="finch-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566425" comment="libpurple-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566426" comment="libpurple-lang-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566427" comment="libpurple-meanwhile-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566428" comment="libpurple-tcl-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566429" comment="pidgin-2.6.6-0.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6482</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6482" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6482" ref_url="https://www.suse.com/security/cve/CVE-2013-6482" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000828.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0239-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0326-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00005.html" source="SUSE-SU"/>
    <description>
    Pidgin before 2.10.8 allows remote MSN servers to cause a denial of service (NULL pointer dereference and crash) via a crafted (1) SOAP response, (2) OIM XML response, or (3) Content-Length header.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6482/">CVE-2013-6482</cve>
	<bugzilla href="https://bugzilla.suse.com/861019">SUSE bug 861019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566424" comment="finch-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566425" comment="libpurple-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566426" comment="libpurple-lang-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566427" comment="libpurple-meanwhile-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566428" comment="libpurple-tcl-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566429" comment="pidgin-2.6.6-0.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6483</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6483" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6483" ref_url="https://www.suse.com/security/cve/CVE-2013-6483" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000828.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0239-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0326-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00005.html" source="SUSE-SU"/>
    <description>
    The XMPP protocol plugin in libpurple in Pidgin before 2.10.8 does not properly determine whether the from address in an iq reply is consistent with the to address in an iq request, which allows remote attackers to spoof iq traffic or cause a denial of service (NULL pointer dereference and application crash) via a crafted reply.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6483/">CVE-2013-6483</cve>
	<bugzilla href="https://bugzilla.suse.com/861019">SUSE bug 861019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566424" comment="finch-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566425" comment="libpurple-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566426" comment="libpurple-lang-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566427" comment="libpurple-meanwhile-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566428" comment="libpurple-tcl-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566429" comment="pidgin-2.6.6-0.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6484</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6484" ref_url="https://www.suse.com/security/cve/CVE-2013-6484" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000828.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0239-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0326-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00005.html" source="SUSE-SU"/>
    <description>
    The STUN protocol implementation in libpurple in Pidgin before 2.10.8 allows remote STUN servers to cause a denial of service (out-of-bounds write operation and application crash) by triggering a socket read error.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6484/">CVE-2013-6484</cve>
	<bugzilla href="https://bugzilla.suse.com/861019">SUSE bug 861019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566424" comment="finch-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566425" comment="libpurple-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566426" comment="libpurple-lang-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566427" comment="libpurple-meanwhile-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566428" comment="libpurple-tcl-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566429" comment="pidgin-2.6.6-0.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6485</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6485" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6485" ref_url="https://www.suse.com/security/cve/CVE-2013-6485" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000828.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0239-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0326-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00005.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in util.c in libpurple in Pidgin before 2.10.8 allows remote HTTP servers to cause a denial of service (application crash) or possibly have unspecified other impact via an invalid chunk-size field in chunked transfer-coding data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6485/">CVE-2013-6485</cve>
	<bugzilla href="https://bugzilla.suse.com/861019">SUSE bug 861019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566424" comment="finch-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566425" comment="libpurple-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566426" comment="libpurple-lang-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566427" comment="libpurple-meanwhile-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566428" comment="libpurple-tcl-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566429" comment="pidgin-2.6.6-0.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6486</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6486" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6486" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6486" ref_url="https://www.suse.com/security/cve/CVE-2013-6486" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000828.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0239-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0326-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00005.html" source="SUSE-SU"/>
    <description>
    gtkutils.c in Pidgin before 2.10.8 on Windows allows user-assisted remote attackers to execute arbitrary programs via a message containing a file: URL that is improperly handled during construction of an explorer.exe command.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3185.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-6486/">CVE-2013-6486</cve>
	<bugzilla href="https://bugzilla.suse.com/861019">SUSE bug 861019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566424" comment="finch-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566425" comment="libpurple-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566426" comment="libpurple-lang-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566427" comment="libpurple-meanwhile-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566428" comment="libpurple-tcl-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566429" comment="pidgin-2.6.6-0.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6487</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6487" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6487" ref_url="https://www.suse.com/security/cve/CVE-2013-6487" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000865.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0239-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0326-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0722-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0742-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00004.html" source="SUSE-SU"/>
    <description>
    Integer overflow in libpurple/protocols/gg/lib/http.c in the Gadu-Gadu (gg) parser in Pidgin before 2.10.8 allows remote attackers to have an unspecified impact via a large Content-Length value, which triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6487/">CVE-2013-6487</cve>
	<bugzilla href="https://bugzilla.suse.com/861019">SUSE bug 861019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/878540">SUSE bug 878540</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566424" comment="finch-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566820" comment="libgadu-1.8.2-1.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566425" comment="libpurple-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566426" comment="libpurple-lang-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566427" comment="libpurple-meanwhile-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566428" comment="libpurple-tcl-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566429" comment="pidgin-2.6.6-0.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6489</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6489" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6489" ref_url="https://www.suse.com/security/cve/CVE-2013-6489" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000828.html" source="SUSE-SU"/>
    <description>
    Integer signedness error in the MXit functionality in Pidgin before 2.10.8 allows remote attackers to cause a denial of service (segmentation fault) via a crafted emoticon value, which triggers an integer overflow and a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6489/">CVE-2013-6489</cve>
	<bugzilla href="https://bugzilla.suse.com/861019">SUSE bug 861019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566424" comment="finch-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566425" comment="libpurple-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566426" comment="libpurple-lang-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566427" comment="libpurple-meanwhile-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566428" comment="libpurple-tcl-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566429" comment="pidgin-2.6.6-0.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6490</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6490" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6490" ref_url="https://www.suse.com/security/cve/CVE-2013-6490" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000828.html" source="SUSE-SU"/>
    <description>
    The SIMPLE protocol functionality in Pidgin before 2.10.8 allows remote attackers to have an unspecified impact via a negative Content-Length header, which triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6490/">CVE-2013-6490</cve>
	<bugzilla href="https://bugzilla.suse.com/861019">SUSE bug 861019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566424" comment="finch-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566425" comment="libpurple-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566426" comment="libpurple-lang-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566427" comment="libpurple-meanwhile-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566428" comment="libpurple-tcl-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566429" comment="pidgin-2.6.6-0.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6493</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6493" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6493" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6493" ref_url="https://www.suse.com/security/cve/CVE-2013-6493" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-March/000755.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0310-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00089.html" source="SUSE-SU"/>
    <description>
    The LiveConnect implementation in plugin/icedteanp/IcedTeaNPPlugin.cc in IcedTea-Web before 1.4.2 allows local users to read the messages between a Java applet and a web browser by pre-creating a temporary socket file with a predictable name in /tmp.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6493/">CVE-2013-6493</cve>
	<bugzilla href="https://bugzilla.suse.com/863107">SUSE bug 863107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864364">SUSE bug 864364</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566636" comment="icedtea-web-1.4.2-0.7.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6497</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6497" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6497" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6497" ref_url="https://www.suse.com/security/cve/CVE-2013-6497" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1571-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1574-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001204.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00023.html" source="SUSE-SU"/>
    <description>
    clamscan in ClamAV before 0.98.5, when using -a option, allows remote attackers to cause a denial of service (crash) as demonstrated by the jwplayer.js file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6497/">CVE-2013-6497</cve>
	<bugzilla href="https://bugzilla.suse.com/1040662">SUSE bug 1040662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906077">SUSE bug 906077</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592218" comment="clamav-0.98.5-0.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6629</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6629" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6629" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6629" ref_url="https://www.suse.com/security/cve/CVE-2013-6629" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1776-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1861-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1916-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1917-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1918-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1957-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00119.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1958-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1959-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0008-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0065-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    The get_sos function in jdmarker.c in (1) libjpeg 6b and (2) libjpeg-turbo through 1.3.0, as used in Google Chrome before 31.0.1650.48, Ghostscript, and other products, does not check for certain duplications of component data during the reading of segments that follow Start Of Scan (SOS) JPEG markers, which allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted JPEG image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-12"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6629/">CVE-2013-6629</cve>
	<bugzilla href="https://bugzilla.suse.com/850430">SUSE bug 850430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880246">SUSE bug 880246</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592272" comment="java-1_7_0-openjdk-1.7.0.6-0.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592273" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592274" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6671</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6671" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6671" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6671" ref_url="https://www.suse.com/security/cve/CVE-2013-6671" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1919-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1916-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1917-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1918-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1957-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00119.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1958-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1959-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0008-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The nsGfxScrollFrameInner::IsLTR function in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code via crafted use of JavaScript code for ordered list elements.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-6671/">CVE-2013-6671</cve>
	<bugzilla href="https://bugzilla.suse.com/854370">SUSE bug 854370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566500" comment="MozillaFirefox-24.2.0esr-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566501" comment="MozillaFirefox-branding-SLED-24-0.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566502" comment="MozillaFirefox-translations-24.2.0esr-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566503" comment="libfreebl3-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566504" comment="libfreebl3-32bit-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566505" comment="libsoftokn3-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566506" comment="libsoftokn3-32bit-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566507" comment="mozilla-nss-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566508" comment="mozilla-nss-32bit-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566509" comment="mozilla-nss-tools-3.15.3.1-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6672</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6672" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6672" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6672" ref_url="https://www.suse.com/security/cve/CVE-2013-6672" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1919-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1916-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1917-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1918-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0008-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 26.0 and SeaMonkey before 2.23 on Linux allow user-assisted remote attackers to read clipboard data by leveraging certain middle-click paste operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6672/">CVE-2013-6672</cve>
	<bugzilla href="https://bugzilla.suse.com/854370">SUSE bug 854370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566500" comment="MozillaFirefox-24.2.0esr-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566501" comment="MozillaFirefox-branding-SLED-24-0.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566502" comment="MozillaFirefox-translations-24.2.0esr-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566503" comment="libfreebl3-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566504" comment="libfreebl3-32bit-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566505" comment="libsoftokn3-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566506" comment="libsoftokn3-32bit-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566507" comment="mozilla-nss-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566508" comment="mozilla-nss-32bit-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566509" comment="mozilla-nss-tools-3.15.3.1-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6673</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6673" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6673" ref_url="https://www.suse.com/security/cve/CVE-2013-6673" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1919-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1916-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1917-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1918-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1957-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00119.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1958-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1959-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0008-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 do not recognize a user's removal of trust from an EV X.509 certificate, which makes it easier for man-in-the-middle attackers to spoof SSL servers in opportunistic circumstances via a valid certificate that is unacceptable to the user.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6673/">CVE-2013-6673</cve>
	<bugzilla href="https://bugzilla.suse.com/854370">SUSE bug 854370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566500" comment="MozillaFirefox-24.2.0esr-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566501" comment="MozillaFirefox-branding-SLED-24-0.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566502" comment="MozillaFirefox-translations-24.2.0esr-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566503" comment="libfreebl3-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566504" comment="libfreebl3-32bit-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566505" comment="libsoftokn3-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566506" comment="libsoftokn3-32bit-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566507" comment="mozilla-nss-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566508" comment="mozilla-nss-32bit-3.15.3.1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566509" comment="mozilla-nss-tools-3.15.3.1-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6885</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6885" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6885" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6885" ref_url="https://www.suse.com/security/cve/CVE-2013-6885" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0372-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0531-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0537-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0482-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0483-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0766-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00013.html" source="SUSE-SU"/>
    <description>
    The microcode on AMD 16h 00h through 0Fh processors does not properly handle the interaction between locked instructions and write-combined memory types, which allows local users to cause a denial of service (system hang) via a crafted application, aka the errata 793 issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6885/">CVE-2013-6885</cve>
	<bugzilla href="https://bugzilla.suse.com/849668">SUSE bug 849668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852967">SUSE bug 852967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853049">SUSE bug 853049</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591945" comment="kernel-default-3.0.101-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591946" comment="kernel-default-base-3.0.101-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591947" comment="kernel-default-devel-3.0.101-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591948" comment="kernel-default-extra-3.0.101-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591949" comment="kernel-source-3.0.101-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591950" comment="kernel-syms-3.0.101-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591951" comment="kernel-trace-devel-3.0.101-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591952" comment="kernel-xen-3.0.101-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591953" comment="kernel-xen-base-3.0.101-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591954" comment="kernel-xen-devel-3.0.101-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591955" comment="kernel-xen-extra-3.0.101-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567225" comment="xen-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567226" comment="xen-doc-html-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567227" comment="xen-doc-pdf-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591956" comment="xen-kmp-default-4.2.4_02_3.0.101_0.21-0.7.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567230" comment="xen-libs-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567231" comment="xen-libs-32bit-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567232" comment="xen-tools-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567233" comment="xen-tools-domU-4.2.4_02-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6954</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6954" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6954" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6954" ref_url="https://www.suse.com/security/cve/CVE-2013-6954" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0100-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    The png_do_expand_palette function in libpng before 1.6.8 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via (1) a PLTE chunk of zero bytes or (2) a NULL palette, related to pngrtran.c and pngset.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6954/">CVE-2013-6954</cve>
	<bugzilla href="https://bugzilla.suse.com/856522">SUSE bug 856522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592272" comment="java-1_7_0-openjdk-1.7.0.6-0.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592273" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592274" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137027" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7027</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-7027" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7027" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-7027" ref_url="https://www.suse.com/security/cve/CVE-2013-7027" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0204-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00045.html" source="SUSE-SU"/>
    <description>
    The ieee80211_radiotap_iterator_init function in net/wireless/radiotap.c in the Linux kernel before 3.11.7 does not check whether a frame contains any data outside of the header, which might allow attackers to cause a denial of service (buffer over-read) via a crafted header.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7027/">CVE-2013-7027</cve>
	<bugzilla href="https://bugzilla.suse.com/854634">SUSE bug 854634</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591274" comment="kernel-default-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591275" comment="kernel-default-base-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591276" comment="kernel-default-devel-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591277" comment="kernel-default-extra-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591278" comment="kernel-source-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591279" comment="kernel-syms-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591280" comment="kernel-trace-devel-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591281" comment="kernel-xen-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591282" comment="kernel-xen-base-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591283" comment="kernel-xen-devel-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591284" comment="kernel-xen-extra-3.0.101-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591285" comment="xen-kmp-default-4.2.3_08_3.0.101_0.15-0.7.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591868" comment="kernel-default-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591869" comment="kernel-default-base-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591870" comment="kernel-default-devel-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591871" comment="kernel-default-extra-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591872" comment="kernel-source-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591873" comment="kernel-syms-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591874" comment="kernel-trace-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591875" comment="kernel-trace-base-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591876" comment="kernel-trace-devel-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591877" comment="kernel-trace-extra-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591878" comment="kernel-xen-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591879" comment="kernel-xen-base-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591880" comment="kernel-xen-devel-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591881" comment="kernel-xen-extra-3.0.101-0.7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591882" comment="xen-kmp-default-4.1.6_04_3.0.101_0.7.15-0.5.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591883" comment="xen-kmp-trace-4.1.6_04_3.0.101_0.7.15-0.5.12 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7112</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-7112" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7112" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-7112" ref_url="https://www.suse.com/security/cve/CVE-2013-7112" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000692.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0013-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0017-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0020-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00014.html" source="SUSE-SU"/>
    <description>
    The dissect_sip_common function in epan/dissectors/packet-sip.c in the SIP dissector in Wireshark 1.8.x before 1.8.12 and 1.10.x before 1.10.4 does not check for empty lines, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-7112/">CVE-2013-7112</cve>
	<bugzilla href="https://bugzilla.suse.com/856498">SUSE bug 856498</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563168" comment="wireshark-1.8.12-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7113</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-7113" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7113" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-7113" ref_url="https://www.suse.com/security/cve/CVE-2013-7113" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-March/000762.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0013-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0017-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00011.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-bssgp.c in the BSSGP dissector in Wireshark 1.10.x before 1.10.4 incorrectly relies on a global variable, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7113/">CVE-2013-7113</cve>
	<bugzilla href="https://bugzilla.suse.com/856495">SUSE bug 856495</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563168" comment="wireshark-1.8.12-0.2.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592282" comment="wireshark-1.8.12-0.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7114</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-7114" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7114" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-7114" ref_url="https://www.suse.com/security/cve/CVE-2013-7114" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000692.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0013-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0017-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0020-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00014.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in the create_ntlmssp_v2_key function in epan/dissectors/packet-ntlmssp.c in the NTLMSSP v2 dissector in Wireshark 1.8.x before 1.8.12 and 1.10.x before 1.10.4 allow remote attackers to cause a denial of service (application crash) via a long domain name in a packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-7114/">CVE-2013-7114</cve>
	<bugzilla href="https://bugzilla.suse.com/856496">SUSE bug 856496</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563168" comment="wireshark-1.8.12-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7252</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-7252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7252" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-7252" ref_url="https://www.suse.com/security/cve/CVE-2013-7252" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001292.html" source="SUSE-SU"/>
    <description>
    kwalletd in KWallet before KDE Applications 14.12.0 uses Blowfish with ECB mode instead of CBC mode when encrypting the password store, which makes it easier for attackers to guess passwords via a codebook attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7252/">CVE-2013-7252</cve>
	<bugzilla href="https://bugzilla.suse.com/857200">SUSE bug 857200</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566658" comment="kde4-l10n-ar-4.3.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566659" comment="kde4-l10n-cs-4.3.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566660" comment="kde4-l10n-da-4.3.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566661" comment="kde4-l10n-da-data-4.3.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566662" comment="kde4-l10n-da-doc-4.3.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566663" comment="kde4-l10n-de-4.3.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563389" comment="kde4-l10n-de-data-4.3.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563390" comment="kde4-l10n-de-doc-4.3.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566664" comment="kde4-l10n-en_GB-4.3.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566665" comment="kde4-l10n-es-4.3.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566666" comment="kde4-l10n-es-data-4.3.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566667" comment="kde4-l10n-es-doc-4.3.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566668" comment="kde4-l10n-fr-4.3.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566669" comment="kde4-l10n-fr-data-4.3.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566670" comment="kde4-l10n-fr-doc-4.3.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566671" comment="kde4-l10n-hu-4.3.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566672" comment="kde4-l10n-it-4.3.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566673" comment="kde4-l10n-it-data-4.3.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566674" comment="kde4-l10n-it-doc-4.3.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566675" comment="kde4-l10n-ja-4.3.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566676" comment="kde4-l10n-ko-4.3.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566677" comment="kde4-l10n-nb-4.3.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566678" comment="kde4-l10n-nl-4.3.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566679" comment="kde4-l10n-nl-data-4.3.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566680" comment="kde4-l10n-nl-doc-4.3.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566681" comment="kde4-l10n-pl-4.3.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566682" comment="kde4-l10n-pl-data-4.3.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566683" comment="kde4-l10n-pl-doc-4.3.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566684" comment="kde4-l10n-pt-4.3.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566685" comment="kde4-l10n-pt_BR-4.3.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566686" comment="kde4-l10n-pt_BR-data-4.3.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566687" comment="kde4-l10n-pt_BR-doc-4.3.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566688" comment="kde4-l10n-ru-4.3.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566689" comment="kde4-l10n-ru-data-4.3.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566690" comment="kde4-l10n-ru-doc-4.3.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566691" comment="kde4-l10n-sv-4.3.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566692" comment="kde4-l10n-sv-data-4.3.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566693" comment="kde4-l10n-sv-doc-4.3.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566694" comment="kde4-l10n-zh_CN-4.3.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566695" comment="kde4-l10n-zh_TW-4.3.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566696" comment="kdebase4-runtime-4.3.5-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566697" comment="kdebase4-runtime-xine-4.3.5-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137263" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7263</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-7263" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7263" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-7263" ref_url="https://www.suse.com/security/cve/CVE-2013-7263" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0531-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0537-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0766-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    The Linux kernel before 3.12.4 updates certain length values before ensuring that associated data structures have been initialized, which allows local users to obtain sensitive information from kernel stack memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call, related to net/ipv4/ping.c, net/ipv4/raw.c, net/ipv4/udp.c, net/ipv6/raw.c, and net/ipv6/udp.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7263/">CVE-2013-7263</cve>
	<bugzilla href="https://bugzilla.suse.com/853040">SUSE bug 853040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/857643">SUSE bug 857643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592285" comment="kernel-default-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592286" comment="kernel-default-base-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592287" comment="kernel-default-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592288" comment="kernel-default-extra-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592289" comment="kernel-pae-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592290" comment="kernel-pae-base-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592291" comment="kernel-pae-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592292" comment="kernel-pae-extra-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592293" comment="kernel-source-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592294" comment="kernel-syms-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592295" comment="kernel-trace-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592296" comment="kernel-xen-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592297" comment="kernel-xen-base-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592298" comment="kernel-xen-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592299" comment="kernel-xen-extra-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592300" comment="xen-kmp-default-4.2.5_04_3.0.101_0.47.50-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592301" comment="xen-kmp-pae-4.2.5_04_3.0.101_0.47.50-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137264" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7264</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-7264" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7264" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-7264" ref_url="https://www.suse.com/security/cve/CVE-2013-7264" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0531-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0537-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000880.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0766-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00013.html" source="SUSE-SU"/>
    <description>
    The l2tp_ip_recvmsg function in net/l2tp/l2tp_ip.c in the Linux kernel before 3.12.4 updates a certain length value before ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel stack memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7264/">CVE-2013-7264</cve>
	<bugzilla href="https://bugzilla.suse.com/853040">SUSE bug 853040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/857643">SUSE bug 857643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591945" comment="kernel-default-3.0.101-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591946" comment="kernel-default-base-3.0.101-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591947" comment="kernel-default-devel-3.0.101-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591948" comment="kernel-default-extra-3.0.101-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591949" comment="kernel-source-3.0.101-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591950" comment="kernel-syms-3.0.101-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591951" comment="kernel-trace-devel-3.0.101-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591952" comment="kernel-xen-3.0.101-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591953" comment="kernel-xen-base-3.0.101-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591954" comment="kernel-xen-devel-3.0.101-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591955" comment="kernel-xen-extra-3.0.101-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591956" comment="xen-kmp-default-4.2.4_02_3.0.101_0.21-0.7.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7265</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-7265" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7265" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-7265" ref_url="https://www.suse.com/security/cve/CVE-2013-7265" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0531-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0537-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000880.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0766-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00013.html" source="SUSE-SU"/>
    <description>
    The pn_recvmsg function in net/phonet/datagram.c in the Linux kernel before 3.12.4 updates a certain length value before ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel stack memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7265/">CVE-2013-7265</cve>
	<bugzilla href="https://bugzilla.suse.com/853040">SUSE bug 853040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/857643">SUSE bug 857643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591945" comment="kernel-default-3.0.101-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591946" comment="kernel-default-base-3.0.101-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591947" comment="kernel-default-devel-3.0.101-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591948" comment="kernel-default-extra-3.0.101-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591949" comment="kernel-source-3.0.101-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591950" comment="kernel-syms-3.0.101-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591951" comment="kernel-trace-devel-3.0.101-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591952" comment="kernel-xen-3.0.101-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591953" comment="kernel-xen-base-3.0.101-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591954" comment="kernel-xen-devel-3.0.101-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591955" comment="kernel-xen-extra-3.0.101-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591956" comment="xen-kmp-default-4.2.4_02_3.0.101_0.21-0.7.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7339</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-7339" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7339" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-7339" ref_url="https://www.suse.com/security/cve/CVE-2013-7339" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0766-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0840-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0856-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00000.html" source="SUSE-SU"/>
    <description>
    The rds_ib_laddr_check function in net/rds/ib.c in the Linux kernel before 3.12.8 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a bind system call for an RDS socket on a system that lacks RDS transports.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7339/">CVE-2013-7339</cve>
	<bugzilla href="https://bugzilla.suse.com/869563">SUSE bug 869563</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589697" comment="kernel-default-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589698" comment="kernel-default-base-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589699" comment="kernel-default-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589700" comment="kernel-default-extra-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589701" comment="kernel-source-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589702" comment="kernel-syms-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589703" comment="kernel-trace-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589704" comment="kernel-xen-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589705" comment="kernel-xen-base-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589706" comment="kernel-xen-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589707" comment="kernel-xen-extra-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589708" comment="xen-kmp-default-4.2.4_02_3.0.101_0.35-0.7.45 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7353</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-7353" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7353" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-7353" ref_url="https://www.suse.com/security/cve/CVE-2013-7353" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000833.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0604-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0616-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0618-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00026.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the png_set_unknown_chunks function in libpng/pngset.c in libpng before 1.5.14beta08 allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a crafted image, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7353/">CVE-2013-7353</cve>
	<bugzilla href="https://bugzilla.suse.com/873124">SUSE bug 873124</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566849" comment="libpng12-0-1.2.31-5.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566850" comment="libpng12-0-32bit-1.2.31-5.33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7354</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-7354" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7354" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-7354" ref_url="https://www.suse.com/security/cve/CVE-2013-7354" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000833.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0604-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0616-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0618-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00026.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in libpng before 1.5.14rc03 allow remote attackers to cause a denial of service (crash) via a crafted image to the (1) png_set_sPLT or (2) png_set_text_2 function, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7354/">CVE-2013-7354</cve>
	<bugzilla href="https://bugzilla.suse.com/873123">SUSE bug 873123</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566849" comment="libpng12-0-1.2.31-5.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566850" comment="libpng12-0-32bit-1.2.31-5.33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7422</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-7422" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7422" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-7422" ref_url="https://www.suse.com/security/cve/CVE-2013-7422" source="SUSE CVE"/>
    <description>
    Integer underflow in regcomp.c in Perl before 5.20, as used in Apple OS X before 10.10.5 and other products, allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via a long digit string associated with an invalid backreference within a regular expression.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7422/">CVE-2013-7422</cve>
	<bugzilla href="https://bugzilla.suse.com/915514">SUSE bug 915514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334114" comment="perl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7423</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-7423" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7423" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-7423" ref_url="https://www.suse.com/security/cve/CVE-2013-7423" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001305.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0351-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00089.html" source="SUSE-SU"/>
    <description>
    The send_dg function in resolv/res_send.c in GNU C Library (aka glibc or libc6) before 2.20 does not properly reuse file descriptors, which allows remote attackers to send DNS queries to unintended locations via a large number of requests that trigger a call to the getaddrinfo function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7423/">CVE-2013-7423</cve>
	<bugzilla href="https://bugzilla.suse.com/915526">SUSE bug 915526</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592352" comment="glibc-2.11.3-17.82.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592353" comment="glibc-32bit-2.11.3-17.82.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592354" comment="glibc-devel-2.11.3-17.82.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592355" comment="glibc-devel-32bit-2.11.3-17.82.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592356" comment="glibc-i18ndata-2.11.3-17.82.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592357" comment="glibc-locale-2.11.3-17.82.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592358" comment="glibc-locale-32bit-2.11.3-17.82.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592359" comment="nscd-2.11.3-17.82.11 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7439</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-7439" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7439" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-7439" ref_url="https://www.suse.com/security/cve/CVE-2013-7439" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001521.html" source="SUSE-SU"/>
    <description>
    Multiple off-by-one errors in the (1) MakeBigReq and (2) SetReqLen macros in include/X11/Xlibint.h in X11R6.x and libX11 before 1.6.0 allow remote attackers to have unspecified impact via a crafted request, which triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7439/">CVE-2013-7439</cve>
	<bugzilla href="https://bugzilla.suse.com/927126">SUSE bug 927126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927220">SUSE bug 927220</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567274" comment="xorg-x11-libX11-7.4-5.11.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567275" comment="xorg-x11-libX11-32bit-7.4-5.11.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334055" comment="xorg-x11 is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567274" comment="xorg-x11-libX11-7.4-5.11.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567275" comment="xorg-x11-libX11-32bit-7.4-5.11.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7440</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-7440" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7440" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-7440" ref_url="https://www.suse.com/security/cve/CVE-2013-7440" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001606.html" source="SUSE-SU"/>
    <description>
    The ssl.match_hostname function in CPython (aka Python) before 2.7.9 and 3.x before 3.3.3 does not properly handle wildcards in hostnames, which might allow man-in-the-middle attackers to spoof servers via a crafted certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7440/">CVE-2013-7440</cve>
	<bugzilla href="https://bugzilla.suse.com/930189">SUSE bug 930189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930207">SUSE bug 930207</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567099" comment="python-setuptools-0.6c11-6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7443</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-7443" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7443" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-7443" ref_url="https://www.suse.com/security/cve/CVE-2013-7443" source="SUSE CVE"/>
    <description>
    Buffer overflow in the skip-scan optimization in SQLite 3.8.2 allows remote attackers to cause a denial of service (crash) via crafted SQL statements.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-7443/">CVE-2013-7443</cve>
	<bugzilla href="https://bugzilla.suse.com/938555">SUSE bug 938555</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333981" comment="sqlite2 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7446</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-7446" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7446" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-7446" ref_url="https://www.suse.com/security/cve/CVE-2013-7446" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0585-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0746-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0747-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0749-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0751-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0752-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0753-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0754-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0755-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0756-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0757-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1994-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2000-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2001-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2002-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2003-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2006-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2009-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2014-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1641-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel before 4.3.3 allows local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7446/">CVE-2013-7446</cve>
	<bugzilla href="https://bugzilla.suse.com/955654">SUSE bug 955654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955837">SUSE bug 955837</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567353" comment="kernel-default-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567354" comment="kernel-default-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567355" comment="kernel-default-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567356" comment="kernel-default-extra-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567357" comment="kernel-pae-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567358" comment="kernel-pae-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567359" comment="kernel-pae-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567360" comment="kernel-pae-extra-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567361" comment="kernel-source-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567362" comment="kernel-syms-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567363" comment="kernel-trace-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567364" comment="kernel-xen-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567365" comment="kernel-xen-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567366" comment="kernel-xen-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567367" comment="kernel-xen-extra-3.0.101-71.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0001</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0001" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0001" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0001" ref_url="https://www.suse.com/security/cve/CVE-2014-0001" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00012.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in client/mysql.cc in Oracle MySQL and MariaDB before 5.5.35 allows remote database servers to cause a denial of service (crash) and possibly execute arbitrary code via a long server version string.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0001/">CVE-2014-0001</cve>
	<bugzilla href="https://bugzilla.suse.com/861493">SUSE bug 861493</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591847" comment="libmysql55client18-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591848" comment="libmysql55client18-32bit-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591849" comment="libmysql55client_r18-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591850" comment="libmysql55client_r18-32bit-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591851" comment="libmysqlclient15-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591852" comment="libmysqlclient15-32bit-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591853" comment="libmysqlclient_r15-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591854" comment="libmysqlclient_r15-32bit-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591855" comment="mysql-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591856" comment="mysql-client-5.5.37-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0015</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0015" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0015" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0015" ref_url="https://www.suse.com/security/cve/CVE-2014-0015" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0175-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000718.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0267-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0274-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00066.html" source="SUSE-SU"/>
    <description>
    cURL and libcurl 7.10.6 through 7.34.0, when more than one authentication method is enabled, re-uses NTLM connections, which might allow context-dependent attackers to authenticate as other users via a request.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0015/">CVE-2014-0015</cve>
	<bugzilla href="https://bugzilla.suse.com/858673">SUSE bug 858673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/868627">SUSE bug 868627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880252">SUSE bug 880252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882520">SUSE bug 882520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927556">SUSE bug 927556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962983">SUSE bug 962983</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565908" comment="curl-7.19.7-1.20.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565909" comment="libcurl4-7.19.7-1.20.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565910" comment="libcurl4-32bit-7.19.7-1.20.31.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592401" comment="curl-7.19.7-1.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592402" comment="libcurl4-7.19.7-1.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592403" comment="libcurl4-32bit-7.19.7-1.32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0017</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0017" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0017" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0017" ref_url="https://www.suse.com/security/cve/CVE-2014-0017" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-March/000758.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0366-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0370-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00040.html" source="SUSE-SU"/>
    <description>
    The RAND_bytes function in libssh before 0.6.3, when forking is enabled, does not properly reset the state of the OpenSSL pseudo-random number generator (PRNG), which causes the state to be shared between children processes and allows local users to obtain sensitive information by leveraging a pid collision.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0017/">CVE-2014-0017</cve>
	<bugzilla href="https://bugzilla.suse.com/866278">SUSE bug 866278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866286">SUSE bug 866286</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566920" comment="libssh2-0.2-5.20.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0019</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0019" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0019" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0019" ref_url="https://www.suse.com/security/cve/CVE-2014-0019" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001850.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0760-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-04/msg00043.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in socat 1.3.0.0 through 1.7.2.2 and 2.0.0-b1 through 2.0.0-b6 allows local users to cause a denial of service (segmentation fault) via a long server name in the PROXY-CONNECT address in the command line.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-0019/">CVE-2014-0019</cve>
	<bugzilla href="https://bugzilla.suse.com/860991">SUSE bug 860991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927161">SUSE bug 927161</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567448" comment="socat-1.7.0.0-1.18.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0020</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0020" ref_url="https://www.suse.com/security/cve/CVE-2014-0020" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000828.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0239-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0326-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00005.html" source="SUSE-SU"/>
    <description>
    The IRC protocol plugin in libpurple in Pidgin before 2.10.8 does not validate argument counts, which allows remote IRC servers to cause a denial of service (application crash) via a crafted message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0020/">CVE-2014-0020</cve>
	<bugzilla href="https://bugzilla.suse.com/861019">SUSE bug 861019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566424" comment="finch-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566425" comment="libpurple-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566426" comment="libpurple-lang-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566427" comment="libpurple-meanwhile-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566428" comment="libpurple-tcl-2.6.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566429" comment="pidgin-2.6.6-0.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0055</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0055" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0055" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0055" ref_url="https://www.suse.com/security/cve/CVE-2014-0055" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000987.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0840-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0856-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1246-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00056.html" source="SUSE-SU"/>
    <description>
    The get_rx_bufs function in drivers/vhost/net.c in the vhost-net subsystem in the Linux kernel package before 2.6.32-431.11.2 on Red Hat Enterprise Linux (RHEL) 6 does not properly handle vhost_get_vq_desc errors, which allows guest OS users to cause a denial of service (host OS crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0055/">CVE-2014-0055</cve>
	<bugzilla href="https://bugzilla.suse.com/870173">SUSE bug 870173</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589697" comment="kernel-default-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589698" comment="kernel-default-base-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589699" comment="kernel-default-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589700" comment="kernel-default-extra-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589701" comment="kernel-source-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589702" comment="kernel-syms-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589703" comment="kernel-trace-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589704" comment="kernel-xen-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589705" comment="kernel-xen-base-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589706" comment="kernel-xen-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589707" comment="kernel-xen-extra-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589708" comment="xen-kmp-default-4.2.4_02_3.0.101_0.35-0.7.45 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0060</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0060" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0060" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0060" ref_url="https://www.suse.com/security/cve/CVE-2014-0060" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-March/000773.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0345-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0368-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00038.html" source="SUSE-SU"/>
    <description>
    PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 does not properly enforce the ADMIN OPTION restriction, which allows remote authenticated members of a role to add or remove arbitrary users to that role by calling the SET ROLE command before the associated GRANT command.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0060/">CVE-2014-0060</cve>
	<bugzilla href="https://bugzilla.suse.com/864845">SUSE bug 864845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864856">SUSE bug 864856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566807" comment="libecpg6-9.1.12-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566808" comment="libpq5-9.1.12-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566809" comment="libpq5-32bit-9.1.12-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566810" comment="postgresql91-9.1.12-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566811" comment="postgresql91-docs-9.1.12-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0061</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0061" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0061" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0061" ref_url="https://www.suse.com/security/cve/CVE-2014-0061" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-March/000773.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0345-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0368-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00038.html" source="SUSE-SU"/>
    <description>
    The validator functions for the procedural languages (PLs) in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to gain privileges via a function that is (1) defined in another language or (2) not allowed to be directly called by the user due to permissions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0061/">CVE-2014-0061</cve>
	<bugzilla href="https://bugzilla.suse.com/864846">SUSE bug 864846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864856">SUSE bug 864856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566807" comment="libecpg6-9.1.12-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566808" comment="libpq5-9.1.12-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566809" comment="libpq5-32bit-9.1.12-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566810" comment="postgresql91-9.1.12-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566811" comment="postgresql91-docs-9.1.12-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0062</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0062" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0062" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0062" ref_url="https://www.suse.com/security/cve/CVE-2014-0062" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-March/000773.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0345-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0368-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00038.html" source="SUSE-SU"/>
    <description>
    Race condition in the (1) CREATE INDEX and (2) unspecified ALTER TABLE commands in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allows remote authenticated users to create an unauthorized index or read portions of unauthorized tables by creating or deleting a table with the same name during the timing window.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0062/">CVE-2014-0062</cve>
	<bugzilla href="https://bugzilla.suse.com/864847">SUSE bug 864847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864856">SUSE bug 864856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566807" comment="libecpg6-9.1.12-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566808" comment="libpq5-9.1.12-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566809" comment="libpq5-32bit-9.1.12-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566810" comment="postgresql91-9.1.12-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566811" comment="postgresql91-docs-9.1.12-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0063</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0063" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0063" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0063" ref_url="https://www.suse.com/security/cve/CVE-2014-0063" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-March/000773.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0345-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0368-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00038.html" source="SUSE-SU"/>
    <description>
    Multiple stack-based buffer overflows in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via vectors related to an incorrect MAXDATELEN constant and datetime values involving (1) intervals, (2) timestamps, or (3) timezones, a different vulnerability than CVE-2014-0065.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0063/">CVE-2014-0063</cve>
	<bugzilla href="https://bugzilla.suse.com/864850">SUSE bug 864850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864856">SUSE bug 864856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566807" comment="libecpg6-9.1.12-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566808" comment="libpq5-9.1.12-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566809" comment="libpq5-32bit-9.1.12-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566810" comment="postgresql91-9.1.12-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566811" comment="postgresql91-docs-9.1.12-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0064</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0064" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0064" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0064" ref_url="https://www.suse.com/security/cve/CVE-2014-0064" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-March/000773.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0345-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0368-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00038.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the path_in and other unspecified functions in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to have unspecified impact and attack vectors, which trigger a buffer overflow.  NOTE: this identifier has been SPLIT due to different affected versions; use CVE-2014-2669 for the hstore vector.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0064/">CVE-2014-0064</cve>
	<bugzilla href="https://bugzilla.suse.com/864851">SUSE bug 864851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864856">SUSE bug 864856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871307">SUSE bug 871307</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566807" comment="libecpg6-9.1.12-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566808" comment="libpq5-9.1.12-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566809" comment="libpq5-32bit-9.1.12-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566810" comment="postgresql91-9.1.12-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566811" comment="postgresql91-docs-9.1.12-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0065</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0065" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0065" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0065" ref_url="https://www.suse.com/security/cve/CVE-2014-0065" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-March/000773.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0345-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0368-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00038.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to have unspecified impact and attack vectors, a different vulnerability than CVE-2014-0063.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0065/">CVE-2014-0065</cve>
	<bugzilla href="https://bugzilla.suse.com/864852">SUSE bug 864852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864856">SUSE bug 864856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566807" comment="libecpg6-9.1.12-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566808" comment="libpq5-9.1.12-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566809" comment="libpq5-32bit-9.1.12-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566810" comment="postgresql91-9.1.12-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566811" comment="postgresql91-docs-9.1.12-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0066</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0066" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0066" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0066" ref_url="https://www.suse.com/security/cve/CVE-2014-0066" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-March/000773.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0345-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0368-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00038.html" source="SUSE-SU"/>
    <description>
    The chkpass extension in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 does not properly check the return value of the crypt library function, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0066/">CVE-2014-0066</cve>
	<bugzilla href="https://bugzilla.suse.com/864853">SUSE bug 864853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864856">SUSE bug 864856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566807" comment="libecpg6-9.1.12-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566808" comment="libpq5-9.1.12-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566809" comment="libpq5-32bit-9.1.12-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566810" comment="postgresql91-9.1.12-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566811" comment="postgresql91-docs-9.1.12-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0069</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0069" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0069" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0069" ref_url="https://www.suse.com/security/cve/CVE-2014-0069" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0531-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0537-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0766-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00013.html" source="SUSE-SU"/>
    <description>
    The cifs_iovec_write function in fs/cifs/file.c in the Linux kernel through 3.13.5 does not properly handle uncached write operations that copy fewer than the requested number of bytes, which allows local users to obtain sensitive information from kernel memory, cause a denial of service (memory corruption and system crash), or possibly gain privileges via a writev system call with a crafted pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0069/">CVE-2014-0069</cve>
	<bugzilla href="https://bugzilla.suse.com/864025">SUSE bug 864025</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591945" comment="kernel-default-3.0.101-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591946" comment="kernel-default-base-3.0.101-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591947" comment="kernel-default-devel-3.0.101-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591948" comment="kernel-default-extra-3.0.101-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591949" comment="kernel-source-3.0.101-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591950" comment="kernel-syms-3.0.101-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591951" comment="kernel-trace-devel-3.0.101-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591952" comment="kernel-xen-3.0.101-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591953" comment="kernel-xen-base-3.0.101-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591954" comment="kernel-xen-devel-3.0.101-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591955" comment="kernel-xen-extra-3.0.101-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591956" comment="xen-kmp-default-4.2.4_02_3.0.101_0.21-0.7.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0076</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0076" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0076" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0076" ref_url="https://www.suse.com/security/cve/CVE-2014-0076" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0761-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001012.html" source="SUSE-SU"/>
		<reference ref_id="TID7010166" ref_url="https://www.suse.com/support/kb/doc/?id=7010166" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="TID7015264" ref_url="https://www.suse.com/support/kb/doc?id=7015264" source="SUSE-SU"/>
		<reference ref_id="TID7015300" ref_url="https://www.suse.com/support/kb/doc?id=7015300" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0480-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    The Montgomery ladder implementation in OpenSSL through 1.0.0l does not ensure that certain swap operations have a constant-time behavior, which makes it easier for local users to obtain ECDSA nonces via a FLUSH+RELOAD cache side-channel attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-12"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0076/">CVE-2014-0076</cve>
	<bugzilla href="https://bugzilla.suse.com/869945">SUSE bug 869945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880891">SUSE bug 880891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883126">SUSE bug 883126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885777">SUSE bug 885777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592420" comment="libopenssl0_9_8-0.9.8j-0.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592421" comment="libopenssl0_9_8-32bit-0.9.8j-0.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592422" comment="openssl-0.9.8j-0.54.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0077</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0077" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0077" ref_url="https://www.suse.com/security/cve/CVE-2014-0077" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000987.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0840-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0856-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1246-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00056.html" source="SUSE-SU"/>
    <description>
    drivers/vhost/net.c in the Linux kernel before 3.13.10, when mergeable buffers are disabled, does not properly validate packet lengths, which allows guest OS users to cause a denial of service (memory corruption and host OS crash) or possibly gain privileges on the host OS via crafted packets, related to the handle_rx and get_rx_bufs functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0077/">CVE-2014-0077</cve>
	<bugzilla href="https://bugzilla.suse.com/870173">SUSE bug 870173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870576">SUSE bug 870576</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589697" comment="kernel-default-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589698" comment="kernel-default-base-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589699" comment="kernel-default-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589700" comment="kernel-default-extra-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589701" comment="kernel-source-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589702" comment="kernel-syms-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589703" comment="kernel-trace-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589704" comment="kernel-xen-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589705" comment="kernel-xen-base-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589706" comment="kernel-xen-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589707" comment="kernel-xen-extra-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589708" comment="xen-kmp-default-4.2.4_02_3.0.101_0.35-0.7.45 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0092</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0092" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0092" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0092" ref_url="https://www.suse.com/security/cve/CVE-2014-0092" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0321-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0322-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0445-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0325-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0328-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0346-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00009.html" source="SUSE-SU"/>
    <description>
    lib/x509/verify.c in GnuTLS before 3.1.22 and 3.2.x before 3.2.12 does not properly handle unspecified errors when verifying X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers via a crafted certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0092/">CVE-2014-0092</cve>
	<bugzilla href="https://bugzilla.suse.com/865804">SUSE bug 865804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915878">SUSE bug 915878</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009587393" comment="gnutls-2.4.1-24.39.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009587394" comment="libgnutls26-2.4.1-24.39.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009587395" comment="libgnutls26-32bit-2.4.1-24.39.49.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0101</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0101" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0101" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0101" ref_url="https://www.suse.com/security/cve/CVE-2014-0101" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0766-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00013.html" source="SUSE-SU"/>
    <description>
    The sctp_sf_do_5_1D_ce function in net/sctp/sm_statefuns.c in the Linux kernel through 3.13.6 does not validate certain auth_enable and auth_capable fields before making an sctp_sf_authenticate call, which allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via an SCTP handshake with a modified INIT chunk and a crafted AUTH chunk before a COOKIE_ECHO chunk.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0101/">CVE-2014-0101</cve>
	<bugzilla href="https://bugzilla.suse.com/866102">SUSE bug 866102</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589697" comment="kernel-default-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589698" comment="kernel-default-base-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589699" comment="kernel-default-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589700" comment="kernel-default-extra-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589701" comment="kernel-source-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589702" comment="kernel-syms-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589703" comment="kernel-trace-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589704" comment="kernel-xen-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589705" comment="kernel-xen-base-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589706" comment="kernel-xen-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589707" comment="kernel-xen-extra-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589708" comment="xen-kmp-default-4.2.4_02_3.0.101_0.35-0.7.45 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0106</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0106" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0106" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0106" ref_url="https://www.suse.com/security/cve/CVE-2014-0106" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0475-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0737-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00085.html" source="SUSE-SU"/>
    <description>
    Sudo 1.6.9 before 1.8.5, when env_reset is disabled, does not properly check environment variables for the env_delete restriction, which allows local users with sudo permissions to bypass intended command restrictions via a crafted environment variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0106/">CVE-2014-0106</cve>
	<bugzilla href="https://bugzilla.suse.com/866503">SUSE bug 866503</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567150" comment="sudo-1.7.6p2-0.21.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0107</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0107" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0107" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0107" ref_url="https://www.suse.com/security/cve/CVE-2014-0107" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0870-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0861-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0948-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00038.html" source="SUSE-SU"/>
    <description>
    The TransformerFactory in Apache Xalan-Java before 2.7.2 does not properly restrict access to certain properties when FEATURE_SECURE_PROCESSING is enabled, which allows remote attackers to bypass expected restrictions and load arbitrary classes or access external resources via a crafted (1) xalan:content-header, (2) xalan:entities, (3) xslt:content-header, or (4) xslt:entities property, or a Java property that is bound to the XSLT 1.0 system-property function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0107/">CVE-2014-0107</cve>
	<bugzilla href="https://bugzilla.suse.com/870082">SUSE bug 870082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567162" comment="xalan-j2-2.7.0-217.26.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0131</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0131" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0131" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0131" ref_url="https://www.suse.com/security/cve/CVE-2014-0131" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0957-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the skb_segment function in net/core/skbuff.c in the Linux kernel through 3.13.6 allows attackers to obtain sensitive information from kernel memory by leveraging the absence of a certain orphaning operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0131/">CVE-2014-0131</cve>
	<bugzilla href="https://bugzilla.suse.com/824295">SUSE bug 824295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/867723">SUSE bug 867723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869564">SUSE bug 869564</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589697" comment="kernel-default-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589698" comment="kernel-default-base-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589699" comment="kernel-default-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589700" comment="kernel-default-extra-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589701" comment="kernel-source-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589702" comment="kernel-syms-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589703" comment="kernel-trace-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589704" comment="kernel-xen-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589705" comment="kernel-xen-base-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589706" comment="kernel-xen-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589707" comment="kernel-xen-extra-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589708" comment="xen-kmp-default-4.2.4_02_3.0.101_0.35-0.7.45 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0138</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0138" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0138" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0138" ref_url="https://www.suse.com/security/cve/CVE-2014-0138" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000826.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0530-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0598-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00009.html" source="SUSE-SU"/>
    <description>
    The default configuration in cURL and libcurl 7.10.6 before 7.36.0 re-uses (1) SCP, (2) SFTP, (3) POP3, (4) POP3S, (5) IMAP, (6) IMAPS, (7) SMTP, (8) SMTPS, (9) LDAP, and (10) LDAPS connections, which might allow context-dependent attackers to connect as other users via a request, a similar issue to CVE-2014-0015.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0138/">CVE-2014-0138</cve>
	<bugzilla href="https://bugzilla.suse.com/868627">SUSE bug 868627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880252">SUSE bug 880252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882520">SUSE bug 882520</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566384" comment="curl-7.19.7-1.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566385" comment="libcurl4-7.19.7-1.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566386" comment="libcurl4-32bit-7.19.7-1.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592438" comment="libldap-2_4-2-2.4.26-0.28.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592439" comment="libldap-2_4-2-32bit-2.4.26-0.28.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592440" comment="openldap2-client-2.4.26-0.28.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0139</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0139" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0139" ref_url="https://www.suse.com/security/cve/CVE-2014-0139" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000826.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0530-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0598-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00009.html" source="SUSE-SU"/>
    <description>
    cURL and libcurl 7.1 before 7.36.0, when using the OpenSSL, axtls, qsossl or gskit libraries for TLS, recognize a wildcard IP address in the subject's Common Name (CN) field of an X.509 certificate, which might allow man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0139/">CVE-2014-0139</cve>
	<bugzilla href="https://bugzilla.suse.com/868629">SUSE bug 868629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880252">SUSE bug 880252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882520">SUSE bug 882520</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566384" comment="curl-7.19.7-1.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566385" comment="libcurl4-7.19.7-1.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566386" comment="libcurl4-32bit-7.19.7-1.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592438" comment="libldap-2_4-2-2.4.26-0.28.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592439" comment="libldap-2_4-2-32bit-2.4.26-0.28.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592440" comment="openldap2-client-2.4.26-0.28.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0142</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0142" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0142" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0142" ref_url="https://www.suse.com/security/cve/CVE-2014-0142" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0623-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00002.html" source="SUSE-SU"/>
    <description>
    QEMU, possibly before 2.0.0, allows local users to cause a denial of service (divide-by-zero error and crash) via a zero value in the (1) tracks field to the seek_to_sector function in block/parallels.c or (2) extent_size field in the bochs function in block/bochs.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0142/">CVE-2014-0142</cve>
	<bugzilla href="https://bugzilla.suse.com/870439">SUSE bug 870439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591216" comment="kvm-1.4.2-0.11.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0143</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0143" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0143" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0143" ref_url="https://www.suse.com/security/cve/CVE-2014-0143" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0623-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00002.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the block drivers in QEMU, possibly before 2.0.0, allow local users to cause a denial of service (crash) via a crafted catalog size in (1) the parallels_open function in block/parallels.c or (2) bochs_open function in bochs.c, a large L1 table in the (3) qcow2_snapshot_load_tmp in qcow2-snapshot.c or (4) qcow2_grow_l1_table function in qcow2-cluster.c, (5) a large request in the bdrv_check_byte_request function in block.c and other block drivers, (6) crafted cluster indexes in the get_refcount function in qcow2-refcount.c, or (7) a large number of blocks in the cloop_open function in cloop.c, which trigger buffer overflows, memory corruption, large memory allocations and out-of-bounds read and writes.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0143/">CVE-2014-0143</cve>
	<bugzilla href="https://bugzilla.suse.com/870439">SUSE bug 870439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591216" comment="kvm-1.4.2-0.11.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0144</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0144" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0144" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0144" ref_url="https://www.suse.com/security/cve/CVE-2014-0144" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0623-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00002.html" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-19"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0144/">CVE-2014-0144</cve>
	<bugzilla href="https://bugzilla.suse.com/870439">SUSE bug 870439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591216" comment="kvm-1.4.2-0.11.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0145</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0145" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0145" ref_url="https://www.suse.com/security/cve/CVE-2014-0145" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0623-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00002.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in QEMU before 1.7.2 and 2.x before 2.0.0, allow local users to cause a denial of service (crash) or possibly execute arbitrary code via a large (1) L1 table in the qcow2_snapshot_load_tmp in the QCOW 2 block driver (block/qcow2-snapshot.c) or (2) uncompressed chunk, (3) chunk length, or (4) number of sectors in the DMG block driver (block/dmg.c).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0145/">CVE-2014-0145</cve>
	<bugzilla href="https://bugzilla.suse.com/870439">SUSE bug 870439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591216" comment="kvm-1.4.2-0.11.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0146</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0146" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0146" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0146" ref_url="https://www.suse.com/security/cve/CVE-2014-0146" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0623-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00002.html" source="SUSE-SU"/>
    <description>
    The qcow2_open function in the (block/qcow2.c) in QEMU before 1.7.2 and 2.x before 2.0.0 allows local users to cause a denial of service (NULL pointer dereference) via a crafted image which causes an error, related to the initialization of the snapshot_offset and nb_snapshots fields.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0146/">CVE-2014-0146</cve>
	<bugzilla href="https://bugzilla.suse.com/870439">SUSE bug 870439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591216" comment="kvm-1.4.2-0.11.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0147</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0147" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0147" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0147" ref_url="https://www.suse.com/security/cve/CVE-2014-0147" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0623-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00002.html" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-19"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0147/">CVE-2014-0147</cve>
	<bugzilla href="https://bugzilla.suse.com/870439">SUSE bug 870439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591216" comment="kvm-1.4.2-0.11.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0150</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0150" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0150" ref_url="https://www.suse.com/security/cve/CVE-2014-0150" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000876.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the virtio_net_handle_mac function in hw/net/virtio-net.c in QEMU 2.0 and earlier allows local guest users to execute arbitrary code via a MAC addresses table update request, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0150/">CVE-2014-0150</cve>
	<bugzilla href="https://bugzilla.suse.com/873235">SUSE bug 873235</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592469" comment="kvm-1.4.2-0.15.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0155</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0155" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0155" ref_url="https://www.suse.com/security/cve/CVE-2014-0155" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00016.html" source="SUSE-SU"/>
    <description>
    The ioapic_deliver function in virt/kvm/ioapic.c in the Linux kernel through 3.14.1 does not properly validate the kvm_irq_delivery_to_apic return value, which allows guest OS users to cause a denial of service (host OS crash) via a crafted entry in the redirection table of an I/O APIC.  NOTE: the affected code was moved to the ioapic_service function before the vulnerability was announced.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2014-0155/">CVE-2014-0155</cve>
	<bugzilla href="https://bugzilla.suse.com/824295">SUSE bug 824295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/872540">SUSE bug 872540</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589697" comment="kernel-default-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589698" comment="kernel-default-base-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589699" comment="kernel-default-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589700" comment="kernel-default-extra-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589701" comment="kernel-source-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589702" comment="kernel-syms-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589703" comment="kernel-trace-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589704" comment="kernel-xen-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589705" comment="kernel-xen-base-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589706" comment="kernel-xen-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589707" comment="kernel-xen-extra-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589708" comment="xen-kmp-default-4.2.4_02_3.0.101_0.35-0.7.45 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0178</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0178" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0178" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0178" ref_url="https://www.suse.com/security/cve/CVE-2014-0178" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000917.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0857-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0859-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00005.html" source="SUSE-SU"/>
    <description>
    Samba 3.6.6 through 3.6.23, 4.0.x before 4.0.18, and 4.1.x before 4.1.8, when a certain vfs shadow copy configuration is enabled, does not properly initialize the SRV_SNAPSHOT_ARRAY response field, which allows remote authenticated users to obtain potentially sensitive information from process memory via a (1) FSCTL_GET_SHADOW_COPY_DATA or (2) FSCTL_SRV_ENUMERATE_SNAPSHOTS request.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0178/">CVE-2014-0178</cve>
	<bugzilla href="https://bugzilla.suse.com/872396">SUSE bug 872396</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592471" comment="libldb1-3.6.3-0.52.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592472" comment="libldb1-32bit-3.6.3-0.52.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592473" comment="libsmbclient0-3.6.3-0.52.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592474" comment="libsmbclient0-32bit-3.6.3-0.52.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592475" comment="libtalloc2-3.6.3-0.52.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592476" comment="libtalloc2-32bit-3.6.3-0.52.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592477" comment="libtdb1-3.6.3-0.52.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592478" comment="libtdb1-32bit-3.6.3-0.52.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592479" comment="libtevent0-3.6.3-0.52.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592480" comment="libtevent0-32bit-3.6.3-0.52.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592481" comment="libwbclient0-3.6.3-0.52.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592482" comment="libwbclient0-32bit-3.6.3-0.52.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592483" comment="samba-3.6.3-0.52.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592484" comment="samba-32bit-3.6.3-0.52.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592485" comment="samba-client-3.6.3-0.52.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592486" comment="samba-client-32bit-3.6.3-0.52.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592487" comment="samba-doc-3.6.3-0.52.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592488" comment="samba-krb-printing-3.6.3-0.52.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592489" comment="samba-winbind-3.6.3-0.52.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592490" comment="samba-winbind-32bit-3.6.3-0.52.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0179</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0179" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0179" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0179" ref_url="https://www.suse.com/security/cve/CVE-2014-0179" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000863.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0650-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0674-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00052.html" source="SUSE-SU"/>
    <description>
    libvirt 0.7.5 through 1.2.x before 1.2.5 allows local users to cause a denial of service (read block and hang) via a crafted XML document containing an XML external entity declaration in conjunction with an entity reference to the (1) virConnectCompareCPU or (2) virConnectBaselineCPU API method, related to an XML External Entity (XXE) issue.  NOTE: this issue was SPLIT per ADT3 due to different affected versions of some vectors. CVE-2014-5177 is used for other API methods.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0179/">CVE-2014-0179</cve>
	<bugzilla href="https://bugzilla.suse.com/873705">SUSE bug 873705</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566926" comment="libvirt-1.0.5.9-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566927" comment="libvirt-client-1.0.5.9-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566928" comment="libvirt-client-32bit-1.0.5.9-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566929" comment="libvirt-doc-1.0.5.9-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566930" comment="libvirt-python-1.0.5.9-0.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0181</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0181" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0181" ref_url="https://www.suse.com/security/cve/CVE-2014-0181" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    The Netlink implementation in the Linux kernel through 3.14.1 does not provide a mechanism for authorizing socket operations based on the opener of a socket, which allows local users to bypass intended access restrictions and modify network configurations by using a Netlink socket for the (1) stdout or (2) stderr of a setuid program.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0181/">CVE-2014-0181</cve>
	<bugzilla href="https://bugzilla.suse.com/875051">SUSE bug 875051</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592521" comment="kernel-bigsmp-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592285" comment="kernel-default-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592286" comment="kernel-default-base-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592287" comment="kernel-default-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592288" comment="kernel-default-extra-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592289" comment="kernel-pae-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592290" comment="kernel-pae-base-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592291" comment="kernel-pae-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592292" comment="kernel-pae-extra-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592293" comment="kernel-source-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592294" comment="kernel-syms-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592295" comment="kernel-trace-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592296" comment="kernel-xen-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592297" comment="kernel-xen-base-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592298" comment="kernel-xen-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592299" comment="kernel-xen-extra-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592300" comment="xen-kmp-default-4.2.5_04_3.0.101_0.47.50-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592301" comment="xen-kmp-pae-4.2.5_04_3.0.101_0.47.50-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0190</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0190" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0190" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0190" ref_url="https://www.suse.com/security/cve/CVE-2014-0190" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:0573-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00068.html" source="SUSE-SU"/>
    <description>
    The GIF decoder in QtGui in Qt before 5.3 allows remote attackers to cause a denial of service (NULL pointer dereference) via invalid width and height values in a GIF image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-0190/">CVE-2014-0190</cve>
	<bugzilla href="https://bugzilla.suse.com/875470">SUSE bug 875470</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334121" comment="libqt4 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0196</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0196" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0196" ref_url="https://www.suse.com/security/cve/CVE-2014-0196" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0667-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0683-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="TID7015061" ref_url="https://www.suse.com/support/kb/doc?id=7015061" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0766-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00013.html" source="SUSE-SU"/>
    <description>
    The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO &amp; !OPOST" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0196/">CVE-2014-0196</cve>
	<bugzilla href="https://bugzilla.suse.com/871252">SUSE bug 871252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/875690">SUSE bug 875690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877345">SUSE bug 877345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879878">SUSE bug 879878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933423">SUSE bug 933423</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592539" comment="kernel-default-3.0.101-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592540" comment="kernel-default-base-3.0.101-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592541" comment="kernel-default-devel-3.0.101-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592542" comment="kernel-default-extra-3.0.101-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592543" comment="kernel-source-3.0.101-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592544" comment="kernel-syms-3.0.101-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592545" comment="kernel-trace-devel-3.0.101-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592546" comment="kernel-xen-3.0.101-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592547" comment="kernel-xen-base-3.0.101-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592548" comment="kernel-xen-devel-3.0.101-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592549" comment="kernel-xen-extra-3.0.101-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592550" comment="xen-kmp-default-4.2.4_02_3.0.101_0.29-0.7.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0205</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0205" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0205" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0205" ref_url="https://www.suse.com/security/cve/CVE-2014-0205" source="SUSE CVE"/>
    <description>
    The futex_wait function in kernel/futex.c in the Linux kernel before 2.6.37 does not properly maintain a certain reference count during requeue operations, which allows local users to cause a denial of service (use-after-free and system crash) or possibly gain privileges via a crafted application that triggers a zero count.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0205/">CVE-2014-0205</cve>
	<bugzilla href="https://bugzilla.suse.com/895955">SUSE bug 895955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0209</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0209" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0209" ref_url="https://www.suse.com/security/cve/CVE-2014-0209" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000904.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0711-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00073.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the (1) FontFileAddEntry and (2) lexAlias functions in X.Org libXfont before 1.4.8 and 1.4.9x before 1.4.99.901 might allow local users to gain privileges by adding a directory with a large fonts.dir or fonts.alias file to the font path, which triggers a heap-based buffer overflow, related to metadata.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0209/">CVE-2014-0209</cve>
	<bugzilla href="https://bugzilla.suse.com/857544">SUSE bug 857544</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567272" comment="xorg-x11-libs-7.4-8.26.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567273" comment="xorg-x11-libs-32bit-7.4-8.26.42.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0210</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0210" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0210" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0210" ref_url="https://www.suse.com/security/cve/CVE-2014-0210" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000904.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0711-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00073.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in X.Org libXfont before 1.4.8 and 1.4.9x before 1.4.99.901 allow remote font servers to execute arbitrary code via a crafted xfs protocol reply to the (1) _fs_recv_conn_setup, (2) fs_read_open_font, (3) fs_read_query_info, (4) fs_read_extent_info, (5) fs_read_glyphs, (6) fs_read_list, or (7) fs_read_list_info function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0210/">CVE-2014-0210</cve>
	<bugzilla href="https://bugzilla.suse.com/857544">SUSE bug 857544</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567272" comment="xorg-x11-libs-7.4-8.26.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567273" comment="xorg-x11-libs-32bit-7.4-8.26.42.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0211</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0211" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0211" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0211" ref_url="https://www.suse.com/security/cve/CVE-2014-0211" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000904.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0711-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00073.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the (1) fs_get_reply, (2) fs_alloc_glyphs, and (3) fs_read_extent_info functions in X.Org libXfont before 1.4.8 and 1.4.9x before 1.4.99.901 allow remote font servers to execute arbitrary code via a crafted xfs reply, which triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0211/">CVE-2014-0211</cve>
	<bugzilla href="https://bugzilla.suse.com/857544">SUSE bug 857544</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567272" comment="xorg-x11-libs-7.4-8.26.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567273" comment="xorg-x11-libs-32bit-7.4-8.26.42.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0221</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0221" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0221" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0221" ref_url="https://www.suse.com/security/cve/CVE-2014-0221" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0759-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0759-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0761-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0762-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="TID7008708" ref_url="https://www.suse.com/support/kb/doc/?id=7008708" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="TID7015162" ref_url="https://www.suse.com/support/kb/doc?id=7015162" source="SUSE-SU"/>
		<reference ref_id="TID7015189" ref_url="https://www.suse.com/support/kb/doc?id=7015189" source="SUSE-SU"/>
		<reference ref_id="TID7015264" ref_url="https://www.suse.com/support/kb/doc?id=7015264" source="SUSE-SU"/>
		<reference ref_id="TID7015300" ref_url="https://www.suse.com/support/kb/doc?id=7015300" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0765-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    The dtls1_get_message_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h allows remote attackers to cause a denial of service (recursion and client crash) via a DTLS hello message in an invalid DTLS handshake.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-12"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0221/">CVE-2014-0221</cve>
	<bugzilla href="https://bugzilla.suse.com/880891">SUSE bug 880891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883126">SUSE bug 883126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885777">SUSE bug 885777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592639" comment="libopenssl0_9_8-0.9.8j-0.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592640" comment="libopenssl0_9_8-32bit-0.9.8j-0.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592641" comment="openssl-0.9.8j-0.58.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0222</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0222" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0222" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0929-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1952-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1445-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1965-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2003-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222</cve>
	<bugzilla href="https://bugzilla.suse.com/877642">SUSE bug 877642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964925">SUSE bug 964925</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566778" comment="kvm-1.4.2-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567189" comment="xen-4.2.5_14-18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567190" comment="xen-doc-html-4.2.5_14-18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567191" comment="xen-doc-pdf-4.2.5_14-18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567192" comment="xen-kmp-default-4.2.5_14_3.0.101_0.47.67-18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567193" comment="xen-kmp-pae-4.2.5_14_3.0.101_0.47.67-18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567194" comment="xen-libs-4.2.5_14-18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567195" comment="xen-libs-32bit-4.2.5_14-18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567196" comment="xen-tools-4.2.5_14-18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567197" comment="xen-tools-domU-4.2.5_14-18.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567467" comment="xen-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567468" comment="xen-doc-html-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567469" comment="xen-kmp-default-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567470" comment="xen-kmp-pae-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567471" comment="xen-libs-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567472" comment="xen-libs-32bit-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567473" comment="xen-tools-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567474" comment="xen-tools-domU-4.4.4_02-32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0223</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0223" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0223" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0223" ref_url="https://www.suse.com/security/cve/CVE-2014-0223" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0929-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00021.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a large image size, which triggers a buffer overflow or out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0223/">CVE-2014-0223</cve>
	<bugzilla href="https://bugzilla.suse.com/877645">SUSE bug 877645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566778" comment="kvm-1.4.2-0.17.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0224</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0224" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0224" ref_url="https://www.suse.com/security/cve/CVE-2014-0224" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0759-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0759-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0761-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0762-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0768-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1557-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7008708" ref_url="https://www.suse.com/support/kb/doc/?id=7008708" source="SUSE-SU"/>
		<reference ref_id="TID7010166" ref_url="https://www.suse.com/support/kb/doc/?id=7010166" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="TID7015158" ref_url="https://www.suse.com/support/kb/doc/?id=7015158" source="SUSE-SU"/>
		<reference ref_id="TID7015162" ref_url="https://www.suse.com/support/kb/doc?id=7015162" source="SUSE-SU"/>
		<reference ref_id="TID7015189" ref_url="https://www.suse.com/support/kb/doc?id=7015189" source="SUSE-SU"/>
		<reference ref_id="TID7015264" ref_url="https://www.suse.com/support/kb/doc?id=7015264" source="SUSE-SU"/>
		<reference ref_id="TID7015300" ref_url="https://www.suse.com/support/kb/doc?id=7015300" source="SUSE-SU"/>
		<reference ref_id="TID7017332" ref_url="https://www.suse.com/support/kb/doc/?id=7017332" source="SUSE-SU"/>
		<reference ref_id="TID7021279" ref_url="https://www.suse.com/support/kb/doc/?id=7021279" source="SUSE-SU"/>
		<reference ref_id="TID7021300" ref_url="https://www.suse.com/support/kb/doc/?id=7021300" source="SUSE-SU"/>
		<reference ref_id="TID7021432" ref_url="https://www.suse.com/support/kb/doc/?id=7021432" source="SUSE-SU"/>
		<reference ref_id="TID7021518" ref_url="https://www.suse.com/support/kb/doc/?id=7021518" source="SUSE-SU"/>
		<reference ref_id="TID7021676" ref_url="https://www.suse.com/support/kb/doc/?id=7021676" source="SUSE-SU"/>
		<reference ref_id="TID7021739" ref_url="https://www.suse.com/support/kb/doc/?id=7021739" source="SUSE-SU"/>
		<reference ref_id="TID7021848" ref_url="https://www.suse.com/support/kb/doc/?id=7021848" source="SUSE-SU"/>
		<reference ref_id="TID7021990" ref_url="https://www.suse.com/support/kb/doc/?id=7021990" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
		<reference ref_id="TID7022768" ref_url="https://www.suse.com/support/kb/doc/?id=7022768" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0765-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0229-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the "CCS Injection" vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0224/">CVE-2014-0224</cve>
	<bugzilla href="https://bugzilla.suse.com/1146657">SUSE bug 1146657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880891">SUSE bug 880891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883126">SUSE bug 883126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885777">SUSE bug 885777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892403">SUSE bug 892403</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903703">SUSE bug 903703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905018">SUSE bug 905018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914447">SUSE bug 914447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916239">SUSE bug 916239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590584" comment="compat-openssl097g-0.9.7g-146.22.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590585" comment="compat-openssl097g-32bit-0.9.7g-146.22.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590293" comment="libmysql55client18-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590294" comment="libmysql55client18-32bit-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590295" comment="libmysql55client_r18-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590296" comment="libmysql55client_r18-32bit-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590297" comment="libmysqlclient15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590298" comment="libmysqlclient15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590299" comment="libmysqlclient_r15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590300" comment="libmysqlclient_r15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592639" comment="libopenssl0_9_8-0.9.8j-0.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592640" comment="libopenssl0_9_8-32bit-0.9.8j-0.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590301" comment="mysql-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590302" comment="mysql-client-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592641" comment="openssl-0.9.8j-0.58.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0244</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0244" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0244" ref_url="https://www.suse.com/security/cve/CVE-2014-0244" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000917.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0857-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0859-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0944-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00034.html" source="SUSE-SU"/>
    <description>
    The sys_recvfrom function in nmbd in Samba 3.6.x before 3.6.24, 4.0.x before 4.0.19, and 4.1.x before 4.1.9 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a malformed UDP packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0244/">CVE-2014-0244</cve>
	<bugzilla href="https://bugzilla.suse.com/880962">SUSE bug 880962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883758">SUSE bug 883758</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592471" comment="libldb1-3.6.3-0.52.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592472" comment="libldb1-32bit-3.6.3-0.52.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592473" comment="libsmbclient0-3.6.3-0.52.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592474" comment="libsmbclient0-32bit-3.6.3-0.52.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592475" comment="libtalloc2-3.6.3-0.52.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592476" comment="libtalloc2-32bit-3.6.3-0.52.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592477" comment="libtdb1-3.6.3-0.52.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592478" comment="libtdb1-32bit-3.6.3-0.52.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592479" comment="libtevent0-3.6.3-0.52.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592480" comment="libtevent0-32bit-3.6.3-0.52.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592481" comment="libwbclient0-3.6.3-0.52.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592482" comment="libwbclient0-32bit-3.6.3-0.52.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592483" comment="samba-3.6.3-0.52.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592484" comment="samba-32bit-3.6.3-0.52.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592485" comment="samba-client-3.6.3-0.52.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592486" comment="samba-client-32bit-3.6.3-0.52.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592487" comment="samba-doc-3.6.3-0.52.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592488" comment="samba-krb-printing-3.6.3-0.52.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592489" comment="samba-winbind-3.6.3-0.52.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592490" comment="samba-winbind-32bit-3.6.3-0.52.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140249" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0249</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0249" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0249" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0249" ref_url="https://www.suse.com/security/cve/CVE-2014-0249" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002342.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1407-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2651-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00103.html" source="SUSE-SU"/>
    <description>
    The System Security Services Daemon (SSSD) 1.11.6 does not properly identify group membership when a non-POSIX group is in a group membership chain, which allows local users to bypass access restrictions via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-0249/">CVE-2014-0249</cve>
	<bugzilla href="https://bugzilla.suse.com/880245">SUSE bug 880245</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333946" comment="sssd is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0368</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0368" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0368" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0368" ref_url="https://www.suse.com/security/cve/CVE-2014-0368" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0174-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0177-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45, and Java SE Embedded 7u45, allows remote attackers to affect confidentiality via unknown vectors related to Networking.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is related to incorrect permission checks when listening on a socket, which allows attackers to escape the sandbox.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0368/">CVE-2014-0368</cve>
	<bugzilla href="https://bugzilla.suse.com/858818">SUSE bug 858818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592137" comment="java-1_7_0-openjdk-1.7.0.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592138" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592139" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0373</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0373" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0373" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0373" ref_url="https://www.suse.com/security/cve/CVE-2014-0373" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0174-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0177-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Serviceability.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is related to throwing of an incorrect exception when SnmpStatusException should have been used in the SNMP implementation, which allows attackers to escape the sandbox.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0373/">CVE-2014-0373</cve>
	<bugzilla href="https://bugzilla.suse.com/858818">SUSE bug 858818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592137" comment="java-1_7_0-openjdk-1.7.0.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592138" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592139" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0376</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0376" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0376" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0376" ref_url="https://www.suse.com/security/cve/CVE-2014-0376" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0174-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0177-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; Java SE Embedded 7u45; and OpenJDK 7 allows remote attackers to affect integrity via vectors related to JAXP.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is related to an improper check for "code permissions when creating document builder factories."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0376/">CVE-2014-0376</cve>
	<bugzilla href="https://bugzilla.suse.com/858818">SUSE bug 858818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592137" comment="java-1_7_0-openjdk-1.7.0.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592138" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592139" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0384</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0384" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0384" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0384" ref_url="https://www.suse.com/security/cve/CVE-2014-0384" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00012.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.35 and earlier and 5.6.15 and earlier allows remote authenticated users to affect availability via vectors related to XML.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-0384/">CVE-2014-0384</cve>
	<bugzilla href="https://bugzilla.suse.com/873896">SUSE bug 873896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999706">SUSE bug 999706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591847" comment="libmysql55client18-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591848" comment="libmysql55client18-32bit-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591849" comment="libmysql55client_r18-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591850" comment="libmysql55client_r18-32bit-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591851" comment="libmysqlclient15-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591852" comment="libmysqlclient15-32bit-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591853" comment="libmysqlclient_r15-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591854" comment="libmysqlclient_r15-32bit-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591855" comment="mysql-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591856" comment="mysql-client-5.5.37-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0386</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0386" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0386" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0386" ref_url="https://www.suse.com/security/cve/CVE-2014-0386" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00012.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.71 and earlier, 5.5.33 and earlier, and 5.6.13 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0386/">CVE-2014-0386</cve>
	<bugzilla href="https://bugzilla.suse.com/858823">SUSE bug 858823</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591847" comment="libmysql55client18-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591848" comment="libmysql55client18-32bit-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591849" comment="libmysql55client_r18-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591850" comment="libmysql55client_r18-32bit-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591851" comment="libmysqlclient15-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591852" comment="libmysqlclient15-32bit-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591853" comment="libmysqlclient_r15-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591854" comment="libmysqlclient_r15-32bit-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591855" comment="mysql-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591856" comment="mysql-client-5.5.37-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0393</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0393" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0393" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0393" ref_url="https://www.suse.com/security/cve/CVE-2014-0393" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00012.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.71 and earlier, 5.5.33 and earlier, and 5.6.13 and earlier allows remote authenticated users to affect integrity via unknown vectors related to InnoDB.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0393/">CVE-2014-0393</cve>
	<bugzilla href="https://bugzilla.suse.com/858823">SUSE bug 858823</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591847" comment="libmysql55client18-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591848" comment="libmysql55client18-32bit-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591849" comment="libmysql55client_r18-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591850" comment="libmysql55client_r18-32bit-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591851" comment="libmysqlclient15-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591852" comment="libmysqlclient15-32bit-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591853" comment="libmysqlclient_r15-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591854" comment="libmysqlclient_r15-32bit-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591855" comment="mysql-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591856" comment="mysql-client-5.5.37-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0401</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0401" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0401" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0401" ref_url="https://www.suse.com/security/cve/CVE-2014-0401" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00012.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.72 and earlier, 5.5.34 and earlier, and 5.6.14 and earlier allows remote authenticated users to affect availability via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0401/">CVE-2014-0401</cve>
	<bugzilla href="https://bugzilla.suse.com/858823">SUSE bug 858823</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591847" comment="libmysql55client18-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591848" comment="libmysql55client18-32bit-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591849" comment="libmysql55client_r18-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591850" comment="libmysql55client_r18-32bit-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591851" comment="libmysqlclient15-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591852" comment="libmysqlclient15-32bit-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591853" comment="libmysqlclient_r15-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591854" comment="libmysqlclient_r15-32bit-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591855" comment="mysql-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591856" comment="mysql-client-5.5.37-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0402</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0402" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0402" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0402" ref_url="https://www.suse.com/security/cve/CVE-2014-0402" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00012.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.71 and earlier, 5.5.33 and earlier, and 5.6.13 and earlier allows remote authenticated users to affect availability via unknown vectors related to Locking.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0402/">CVE-2014-0402</cve>
	<bugzilla href="https://bugzilla.suse.com/858823">SUSE bug 858823</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591847" comment="libmysql55client18-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591848" comment="libmysql55client18-32bit-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591849" comment="libmysql55client_r18-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591850" comment="libmysql55client_r18-32bit-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591851" comment="libmysqlclient15-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591852" comment="libmysqlclient15-32bit-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591853" comment="libmysqlclient_r15-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591854" comment="libmysqlclient_r15-32bit-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591855" comment="mysql-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591856" comment="mysql-client-5.5.37-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0411</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0411" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0411" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0411" ref_url="https://www.suse.com/security/cve/CVE-2014-0411" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0174-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0177-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; JRockit R27.7.7 and R28.2.9; Java SE Embedded 7u45; and OpenJDK 7 allows remote attackers to affect confidentiality and integrity via vectors related to JSSE.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that this issue allows remote attackers to obtain sensitive information about encryption keys via a timing discrepancy during the TLS/SSL handshake.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0411/">CVE-2014-0411</cve>
	<bugzilla href="https://bugzilla.suse.com/858818">SUSE bug 858818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592137" comment="java-1_7_0-openjdk-1.7.0.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592138" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592139" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0412</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0412" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0412" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0412" ref_url="https://www.suse.com/security/cve/CVE-2014-0412" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00012.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.72 and earlier, 5.5.34 and earlier, and 5.6.14 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0412/">CVE-2014-0412</cve>
	<bugzilla href="https://bugzilla.suse.com/858823">SUSE bug 858823</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591847" comment="libmysql55client18-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591848" comment="libmysql55client18-32bit-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591849" comment="libmysql55client_r18-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591850" comment="libmysql55client_r18-32bit-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591851" comment="libmysqlclient15-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591852" comment="libmysqlclient15-32bit-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591853" comment="libmysqlclient_r15-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591854" comment="libmysqlclient_r15-32bit-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591855" comment="mysql-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591856" comment="mysql-client-5.5.37-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0416</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0416" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0416" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0416" ref_url="https://www.suse.com/security/cve/CVE-2014-0416" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0174-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0177-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; Java SE Embedded 7u45; and OpenJDK 7 allows remote attackers to affect integrity via vectors related to JAAS.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is related to how principals are set for the Subject class, which allows attackers to escape the sandbox using deserialization of a crafted Subject instance.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0416/">CVE-2014-0416</cve>
	<bugzilla href="https://bugzilla.suse.com/858818">SUSE bug 858818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592137" comment="java-1_7_0-openjdk-1.7.0.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592138" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592139" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0420</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0420" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0420" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0420" ref_url="https://www.suse.com/security/cve/CVE-2014-0420" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00012.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.34 and earlier, and 5.6.14 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Replication.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0420/">CVE-2014-0420</cve>
	<bugzilla href="https://bugzilla.suse.com/858823">SUSE bug 858823</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591847" comment="libmysql55client18-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591848" comment="libmysql55client18-32bit-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591849" comment="libmysql55client_r18-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591850" comment="libmysql55client_r18-32bit-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591851" comment="libmysqlclient15-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591852" comment="libmysqlclient15-32bit-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591853" comment="libmysqlclient_r15-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591854" comment="libmysqlclient_r15-32bit-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591855" comment="mysql-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591856" comment="mysql-client-5.5.37-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0422</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0422" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0422" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0422" ref_url="https://www.suse.com/security/cve/CVE-2014-0422" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0174-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0177-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; Java SE Embedded 7u45; and OpenJDK 7 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JNDI.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is related to missing package access checks in the Naming / JNDI component, which allows attackers to escape the sandbox.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0422/">CVE-2014-0422</cve>
	<bugzilla href="https://bugzilla.suse.com/858818">SUSE bug 858818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592137" comment="java-1_7_0-openjdk-1.7.0.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592138" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592139" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0423</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0423" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0423" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0423" ref_url="https://www.suse.com/security/cve/CVE-2014-0423" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0174-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0177-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; JRockit R27.7.7 and R28.2.9; Java SE Embedded 7u45; and OpenJDK 7 allows remote authenticated users to affect confidentiality and availability via unknown vectors related to Beans.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that this issue is an XML External Entity (XXE) vulnerability in DocumentHandler.java, related to Beans decoding.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0423/">CVE-2014-0423</cve>
	<bugzilla href="https://bugzilla.suse.com/858818">SUSE bug 858818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592137" comment="java-1_7_0-openjdk-1.7.0.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592138" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592139" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0427</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0427" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0427" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0427" ref_url="https://www.suse.com/security/cve/CVE-2014-0427" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00012.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.6.13 and earlier allows remote authenticated users to affect availability via vectors related to FTS.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0427/">CVE-2014-0427</cve>
	<bugzilla href="https://bugzilla.suse.com/858823">SUSE bug 858823</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591847" comment="libmysql55client18-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591848" comment="libmysql55client18-32bit-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591849" comment="libmysql55client_r18-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591850" comment="libmysql55client_r18-32bit-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591851" comment="libmysqlclient15-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591852" comment="libmysqlclient15-32bit-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591853" comment="libmysqlclient_r15-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591854" comment="libmysqlclient_r15-32bit-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591855" comment="mysql-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591856" comment="mysql-client-5.5.37-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0428</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0428" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0428" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0428" ref_url="https://www.suse.com/security/cve/CVE-2014-0428" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0174-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0177-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; Java SE Embedded 7u45; and OpenJDK 7 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is related to "insufficient security checks in IIOP streams," which allows attackers to escape the sandbox.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0428/">CVE-2014-0428</cve>
	<bugzilla href="https://bugzilla.suse.com/858818">SUSE bug 858818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592137" comment="java-1_7_0-openjdk-1.7.0.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592138" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592139" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0429</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0429" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0429" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0429" ref_url="https://www.suse.com/security/cve/CVE-2014-0429" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JRockit R27.8.1 and R28.3.1; and Java SE Embedded 7u51 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0429/">CVE-2014-0429</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592272" comment="java-1_7_0-openjdk-1.7.0.6-0.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592273" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592274" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0430</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0430" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0430" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0430" ref_url="https://www.suse.com/security/cve/CVE-2014-0430" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00012.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.6.13 and earlier allows remote authenticated users to affect availability via unknown vectors related to Performance Schema.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-0430/">CVE-2014-0430</cve>
	<bugzilla href="https://bugzilla.suse.com/858823">SUSE bug 858823</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591847" comment="libmysql55client18-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591848" comment="libmysql55client18-32bit-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591849" comment="libmysql55client_r18-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591850" comment="libmysql55client_r18-32bit-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591851" comment="libmysqlclient15-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591852" comment="libmysqlclient15-32bit-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591853" comment="libmysqlclient_r15-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591854" comment="libmysqlclient_r15-32bit-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591855" comment="mysql-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591856" comment="mysql-client-5.5.37-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0431</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0431" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0431" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0431" ref_url="https://www.suse.com/security/cve/CVE-2014-0431" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00012.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.6.14 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB, a different vulnerability than CVE-2013-5881.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0431/">CVE-2014-0431</cve>
	<bugzilla href="https://bugzilla.suse.com/858823">SUSE bug 858823</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591847" comment="libmysql55client18-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591848" comment="libmysql55client18-32bit-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591849" comment="libmysql55client_r18-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591850" comment="libmysql55client_r18-32bit-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591851" comment="libmysqlclient15-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591852" comment="libmysqlclient15-32bit-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591853" comment="libmysqlclient_r15-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591854" comment="libmysqlclient_r15-32bit-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591855" comment="mysql-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591856" comment="mysql-client-5.5.37-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0433</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0433" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0433" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0433" ref_url="https://www.suse.com/security/cve/CVE-2014-0433" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00012.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.6.13 and earlier allows remote attackers to affect availability via unknown vectors related to Thread Pooling.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0433/">CVE-2014-0433</cve>
	<bugzilla href="https://bugzilla.suse.com/858823">SUSE bug 858823</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591847" comment="libmysql55client18-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591848" comment="libmysql55client18-32bit-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591849" comment="libmysql55client_r18-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591850" comment="libmysql55client_r18-32bit-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591851" comment="libmysqlclient15-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591852" comment="libmysqlclient15-32bit-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591853" comment="libmysqlclient_r15-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591854" comment="libmysqlclient_r15-32bit-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591855" comment="mysql-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591856" comment="mysql-client-5.5.37-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140437" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0437</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0437" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0437" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0437" ref_url="https://www.suse.com/security/cve/CVE-2014-0437" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00012.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.72 and earlier, 5.5.34 and earlier, and 5.6.14 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0437/">CVE-2014-0437</cve>
	<bugzilla href="https://bugzilla.suse.com/858823">SUSE bug 858823</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591847" comment="libmysql55client18-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591848" comment="libmysql55client18-32bit-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591849" comment="libmysql55client_r18-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591850" comment="libmysql55client_r18-32bit-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591851" comment="libmysqlclient15-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591852" comment="libmysqlclient15-32bit-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591853" comment="libmysqlclient_r15-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591854" comment="libmysqlclient_r15-32bit-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591855" comment="mysql-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591856" comment="mysql-client-5.5.37-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0446</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0446" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0446" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0446" ref_url="https://www.suse.com/security/cve/CVE-2014-0446" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0446/">CVE-2014-0446</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592272" comment="java-1_7_0-openjdk-1.7.0.6-0.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592273" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592274" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0451</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0451" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0451" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0451" ref_url="https://www.suse.com/security/cve/CVE-2014-0451" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT, a different vulnerability than CVE-2014-2412.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0451/">CVE-2014-0451</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592272" comment="java-1_7_0-openjdk-1.7.0.6-0.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592273" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592274" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0452</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0452" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0452" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0452" ref_url="https://www.suse.com/security/cve/CVE-2014-0452" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JAX-WS, a different vulnerability than CVE-2014-0458 and CVE-2014-2423.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0452/">CVE-2014-0452</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592272" comment="java-1_7_0-openjdk-1.7.0.6-0.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592273" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592274" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0453</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0453" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0453" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0453" ref_url="https://www.suse.com/security/cve/CVE-2014-0453" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JRockit R27.8.1 and R28.3.1; and Java SE Embedded 7u51 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Security.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0453/">CVE-2014-0453</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592272" comment="java-1_7_0-openjdk-1.7.0.6-0.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592273" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592274" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0454</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0454" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0454" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0454" ref_url="https://www.suse.com/security/cve/CVE-2014-0454" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u51 and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Security.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0454/">CVE-2014-0454</cve>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592272" comment="java-1_7_0-openjdk-1.7.0.6-0.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592273" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592274" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0455</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0455" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0455" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0455" ref_url="https://www.suse.com/security/cve/CVE-2014-0455" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u51 and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2014-0432 and CVE-2014-2402.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0455/">CVE-2014-0455</cve>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592272" comment="java-1_7_0-openjdk-1.7.0.6-0.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592273" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592274" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0456</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0456" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0456" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0456" ref_url="https://www.suse.com/security/cve/CVE-2014-0456" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0456/">CVE-2014-0456</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592272" comment="java-1_7_0-openjdk-1.7.0.6-0.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592273" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592274" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0457</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0457" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0457" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0457" ref_url="https://www.suse.com/security/cve/CVE-2014-0457" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, SE 6u71, 7u51, and 8; JRockit R27.8.1 and R28.3.1; and Java SE Embedded 7u51 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0457/">CVE-2014-0457</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592272" comment="java-1_7_0-openjdk-1.7.0.6-0.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592273" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592274" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0458</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0458" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0458" ref_url="https://www.suse.com/security/cve/CVE-2014-0458" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JAX-WS, a different vulnerability than CVE-2014-0452 and CVE-2014-2423.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0458/">CVE-2014-0458</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592272" comment="java-1_7_0-openjdk-1.7.0.6-0.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592273" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592274" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0459</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0459" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0459" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0459" ref_url="https://www.suse.com/security/cve/CVE-2014-0459" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u51 and 8, and Java SE Embedded 7u51, allows remote attackers to affect availability via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0459/">CVE-2014-0459</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592272" comment="java-1_7_0-openjdk-1.7.0.6-0.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592273" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592274" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0460</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0460" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0460" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0460" ref_url="https://www.suse.com/security/cve/CVE-2014-0460" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JRockit R27.8.1 and R28.3.1; and Java SE Embedded 7u51 allows remote attackers to affect confidentiality and integrity via vectors related to JNDI.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0460/">CVE-2014-0460</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592272" comment="java-1_7_0-openjdk-1.7.0.6-0.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592273" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592274" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0461</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0461" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0461" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0461" ref_url="https://www.suse.com/security/cve/CVE-2014-0461" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0461/">CVE-2014-0461</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592272" comment="java-1_7_0-openjdk-1.7.0.6-0.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592273" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592274" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0466</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0466" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0466" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0466" ref_url="https://www.suse.com/security/cve/CVE-2014-0466" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000805.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0499-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00021.html" source="SUSE-SU"/>
    <description>
    The fixps script in a2ps 4.14 does not use the -dSAFER option when executing gs, which allows context-dependent attackers to delete arbitrary files or execute arbitrary commands via a crafted PostScript file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0466/">CVE-2014-0466</cve>
	<bugzilla href="https://bugzilla.suse.com/871097">SUSE bug 871097</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566349" comment="a2ps-4.13-1326.37.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0467</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0467" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0467" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0467" ref_url="https://www.suse.com/security/cve/CVE-2014-0467" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0434-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0436-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00085.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in copy.c in Mutt before 1.5.23 allows remote attackers to cause a denial of service (crash) via a crafted RFC2047 header line, related to address expansion.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0467/">CVE-2014-0467</cve>
	<bugzilla href="https://bugzilla.suse.com/868115">SUSE bug 868115</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566971" comment="mutt-1.5.17-42.37.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0475</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0475" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0475" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0475" ref_url="https://www.suse.com/security/cve/CVE-2014-0475" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1212-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1115-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00009.html" source="SUSE-SU"/>
    <description>
    Multiple directory traversal vulnerabilities in GNU C Library (aka glibc or libc6) before 2.20 allow context-dependent attackers to bypass ForceCommand restrictions and possibly have other unspecified impact via a .. (dot dot) in a (1) LC_*, (2) LANG, or other locale environment variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0475/">CVE-2014-0475</cve>
	<bugzilla href="https://bugzilla.suse.com/887022">SUSE bug 887022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/896776">SUSE bug 896776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916222">SUSE bug 916222</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592749" comment="glibc-2.11.3-17.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592750" comment="glibc-32bit-2.11.3-17.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592751" comment="glibc-devel-2.11.3-17.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592752" comment="glibc-devel-32bit-2.11.3-17.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592753" comment="glibc-i18ndata-2.11.3-17.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592754" comment="glibc-locale-2.11.3-17.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592755" comment="glibc-locale-32bit-2.11.3-17.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592756" comment="nscd-2.11.3-17.68.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0491</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0491" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0491" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0491" ref_url="https://www.suse.com/security/cve/CVE-2014-0491" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000693.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0126-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0128-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-01/msg00006.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 11.7.700.260 and 11.8.x and 11.9.x before 12.0.0.38 on Windows and Mac OS X and before 11.2.202.335 on Linux, Adobe AIR before 4.0.0.1390, Adobe AIR SDK before 4.0.0.1390, and Adobe AIR SDK &amp; Compiler before 4.0.0.1390 allow attackers to bypass unspecified protection mechanisms via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0491/">CVE-2014-0491</cve>
	<bugzilla href="https://bugzilla.suse.com/858822">SUSE bug 858822</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592776" comment="flash-player-11.2.202.335-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592777" comment="flash-player-gnome-11.2.202.335-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592778" comment="flash-player-kde4-11.2.202.335-0.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0492</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0492" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0492" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0492" ref_url="https://www.suse.com/security/cve/CVE-2014-0492" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000693.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0126-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0128-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-01/msg00006.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 11.7.700.260 and 11.8.x and 11.9.x before 12.0.0.38 on Windows and Mac OS X and before 11.2.202.335 on Linux, Adobe AIR before 4.0.0.1390, Adobe AIR SDK before 4.0.0.1390, and Adobe AIR SDK &amp; Compiler before 4.0.0.1390 allow attackers to defeat the ASLR protection mechanism by leveraging an "address leak."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0492/">CVE-2014-0492</cve>
	<bugzilla href="https://bugzilla.suse.com/858822">SUSE bug 858822</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592776" comment="flash-player-11.2.202.335-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592777" comment="flash-player-gnome-11.2.202.335-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592778" comment="flash-player-kde4-11.2.202.335-0.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0497</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0497" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0497" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0497" ref_url="https://www.suse.com/security/cve/CVE-2014-0497" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0221-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0197-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00001.html" source="SUSE-SU"/>
    <description>
    Integer underflow in Adobe Flash Player before 11.7.700.261 and 11.8.x through 12.0.x before 12.0.0.44 on Windows and Mac OS X, and before 11.2.202.336 on Linux, allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0497/">CVE-2014-0497</cve>
	<bugzilla href="https://bugzilla.suse.com/862288">SUSE bug 862288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565986" comment="flash-player-11.2.202.336-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565987" comment="flash-player-gnome-11.2.202.336-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565988" comment="flash-player-kde4-11.2.202.336-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0498</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0498" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0498" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0498" ref_url="https://www.suse.com/security/cve/CVE-2014-0498" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0277-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00015.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in Adobe Flash Player before 11.7.700.269 and 11.8.x through 12.0.x before 12.0.0.70 on Windows and Mac OS X and before 11.2.202.341 on Linux, Adobe AIR before 4.0.0.1628 on Android, Adobe AIR SDK before 4.0.0.1628, and Adobe AIR SDK &amp; Compiler before 4.0.0.1628 allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0498/">CVE-2014-0498</cve>
	<bugzilla href="https://bugzilla.suse.com/865021">SUSE bug 865021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592779" comment="flash-player-11.2.202.341-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592780" comment="flash-player-gnome-11.2.202.341-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592781" comment="flash-player-kde4-11.2.202.341-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0499</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0499" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0499" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0499" ref_url="https://www.suse.com/security/cve/CVE-2014-0499" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0277-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00015.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 11.7.700.269 and 11.8.x through 12.0.x before 12.0.0.70 on Windows and Mac OS X and before 11.2.202.341 on Linux, Adobe AIR before 4.0.0.1628 on Android, Adobe AIR SDK before 4.0.0.1628, and Adobe AIR SDK &amp; Compiler before 4.0.0.1628 do not prevent access to address information, which makes it easier for attackers to bypass the ASLR protection mechanism via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0499/">CVE-2014-0499</cve>
	<bugzilla href="https://bugzilla.suse.com/865021">SUSE bug 865021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592779" comment="flash-player-11.2.202.341-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592780" comment="flash-player-gnome-11.2.202.341-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592781" comment="flash-player-kde4-11.2.202.341-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0502</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0502" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0502" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0502" ref_url="https://www.suse.com/security/cve/CVE-2014-0502" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0277-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00015.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in Adobe Flash Player before 11.7.700.269 and 11.8.x through 12.0.x before 12.0.0.70 on Windows and Mac OS X and before 11.2.202.341 on Linux, Adobe AIR before 4.0.0.1628 on Android, Adobe AIR SDK before 4.0.0.1628, and Adobe AIR SDK &amp; Compiler before 4.0.0.1628 allows remote attackers to execute arbitrary code via unspecified vectors, as exploited in the wild in February 2014.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0502/">CVE-2014-0502</cve>
	<bugzilla href="https://bugzilla.suse.com/865021">SUSE bug 865021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592779" comment="flash-player-11.2.202.341-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592780" comment="flash-player-gnome-11.2.202.341-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592781" comment="flash-player-kde4-11.2.202.341-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0503</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0503" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0503" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0503" ref_url="https://www.suse.com/security/cve/CVE-2014-0503" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0379-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00013.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 11.7.700.272 and 11.8.x through 12.0.x before 12.0.0.77 on Windows and OS X, and before 11.2.202.346 on Linux, allows remote attackers to bypass the Same Origin Policy via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0503/">CVE-2014-0503</cve>
	<bugzilla href="https://bugzilla.suse.com/867808">SUSE bug 867808</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592782" comment="flash-player-11.2.202.346-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592783" comment="flash-player-gnome-11.2.202.346-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592784" comment="flash-player-kde4-11.2.202.346-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0504</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0504" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0504" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0504" ref_url="https://www.suse.com/security/cve/CVE-2014-0504" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0379-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00013.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 11.7.700.272 and 11.8.x through 12.0.x before 12.0.0.77 on Windows and OS X, and before 11.2.202.346 on Linux, allows attackers to read the clipboard via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0504/">CVE-2014-0504</cve>
	<bugzilla href="https://bugzilla.suse.com/867808">SUSE bug 867808</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592782" comment="flash-player-11.2.202.346-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592783" comment="flash-player-gnome-11.2.202.346-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592784" comment="flash-player-kde4-11.2.202.346-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0506</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0506" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0506" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0506" ref_url="https://www.suse.com/security/cve/CVE-2014-0506" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0535-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0520-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0549-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00050.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 11.7.700.275 and 11.8.x through 13.0.x before 13.0.0.182 on Windows and OS X and before 11.2.202.350 on Linux, Adobe AIR before 13.0.0.83 on Android, Adobe AIR SDK before 13.0.0.83, and Adobe AIR SDK &amp; Compiler before 13.0.0.83 allows remote attackers to execute arbitrary code, and possibly bypass an Internet Explorer sandbox protection mechanism, via unspecified vectors, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2014.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0506/">CVE-2014-0506</cve>
	<bugzilla href="https://bugzilla.suse.com/872692">SUSE bug 872692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592785" comment="flash-player-11.2.202.350-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592786" comment="flash-player-gnome-11.2.202.350-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592787" comment="flash-player-kde4-11.2.202.350-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0507</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0507" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0507" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0507" ref_url="https://www.suse.com/security/cve/CVE-2014-0507" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0535-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0520-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0549-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00050.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 11.7.700.275 and 11.8.x through 13.0.x before 13.0.0.182 on Windows and OS X and before 11.2.202.350 on Linux, Adobe AIR before 13.0.0.83 on Android, Adobe AIR SDK before 13.0.0.83, and Adobe AIR SDK &amp; Compiler before 13.0.0.83 allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0507/">CVE-2014-0507</cve>
	<bugzilla href="https://bugzilla.suse.com/872692">SUSE bug 872692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592785" comment="flash-player-11.2.202.350-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592786" comment="flash-player-gnome-11.2.202.350-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592787" comment="flash-player-kde4-11.2.202.350-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0508</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0508" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0508" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0508" ref_url="https://www.suse.com/security/cve/CVE-2014-0508" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0535-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0520-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0549-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00050.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 11.7.700.275 and 11.8.x through 13.0.x before 13.0.0.182 on Windows and OS X and before 11.2.202.350 on Linux, Adobe AIR before 13.0.0.83 on Android, Adobe AIR SDK before 13.0.0.83, and Adobe AIR SDK &amp; Compiler before 13.0.0.83 allow attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0508/">CVE-2014-0508</cve>
	<bugzilla href="https://bugzilla.suse.com/872692">SUSE bug 872692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592785" comment="flash-player-11.2.202.350-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592786" comment="flash-player-gnome-11.2.202.350-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592787" comment="flash-player-kde4-11.2.202.350-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0509</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0509" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0509" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0509" ref_url="https://www.suse.com/security/cve/CVE-2014-0509" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0535-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0520-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0549-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00050.html" source="SUSE-SU"/>
    <description>
    Cross-site scripting (XSS) vulnerability in Adobe Flash Player before 11.7.700.275 and 11.8.x through 13.0.x before 13.0.0.182 on Windows and OS X and before 11.2.202.350 on Linux, Adobe AIR before 13.0.0.83 on Android, Adobe AIR SDK before 13.0.0.83, and Adobe AIR SDK &amp; Compiler before 13.0.0.83 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0509/">CVE-2014-0509</cve>
	<bugzilla href="https://bugzilla.suse.com/872692">SUSE bug 872692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592785" comment="flash-player-11.2.202.350-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592786" comment="flash-player-gnome-11.2.202.350-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592787" comment="flash-player-kde4-11.2.202.350-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0510</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0510" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0510" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0510" ref_url="https://www.suse.com/security/cve/CVE-2014-0510" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0671-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00008.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Adobe Flash Player 12.0.0.77 allows remote attackers to execute arbitrary code and bypass a sandbox protection mechanism via unspecified vectors, as demonstrated by Zeguang Zhao and Liang Chen during a Pwn2Own competition at CanSecWest 2014.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0510/">CVE-2014-0510</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592788" comment="flash-player-11.2.202.359-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592789" comment="flash-player-gnome-11.2.202.359-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592790" comment="flash-player-kde4-11.2.202.359-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0515</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0515" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0515" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0515" ref_url="https://www.suse.com/security/cve/CVE-2014-0515" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0605-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0585-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00000.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 11.7.700.279 and 11.8.x through 13.0.x before 13.0.0.206 on Windows and OS X, and before 11.2.202.356 on Linux, allows remote attackers to execute arbitrary code via unspecified vectors, as exploited in the wild in April 2014.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0515/">CVE-2014-0515</cve>
	<bugzilla href="https://bugzilla.suse.com/875577">SUSE bug 875577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/886454">SUSE bug 886454</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592791" comment="flash-player-11.2.202.356-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592792" comment="flash-player-gnome-11.2.202.356-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592793" comment="flash-player-kde4-11.2.202.356-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140516" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0516</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0516" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0516" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0516" ref_url="https://www.suse.com/security/cve/CVE-2014-0516" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0671-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0673-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0679-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00057.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.214 on Windows and OS X and before 11.2.202.359 on Linux, Adobe AIR SDK before 13.0.0.111, and Adobe AIR SDK &amp; Compiler before 13.0.0.111 allow remote attackers to bypass the Same Origin Policy via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0516/">CVE-2014-0516</cve>
	<bugzilla href="https://bugzilla.suse.com/877649">SUSE bug 877649</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592788" comment="flash-player-11.2.202.359-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592789" comment="flash-player-gnome-11.2.202.359-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592790" comment="flash-player-kde4-11.2.202.359-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0517</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0517" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0517" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0517" ref_url="https://www.suse.com/security/cve/CVE-2014-0517" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0671-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0673-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0679-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00057.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.214 on Windows and OS X and before 11.2.202.359 on Linux, Adobe AIR SDK before 13.0.0.111, and Adobe AIR SDK &amp; Compiler before 13.0.0.111 allow attackers to bypass intended access restrictions via unspecified vectors, a different vulnerability than CVE-2014-0518, CVE-2014-0519, and CVE-2014-0520.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0517/">CVE-2014-0517</cve>
	<bugzilla href="https://bugzilla.suse.com/877649">SUSE bug 877649</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592788" comment="flash-player-11.2.202.359-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592789" comment="flash-player-gnome-11.2.202.359-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592790" comment="flash-player-kde4-11.2.202.359-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0518</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0518" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0518" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0518" ref_url="https://www.suse.com/security/cve/CVE-2014-0518" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0671-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0673-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0679-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00057.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.214 on Windows and OS X and before 11.2.202.359 on Linux, Adobe AIR SDK before 13.0.0.111, and Adobe AIR SDK &amp; Compiler before 13.0.0.111 allow attackers to bypass intended access restrictions via unspecified vectors, a different vulnerability than CVE-2014-0517, CVE-2014-0519, and CVE-2014-0520.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0518/">CVE-2014-0518</cve>
	<bugzilla href="https://bugzilla.suse.com/877649">SUSE bug 877649</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592788" comment="flash-player-11.2.202.359-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592789" comment="flash-player-gnome-11.2.202.359-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592790" comment="flash-player-kde4-11.2.202.359-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0519</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0519" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0519" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0519" ref_url="https://www.suse.com/security/cve/CVE-2014-0519" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0671-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0673-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0679-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00057.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.214 on Windows and OS X and before 11.2.202.359 on Linux, Adobe AIR SDK before 13.0.0.111, and Adobe AIR SDK &amp; Compiler before 13.0.0.111 allow attackers to bypass intended access restrictions via unspecified vectors, a different vulnerability than CVE-2014-0517, CVE-2014-0518, and CVE-2014-0520.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0519/">CVE-2014-0519</cve>
	<bugzilla href="https://bugzilla.suse.com/877649">SUSE bug 877649</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592788" comment="flash-player-11.2.202.359-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592789" comment="flash-player-gnome-11.2.202.359-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592790" comment="flash-player-kde4-11.2.202.359-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0520</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0520" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0520" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0520" ref_url="https://www.suse.com/security/cve/CVE-2014-0520" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0671-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0673-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0679-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00057.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.214 on Windows and OS X and before 11.2.202.359 on Linux, Adobe AIR SDK before 13.0.0.111, and Adobe AIR SDK &amp; Compiler before 13.0.0.111 allow attackers to bypass intended access restrictions via unspecified vectors, a different vulnerability than CVE-2014-0517, CVE-2014-0518, and CVE-2014-0519.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0520/">CVE-2014-0520</cve>
	<bugzilla href="https://bugzilla.suse.com/877649">SUSE bug 877649</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592788" comment="flash-player-11.2.202.359-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592789" comment="flash-player-gnome-11.2.202.359-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592790" comment="flash-player-kde4-11.2.202.359-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0531</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0531" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0531" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0531" ref_url="https://www.suse.com/security/cve/CVE-2014-0531" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0806-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0798-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0799-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00030.html" source="SUSE-SU"/>
    <description>
    Cross-site scripting (XSS) vulnerability in Adobe Flash Player before 13.0.0.223 and 14.x before 14.0.0.125 on Windows and OS X and before 11.2.202.378 on Linux, Adobe AIR before 14.0.0.110, Adobe AIR SDK before 14.0.0.110, and Adobe AIR SDK &amp; Compiler before 14.0.0.110 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2014-0532 and CVE-2014-0533.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0531/">CVE-2014-0531</cve>
	<bugzilla href="https://bugzilla.suse.com/882187">SUSE bug 882187</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592794" comment="flash-player-11.2.202.378-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592795" comment="flash-player-gnome-11.2.202.378-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592796" comment="flash-player-kde4-11.2.202.378-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0532</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0532" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0532" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0532" ref_url="https://www.suse.com/security/cve/CVE-2014-0532" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0806-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0798-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0799-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00030.html" source="SUSE-SU"/>
    <description>
    Cross-site scripting (XSS) vulnerability in Adobe Flash Player before 13.0.0.223 and 14.x before 14.0.0.125 on Windows and OS X and before 11.2.202.378 on Linux, Adobe AIR before 14.0.0.110, Adobe AIR SDK before 14.0.0.110, and Adobe AIR SDK &amp; Compiler before 14.0.0.110 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2014-0531 and CVE-2014-0533.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0532/">CVE-2014-0532</cve>
	<bugzilla href="https://bugzilla.suse.com/882187">SUSE bug 882187</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592794" comment="flash-player-11.2.202.378-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592795" comment="flash-player-gnome-11.2.202.378-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592796" comment="flash-player-kde4-11.2.202.378-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0533</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0533" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0533" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0533" ref_url="https://www.suse.com/security/cve/CVE-2014-0533" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0806-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0798-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0799-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00030.html" source="SUSE-SU"/>
    <description>
    Cross-site scripting (XSS) vulnerability in Adobe Flash Player before 13.0.0.223 and 14.x before 14.0.0.125 on Windows and OS X and before 11.2.202.378 on Linux, Adobe AIR before 14.0.0.110, Adobe AIR SDK before 14.0.0.110, and Adobe AIR SDK &amp; Compiler before 14.0.0.110 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2014-0531 and CVE-2014-0532.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0533/">CVE-2014-0533</cve>
	<bugzilla href="https://bugzilla.suse.com/882187">SUSE bug 882187</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592794" comment="flash-player-11.2.202.378-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592795" comment="flash-player-gnome-11.2.202.378-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592796" comment="flash-player-kde4-11.2.202.378-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0534</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0534" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0534" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0534" ref_url="https://www.suse.com/security/cve/CVE-2014-0534" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0806-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0798-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0799-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00030.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.223 and 14.x before 14.0.0.125 on Windows and OS X and before 11.2.202.378 on Linux, Adobe AIR before 14.0.0.110, Adobe AIR SDK before 14.0.0.110, and Adobe AIR SDK &amp; Compiler before 14.0.0.110 allow attackers to bypass intended access restrictions via unspecified vectors, a different vulnerability than CVE-2014-0535.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0534/">CVE-2014-0534</cve>
	<bugzilla href="https://bugzilla.suse.com/882187">SUSE bug 882187</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592794" comment="flash-player-11.2.202.378-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592795" comment="flash-player-gnome-11.2.202.378-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592796" comment="flash-player-kde4-11.2.202.378-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0535</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0535" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0535" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0535" ref_url="https://www.suse.com/security/cve/CVE-2014-0535" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0806-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0798-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0799-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00030.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.223 and 14.x before 14.0.0.125 on Windows and OS X and before 11.2.202.378 on Linux, Adobe AIR before 14.0.0.110, Adobe AIR SDK before 14.0.0.110, and Adobe AIR SDK &amp; Compiler before 14.0.0.110 allow attackers to bypass intended access restrictions via unspecified vectors, a different vulnerability than CVE-2014-0534.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0535/">CVE-2014-0535</cve>
	<bugzilla href="https://bugzilla.suse.com/882187">SUSE bug 882187</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592794" comment="flash-player-11.2.202.378-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592795" comment="flash-player-gnome-11.2.202.378-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592796" comment="flash-player-kde4-11.2.202.378-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0536</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0536" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0536" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0536" ref_url="https://www.suse.com/security/cve/CVE-2014-0536" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0806-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0798-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0799-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00030.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.223 and 14.x before 14.0.0.125 on Windows and OS X and before 11.2.202.378 on Linux, Adobe AIR before 14.0.0.110, Adobe AIR SDK before 14.0.0.110, and Adobe AIR SDK &amp; Compiler before 14.0.0.110 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0536/">CVE-2014-0536</cve>
	<bugzilla href="https://bugzilla.suse.com/882187">SUSE bug 882187</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592794" comment="flash-player-11.2.202.378-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592795" comment="flash-player-gnome-11.2.202.378-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592796" comment="flash-player-kde4-11.2.202.378-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0537</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0537" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0537" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0537" ref_url="https://www.suse.com/security/cve/CVE-2014-0537" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0897-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0903-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0913-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00017.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.231 and 14.x before 14.0.0.145 on Windows and OS X and before 11.2.202.394 on Linux, Adobe AIR before 14.0.0.137 on Android, Adobe AIR SDK before 14.0.0.137, and Adobe AIR SDK &amp; Compiler before 14.0.0.137 allow attackers to bypass intended access restrictions via unspecified vectors, a different vulnerability than CVE-2014-0539.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0537/">CVE-2014-0537</cve>
	<bugzilla href="https://bugzilla.suse.com/886454">SUSE bug 886454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/886472">SUSE bug 886472</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592797" comment="flash-player-11.2.202.394-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592798" comment="flash-player-gnome-11.2.202.394-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592799" comment="flash-player-kde4-11.2.202.394-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0538</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0538" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0538" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0538" ref_url="https://www.suse.com/security/cve/CVE-2014-0538" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1029-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00010.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.241 and 14.x before 14.0.0.176 on Windows and OS X and before 11.2.202.400 on Linux, Adobe AIR before 14.0.0.178 on Windows and OS X and before 14.0.0.179 on Android, Adobe AIR SDK before 14.0.0.178, and Adobe AIR SDK &amp; Compiler before 14.0.0.178 allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0538/">CVE-2014-0538</cve>
	<bugzilla href="https://bugzilla.suse.com/891688">SUSE bug 891688</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592800" comment="flash-player-11.2.202.400-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592801" comment="flash-player-gnome-11.2.202.400-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592802" comment="flash-player-kde4-11.2.202.400-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0539</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0539" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0539" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0539" ref_url="https://www.suse.com/security/cve/CVE-2014-0539" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0897-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0903-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0913-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00017.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.231 and 14.x before 14.0.0.145 on Windows and OS X and before 11.2.202.394 on Linux, Adobe AIR before 14.0.0.137 on Android, Adobe AIR SDK before 14.0.0.137, and Adobe AIR SDK &amp; Compiler before 14.0.0.137 allow attackers to bypass intended access restrictions via unspecified vectors, a different vulnerability than CVE-2014-0537.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0539/">CVE-2014-0539</cve>
	<bugzilla href="https://bugzilla.suse.com/886454">SUSE bug 886454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/886472">SUSE bug 886472</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592797" comment="flash-player-11.2.202.394-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592798" comment="flash-player-gnome-11.2.202.394-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592799" comment="flash-player-kde4-11.2.202.394-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0540</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0540" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0540" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0540" ref_url="https://www.suse.com/security/cve/CVE-2014-0540" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1029-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00010.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.241 and 14.x before 14.0.0.176 on Windows and OS X and before 11.2.202.400 on Linux, Adobe AIR before 14.0.0.178 on Windows and OS X and before 14.0.0.179 on Android, Adobe AIR SDK before 14.0.0.178, and Adobe AIR SDK &amp; Compiler before 14.0.0.178 do not properly restrict discovery of memory addresses, which allows attackers to bypass the ASLR protection mechanism via unspecified vectors, a different vulnerability than CVE-2014-0542, CVE-2014-0543, CVE-2014-0544, and CVE-2014-0545.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0540/">CVE-2014-0540</cve>
	<bugzilla href="https://bugzilla.suse.com/891688">SUSE bug 891688</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592800" comment="flash-player-11.2.202.400-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592801" comment="flash-player-gnome-11.2.202.400-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592802" comment="flash-player-kde4-11.2.202.400-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0541</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0541" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0541" ref_url="https://www.suse.com/security/cve/CVE-2014-0541" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1029-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00010.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.241 and 14.x before 14.0.0.176 on Windows and OS X and before 11.2.202.400 on Linux, Adobe AIR before 14.0.0.178 on Windows and OS X and before 14.0.0.179 on Android, Adobe AIR SDK before 14.0.0.178, and Adobe AIR SDK &amp; Compiler before 14.0.0.178 allow attackers to bypass intended access restrictions via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0541/">CVE-2014-0541</cve>
	<bugzilla href="https://bugzilla.suse.com/891688">SUSE bug 891688</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592800" comment="flash-player-11.2.202.400-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592801" comment="flash-player-gnome-11.2.202.400-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592802" comment="flash-player-kde4-11.2.202.400-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0542</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0542" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0542" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0542" ref_url="https://www.suse.com/security/cve/CVE-2014-0542" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1029-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00010.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.241 and 14.x before 14.0.0.176 on Windows and OS X and before 11.2.202.400 on Linux, Adobe AIR before 14.0.0.178 on Windows and OS X and before 14.0.0.179 on Android, Adobe AIR SDK before 14.0.0.178, and Adobe AIR SDK &amp; Compiler before 14.0.0.178 do not properly restrict discovery of memory addresses, which allows attackers to bypass the ASLR protection mechanism via unspecified vectors, a different vulnerability than CVE-2014-0540, CVE-2014-0543, CVE-2014-0544, and CVE-2014-0545.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0542/">CVE-2014-0542</cve>
	<bugzilla href="https://bugzilla.suse.com/891688">SUSE bug 891688</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592800" comment="flash-player-11.2.202.400-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592801" comment="flash-player-gnome-11.2.202.400-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592802" comment="flash-player-kde4-11.2.202.400-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0543</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0543" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0543" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0543" ref_url="https://www.suse.com/security/cve/CVE-2014-0543" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1029-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00010.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.241 and 14.x before 14.0.0.176 on Windows and OS X and before 11.2.202.400 on Linux, Adobe AIR before 14.0.0.178 on Windows and OS X and before 14.0.0.179 on Android, Adobe AIR SDK before 14.0.0.178, and Adobe AIR SDK &amp; Compiler before 14.0.0.178 do not properly restrict discovery of memory addresses, which allows attackers to bypass the ASLR protection mechanism via unspecified vectors, a different vulnerability than CVE-2014-0540, CVE-2014-0542, CVE-2014-0544, and CVE-2014-0545.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0543/">CVE-2014-0543</cve>
	<bugzilla href="https://bugzilla.suse.com/891688">SUSE bug 891688</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592800" comment="flash-player-11.2.202.400-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592801" comment="flash-player-gnome-11.2.202.400-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592802" comment="flash-player-kde4-11.2.202.400-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0544</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0544" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0544" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0544" ref_url="https://www.suse.com/security/cve/CVE-2014-0544" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1029-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00010.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.241 and 14.x before 14.0.0.176 on Windows and OS X and before 11.2.202.400 on Linux, Adobe AIR before 14.0.0.178 on Windows and OS X and before 14.0.0.179 on Android, Adobe AIR SDK before 14.0.0.178, and Adobe AIR SDK &amp; Compiler before 14.0.0.178 do not properly restrict discovery of memory addresses, which allows attackers to bypass the ASLR protection mechanism via unspecified vectors, a different vulnerability than CVE-2014-0540, CVE-2014-0542, CVE-2014-0543, and CVE-2014-0545.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0544/">CVE-2014-0544</cve>
	<bugzilla href="https://bugzilla.suse.com/891688">SUSE bug 891688</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592800" comment="flash-player-11.2.202.400-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592801" comment="flash-player-gnome-11.2.202.400-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592802" comment="flash-player-kde4-11.2.202.400-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0545</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0545" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0545" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0545" ref_url="https://www.suse.com/security/cve/CVE-2014-0545" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1029-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00010.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.241 and 14.x before 14.0.0.176 on Windows and OS X and before 11.2.202.400 on Linux, Adobe AIR before 14.0.0.178 on Windows and OS X and before 14.0.0.179 on Android, Adobe AIR SDK before 14.0.0.178, and Adobe AIR SDK &amp; Compiler before 14.0.0.178 do not properly restrict discovery of memory addresses, which allows attackers to bypass the ASLR protection mechanism via unspecified vectors, a different vulnerability than CVE-2014-0540, CVE-2014-0542, CVE-2014-0543, and CVE-2014-0544.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0545/">CVE-2014-0545</cve>
	<bugzilla href="https://bugzilla.suse.com/891688">SUSE bug 891688</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592800" comment="flash-player-11.2.202.400-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592801" comment="flash-player-gnome-11.2.202.400-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592802" comment="flash-player-kde4-11.2.202.400-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0547</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0547" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0547" ref_url="https://www.suse.com/security/cve/CVE-2014-0547" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1110-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1130-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00021.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.244 and 14.x and 15.x before 15.0.0.152 on Windows and OS X and before 11.2.202.406 on Linux, Adobe AIR before 15.0.0.249 on Windows and OS X and before 15.0.0.252 on Android, Adobe AIR SDK before 15.0.0.249, and Adobe AIR SDK &amp; Compiler before 15.0.0.249 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0549, CVE-2014-0550, CVE-2014-0551, CVE-2014-0552, and CVE-2014-0555.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0547/">CVE-2014-0547</cve>
	<bugzilla href="https://bugzilla.suse.com/895856">SUSE bug 895856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592803" comment="flash-player-11.2.202.406-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592804" comment="flash-player-gnome-11.2.202.406-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592805" comment="flash-player-kde4-11.2.202.406-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0548</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0548" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0548" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0548" ref_url="https://www.suse.com/security/cve/CVE-2014-0548" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1110-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1130-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00021.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.244 and 14.x and 15.x before 15.0.0.152 on Windows and OS X and before 11.2.202.406 on Linux, Adobe AIR before 15.0.0.249 on Windows and OS X and before 15.0.0.252 on Android, Adobe AIR SDK before 15.0.0.249, and Adobe AIR SDK &amp; Compiler before 15.0.0.249 allow remote attackers to bypass the Same Origin Policy via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0548/">CVE-2014-0548</cve>
	<bugzilla href="https://bugzilla.suse.com/895856">SUSE bug 895856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592803" comment="flash-player-11.2.202.406-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592804" comment="flash-player-gnome-11.2.202.406-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592805" comment="flash-player-kde4-11.2.202.406-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0549</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0549" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0549" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0549" ref_url="https://www.suse.com/security/cve/CVE-2014-0549" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1110-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1130-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00021.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.244 and 14.x and 15.x before 15.0.0.152 on Windows and OS X and before 11.2.202.406 on Linux, Adobe AIR before 15.0.0.249 on Windows and OS X and before 15.0.0.252 on Android, Adobe AIR SDK before 15.0.0.249, and Adobe AIR SDK &amp; Compiler before 15.0.0.249 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0547, CVE-2014-0550, CVE-2014-0551, CVE-2014-0552, and CVE-2014-0555.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0549/">CVE-2014-0549</cve>
	<bugzilla href="https://bugzilla.suse.com/895856">SUSE bug 895856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592803" comment="flash-player-11.2.202.406-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592804" comment="flash-player-gnome-11.2.202.406-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592805" comment="flash-player-kde4-11.2.202.406-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0550</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0550" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0550" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0550" ref_url="https://www.suse.com/security/cve/CVE-2014-0550" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1110-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1130-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00021.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.244 and 14.x and 15.x before 15.0.0.152 on Windows and OS X and before 11.2.202.406 on Linux, Adobe AIR before 15.0.0.249 on Windows and OS X and before 15.0.0.252 on Android, Adobe AIR SDK before 15.0.0.249, and Adobe AIR SDK &amp; Compiler before 15.0.0.249 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0547, CVE-2014-0549, CVE-2014-0551, CVE-2014-0552, and CVE-2014-0555.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0550/">CVE-2014-0550</cve>
	<bugzilla href="https://bugzilla.suse.com/895856">SUSE bug 895856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592803" comment="flash-player-11.2.202.406-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592804" comment="flash-player-gnome-11.2.202.406-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592805" comment="flash-player-kde4-11.2.202.406-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0551</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0551" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0551" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0551" ref_url="https://www.suse.com/security/cve/CVE-2014-0551" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1110-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1130-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00021.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.244 and 14.x and 15.x before 15.0.0.152 on Windows and OS X and before 11.2.202.406 on Linux, Adobe AIR before 15.0.0.249 on Windows and OS X and before 15.0.0.252 on Android, Adobe AIR SDK before 15.0.0.249, and Adobe AIR SDK &amp; Compiler before 15.0.0.249 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0547, CVE-2014-0549, CVE-2014-0550, CVE-2014-0552, and CVE-2014-0555.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0551/">CVE-2014-0551</cve>
	<bugzilla href="https://bugzilla.suse.com/895856">SUSE bug 895856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592803" comment="flash-player-11.2.202.406-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592804" comment="flash-player-gnome-11.2.202.406-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592805" comment="flash-player-kde4-11.2.202.406-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0552</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0552" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0552" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0552" ref_url="https://www.suse.com/security/cve/CVE-2014-0552" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1110-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1130-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00021.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.244 and 14.x and 15.x before 15.0.0.152 on Windows and OS X and before 11.2.202.406 on Linux, Adobe AIR before 15.0.0.249 on Windows and OS X and before 15.0.0.252 on Android, Adobe AIR SDK before 15.0.0.249, and Adobe AIR SDK &amp; Compiler before 15.0.0.249 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0547, CVE-2014-0549, CVE-2014-0550, CVE-2014-0551, and CVE-2014-0555.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0552/">CVE-2014-0552</cve>
	<bugzilla href="https://bugzilla.suse.com/895856">SUSE bug 895856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592803" comment="flash-player-11.2.202.406-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592804" comment="flash-player-gnome-11.2.202.406-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592805" comment="flash-player-kde4-11.2.202.406-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0553</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0553" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0553" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0553" ref_url="https://www.suse.com/security/cve/CVE-2014-0553" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1110-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1130-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00021.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.244 and 14.x and 15.x before 15.0.0.152 on Windows and OS X and before 11.2.202.406 on Linux, Adobe AIR before 15.0.0.249 on Windows and OS X and before 15.0.0.252 on Android, Adobe AIR SDK before 15.0.0.249, and Adobe AIR SDK &amp; Compiler before 15.0.0.249 allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0553/">CVE-2014-0553</cve>
	<bugzilla href="https://bugzilla.suse.com/895856">SUSE bug 895856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592803" comment="flash-player-11.2.202.406-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592804" comment="flash-player-gnome-11.2.202.406-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592805" comment="flash-player-kde4-11.2.202.406-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0554</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0554" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0554" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0554" ref_url="https://www.suse.com/security/cve/CVE-2014-0554" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1110-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1130-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00021.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.244 and 14.x and 15.x before 15.0.0.152 on Windows and OS X and before 11.2.202.406 on Linux, Adobe AIR before 15.0.0.249 on Windows and OS X and before 15.0.0.252 on Android, Adobe AIR SDK before 15.0.0.249, and Adobe AIR SDK &amp; Compiler before 15.0.0.249 allow attackers to bypass intended access restrictions via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0554/">CVE-2014-0554</cve>
	<bugzilla href="https://bugzilla.suse.com/895856">SUSE bug 895856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592803" comment="flash-player-11.2.202.406-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592804" comment="flash-player-gnome-11.2.202.406-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592805" comment="flash-player-kde4-11.2.202.406-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0555</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0555" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0555" ref_url="https://www.suse.com/security/cve/CVE-2014-0555" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1110-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1130-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00021.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.244 and 14.x and 15.x before 15.0.0.152 on Windows and OS X and before 11.2.202.406 on Linux, Adobe AIR before 15.0.0.249 on Windows and OS X and before 15.0.0.252 on Android, Adobe AIR SDK before 15.0.0.249, and Adobe AIR SDK &amp; Compiler before 15.0.0.249 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0547, CVE-2014-0549, CVE-2014-0550, CVE-2014-0551, and CVE-2014-0552.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0555/">CVE-2014-0555</cve>
	<bugzilla href="https://bugzilla.suse.com/895856">SUSE bug 895856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592803" comment="flash-player-11.2.202.406-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592804" comment="flash-player-gnome-11.2.202.406-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592805" comment="flash-player-kde4-11.2.202.406-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0556</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0556" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0556" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0556" ref_url="https://www.suse.com/security/cve/CVE-2014-0556" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1110-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1130-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00021.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Adobe Flash Player before 13.0.0.244 and 14.x and 15.x before 15.0.0.152 on Windows and OS X and before 11.2.202.406 on Linux, Adobe AIR before 15.0.0.249 on Windows and OS X and before 15.0.0.252 on Android, Adobe AIR SDK before 15.0.0.249, and Adobe AIR SDK &amp; Compiler before 15.0.0.249 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-0559.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0556/">CVE-2014-0556</cve>
	<bugzilla href="https://bugzilla.suse.com/895856">SUSE bug 895856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592803" comment="flash-player-11.2.202.406-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592804" comment="flash-player-gnome-11.2.202.406-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592805" comment="flash-player-kde4-11.2.202.406-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0557</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0557" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0557" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0557" ref_url="https://www.suse.com/security/cve/CVE-2014-0557" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1110-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1130-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00021.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.244 and 14.x and 15.x before 15.0.0.152 on Windows and OS X and before 11.2.202.406 on Linux, Adobe AIR before 15.0.0.249 on Windows and OS X and before 15.0.0.252 on Android, Adobe AIR SDK before 15.0.0.249, and Adobe AIR SDK &amp; Compiler before 15.0.0.249 do not properly restrict discovery of memory addresses, which allows attackers to bypass the ASLR protection mechanism via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0557/">CVE-2014-0557</cve>
	<bugzilla href="https://bugzilla.suse.com/895856">SUSE bug 895856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592803" comment="flash-player-11.2.202.406-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592804" comment="flash-player-gnome-11.2.202.406-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592805" comment="flash-player-kde4-11.2.202.406-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0558</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0558" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0558" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0558" ref_url="https://www.suse.com/security/cve/CVE-2014-0558" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1423-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1329-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-10/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.250 and 14.x and 15.x before 15.0.0.189 on Windows and OS X and before 11.2.202.411 on Linux, Adobe AIR before 15.0.0.293, Adobe AIR SDK before 15.0.0.302, and Adobe AIR SDK &amp; Compiler before 15.0.0.302 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0564.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0558/">CVE-2014-0558</cve>
	<bugzilla href="https://bugzilla.suse.com/901334">SUSE bug 901334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905032">SUSE bug 905032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592806" comment="flash-player-11.2.202.411-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592807" comment="flash-player-gnome-11.2.202.411-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592808" comment="flash-player-kde4-11.2.202.411-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0559</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0559" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0559" ref_url="https://www.suse.com/security/cve/CVE-2014-0559" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1110-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1130-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00021.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Adobe Flash Player before 13.0.0.244 and 14.x and 15.x before 15.0.0.152 on Windows and OS X and before 11.2.202.406 on Linux, Adobe AIR before 15.0.0.249 on Windows and OS X and before 15.0.0.252 on Android, Adobe AIR SDK before 15.0.0.249, and Adobe AIR SDK &amp; Compiler before 15.0.0.249 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-0556.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0559/">CVE-2014-0559</cve>
	<bugzilla href="https://bugzilla.suse.com/895856">SUSE bug 895856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592803" comment="flash-player-11.2.202.406-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592804" comment="flash-player-gnome-11.2.202.406-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592805" comment="flash-player-kde4-11.2.202.406-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0564</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0564" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0564" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0564" ref_url="https://www.suse.com/security/cve/CVE-2014-0564" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1423-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1329-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-10/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.250 and 14.x and 15.x before 15.0.0.189 on Windows and OS X and before 11.2.202.411 on Linux, Adobe AIR before 15.0.0.293, Adobe AIR SDK before 15.0.0.302, and Adobe AIR SDK &amp; Compiler before 15.0.0.302 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0558.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0564/">CVE-2014-0564</cve>
	<bugzilla href="https://bugzilla.suse.com/901334">SUSE bug 901334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905032">SUSE bug 905032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592806" comment="flash-player-11.2.202.411-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592807" comment="flash-player-gnome-11.2.202.411-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592808" comment="flash-player-kde4-11.2.202.411-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0569</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0569" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0569" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0569" ref_url="https://www.suse.com/security/cve/CVE-2014-0569" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1423-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1329-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-10/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Integer overflow in Adobe Flash Player before 13.0.0.250 and 14.x and 15.x before 15.0.0.189 on Windows and OS X and before 11.2.202.411 on Linux, Adobe AIR before 15.0.0.293, Adobe AIR SDK before 15.0.0.302, and Adobe AIR SDK &amp; Compiler before 15.0.0.302 allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0569/">CVE-2014-0569</cve>
	<bugzilla href="https://bugzilla.suse.com/901334">SUSE bug 901334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905032">SUSE bug 905032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592806" comment="flash-player-11.2.202.411-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592807" comment="flash-player-gnome-11.2.202.411-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592808" comment="flash-player-kde4-11.2.202.411-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0573</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0573" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0573" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0573" ref_url="https://www.suse.com/security/cve/CVE-2014-0573" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1442-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK &amp; Compiler before 15.0.0.356 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-0588 and CVE-2014-8438.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0573/">CVE-2014-0573</cve>
	<bugzilla href="https://bugzilla.suse.com/905032">SUSE bug 905032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566535" comment="flash-player-11.2.202.418-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566536" comment="flash-player-gnome-11.2.202.418-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566537" comment="flash-player-kde4-11.2.202.418-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0574</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0574" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0574" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0574" ref_url="https://www.suse.com/security/cve/CVE-2014-0574" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1442-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1626-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK &amp; Compiler before 15.0.0.356 allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0574/">CVE-2014-0574</cve>
	<bugzilla href="https://bugzilla.suse.com/905032">SUSE bug 905032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566535" comment="flash-player-11.2.202.418-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566536" comment="flash-player-gnome-11.2.202.418-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566537" comment="flash-player-kde4-11.2.202.418-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0576</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0576" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0576" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0576" ref_url="https://www.suse.com/security/cve/CVE-2014-0576" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1442-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK &amp; Compiler before 15.0.0.356 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0581, CVE-2014-8440, and CVE-2014-8441.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0576/">CVE-2014-0576</cve>
	<bugzilla href="https://bugzilla.suse.com/905032">SUSE bug 905032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566535" comment="flash-player-11.2.202.418-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566536" comment="flash-player-gnome-11.2.202.418-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566537" comment="flash-player-kde4-11.2.202.418-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0577</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0577" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0577" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0577" ref_url="https://www.suse.com/security/cve/CVE-2014-0577" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1442-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK &amp; Compiler before 15.0.0.356 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2014-0584, CVE-2014-0585, CVE-2014-0586, and CVE-2014-0590.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0577/">CVE-2014-0577</cve>
	<bugzilla href="https://bugzilla.suse.com/905032">SUSE bug 905032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566535" comment="flash-player-11.2.202.418-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566536" comment="flash-player-gnome-11.2.202.418-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566537" comment="flash-player-kde4-11.2.202.418-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0578</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0578" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0578" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0578" ref_url="https://www.suse.com/security/cve/CVE-2014-0578" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allow remote attackers to bypass the Same Origin Policy via unspecified vectors, a different vulnerability than CVE-2015-3115, CVE-2015-3116, CVE-2015-3125, and CVE-2015-5116.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0578/">CVE-2014-0578</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566538" comment="flash-player-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566539" comment="flash-player-gnome-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566540" comment="flash-player-kde4-11.2.202.481-0.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0580</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0580" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0580" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0580" ref_url="https://www.suse.com/security/cve/CVE-2014-0580" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1650-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1622-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1629-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.259 and 14.x through 16.x before 16.0.0.235 on Windows and OS X and before 11.2.202.425 on Linux allows remote attackers to bypass the Same Origin Policy via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0580/">CVE-2014-0580</cve>
	<bugzilla href="https://bugzilla.suse.com/909219">SUSE bug 909219</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592809" comment="flash-player-11.2.202.425-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592810" comment="flash-player-gnome-11.2.202.425-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592811" comment="flash-player-kde4-11.2.202.425-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0581</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0581" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0581" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0581" ref_url="https://www.suse.com/security/cve/CVE-2014-0581" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1442-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK &amp; Compiler before 15.0.0.356 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0576, CVE-2014-8440, and CVE-2014-8441.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0581/">CVE-2014-0581</cve>
	<bugzilla href="https://bugzilla.suse.com/905032">SUSE bug 905032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566535" comment="flash-player-11.2.202.418-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566536" comment="flash-player-gnome-11.2.202.418-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566537" comment="flash-player-kde4-11.2.202.418-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0582</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0582" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0582" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0582" ref_url="https://www.suse.com/security/cve/CVE-2014-0582" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1442-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK &amp; Compiler before 15.0.0.356 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-0589.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0582/">CVE-2014-0582</cve>
	<bugzilla href="https://bugzilla.suse.com/905032">SUSE bug 905032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566535" comment="flash-player-11.2.202.418-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566536" comment="flash-player-gnome-11.2.202.418-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566537" comment="flash-player-kde4-11.2.202.418-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0583</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0583" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0583" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0583" ref_url="https://www.suse.com/security/cve/CVE-2014-0583" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1442-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK &amp; Compiler before 15.0.0.356 allows attackers to complete a transition from Low Integrity to Medium Integrity via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0583/">CVE-2014-0583</cve>
	<bugzilla href="https://bugzilla.suse.com/905032">SUSE bug 905032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566535" comment="flash-player-11.2.202.418-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566536" comment="flash-player-gnome-11.2.202.418-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566537" comment="flash-player-kde4-11.2.202.418-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0584</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0584" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0584" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0584" ref_url="https://www.suse.com/security/cve/CVE-2014-0584" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1442-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK &amp; Compiler before 15.0.0.356 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2014-0577, CVE-2014-0585, CVE-2014-0586, and CVE-2014-0590.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0584/">CVE-2014-0584</cve>
	<bugzilla href="https://bugzilla.suse.com/905032">SUSE bug 905032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566535" comment="flash-player-11.2.202.418-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566536" comment="flash-player-gnome-11.2.202.418-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566537" comment="flash-player-kde4-11.2.202.418-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0585</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0585" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0585" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0585" ref_url="https://www.suse.com/security/cve/CVE-2014-0585" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1442-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK &amp; Compiler before 15.0.0.356 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2014-0577, CVE-2014-0584, CVE-2014-0586, and CVE-2014-0590.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0585/">CVE-2014-0585</cve>
	<bugzilla href="https://bugzilla.suse.com/905032">SUSE bug 905032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566535" comment="flash-player-11.2.202.418-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566536" comment="flash-player-gnome-11.2.202.418-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566537" comment="flash-player-kde4-11.2.202.418-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0586</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0586" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0586" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0586" ref_url="https://www.suse.com/security/cve/CVE-2014-0586" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1442-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK &amp; Compiler before 15.0.0.356 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2014-0577, CVE-2014-0584, CVE-2014-0585, and CVE-2014-0590.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0586/">CVE-2014-0586</cve>
	<bugzilla href="https://bugzilla.suse.com/905032">SUSE bug 905032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566535" comment="flash-player-11.2.202.418-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566536" comment="flash-player-gnome-11.2.202.418-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566537" comment="flash-player-kde4-11.2.202.418-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0587</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0587" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0587" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0587" ref_url="https://www.suse.com/security/cve/CVE-2014-0587" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1650-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1622-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1629-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.259 and 14.x through 16.x before 16.0.0.235 on Windows and OS X and before 11.2.202.425 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-9164.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0587/">CVE-2014-0587</cve>
	<bugzilla href="https://bugzilla.suse.com/909219">SUSE bug 909219</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592809" comment="flash-player-11.2.202.425-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592810" comment="flash-player-gnome-11.2.202.425-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592811" comment="flash-player-kde4-11.2.202.425-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0588</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0588" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0588" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0588" ref_url="https://www.suse.com/security/cve/CVE-2014-0588" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1442-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK &amp; Compiler before 15.0.0.356 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-0573 and CVE-2014-8438.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0588/">CVE-2014-0588</cve>
	<bugzilla href="https://bugzilla.suse.com/905032">SUSE bug 905032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566535" comment="flash-player-11.2.202.418-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566536" comment="flash-player-gnome-11.2.202.418-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566537" comment="flash-player-kde4-11.2.202.418-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140589" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0589</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0589" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0589" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0589" ref_url="https://www.suse.com/security/cve/CVE-2014-0589" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1442-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK &amp; Compiler before 15.0.0.356 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-0582.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0589/">CVE-2014-0589</cve>
	<bugzilla href="https://bugzilla.suse.com/905032">SUSE bug 905032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566535" comment="flash-player-11.2.202.418-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566536" comment="flash-player-gnome-11.2.202.418-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566537" comment="flash-player-kde4-11.2.202.418-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0590</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0590" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0590" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0590" ref_url="https://www.suse.com/security/cve/CVE-2014-0590" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1442-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK &amp; Compiler before 15.0.0.356 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2014-0577, CVE-2014-0584, CVE-2014-0585, and CVE-2014-0586.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0590/">CVE-2014-0590</cve>
	<bugzilla href="https://bugzilla.suse.com/905032">SUSE bug 905032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566535" comment="flash-player-11.2.202.418-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566536" comment="flash-player-gnome-11.2.202.418-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566537" comment="flash-player-kde4-11.2.202.418-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0591</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0591" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0591" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0591" ref_url="https://www.suse.com/security/cve/CVE-2014-0591" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0480-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0202-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00019.html" source="SUSE-SU"/>
    <description>
    The query_findclosestnsec3 function in query.c in named in ISC BIND 9.6, 9.7, and 9.8 before 9.8.6-P2 and 9.9 before 9.9.4-P2, and 9.6-ESV before 9.6-ESV-R10-P2, allows remote attackers to cause a denial of service (INSIST assertion failure and daemon exit) via a crafted DNS query to an authoritative nameserver that uses the NSEC3 signing feature.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0591/">CVE-2014-0591</cve>
	<bugzilla href="https://bugzilla.suse.com/858639">SUSE bug 858639</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009565855" comment="bind-libs-9.9.4P2-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565856" comment="bind-libs-32bit-9.9.4P2-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009565857" comment="bind-utils-9.9.4P2-0.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0595</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0595" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0595" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0595" ref_url="https://www.suse.com/security/cve/CVE-2014-0595" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0847-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="TID7014932" ref_url="https://www.suse.com/support/kb/doc/?id=7014932" source="SUSE-SU"/>
    <description>
    /opt/novell/ncl/bin/nwrights in Novell Client for Linux in Novell Open Enterprise Server (OES) 11 Linux SP2 does not properly manage a certain array, which allows local users to obtain the S permission in opportunistic circumstances by leveraging the granting of the F permission by an administrator.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0595/">CVE-2014-0595</cve>
	<bugzilla href="https://bugzilla.suse.com/872796">SUSE bug 872796</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566994" comment="novell-qtgui-3.0.0-0.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566995" comment="novell-qtgui-cli-3.0.0-0.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566996" comment="novell-ui-base-3.0.0-0.10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1444</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1444" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1444" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1444" ref_url="https://www.suse.com/security/cve/CVE-2014-1444" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0766-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00013.html" source="SUSE-SU"/>
    <description>
    The fst_get_iface function in drivers/net/wan/farsync.c in the Linux kernel before 3.11.7 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability for an SIOCWANDEV ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1444/">CVE-2014-1444</cve>
	<bugzilla href="https://bugzilla.suse.com/858869">SUSE bug 858869</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589697" comment="kernel-default-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589698" comment="kernel-default-base-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589699" comment="kernel-default-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589700" comment="kernel-default-extra-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589701" comment="kernel-source-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589702" comment="kernel-syms-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589703" comment="kernel-trace-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589704" comment="kernel-xen-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589705" comment="kernel-xen-base-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589706" comment="kernel-xen-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589707" comment="kernel-xen-extra-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589708" comment="xen-kmp-default-4.2.4_02_3.0.101_0.35-0.7.45 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1445</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1445" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1445" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1445" ref_url="https://www.suse.com/security/cve/CVE-2014-1445" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0766-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00013.html" source="SUSE-SU"/>
    <description>
    The wanxl_ioctl function in drivers/net/wan/wanxl.c in the Linux kernel before 3.11.7 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory via an ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1445/">CVE-2014-1445</cve>
	<bugzilla href="https://bugzilla.suse.com/858870">SUSE bug 858870</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589697" comment="kernel-default-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589698" comment="kernel-default-base-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589699" comment="kernel-default-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589700" comment="kernel-default-extra-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589701" comment="kernel-source-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589702" comment="kernel-syms-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589703" comment="kernel-trace-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589704" comment="kernel-xen-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589705" comment="kernel-xen-base-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589706" comment="kernel-xen-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589707" comment="kernel-xen-extra-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589708" comment="xen-kmp-default-4.2.4_02_3.0.101_0.35-0.7.45 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1446</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1446" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1446" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1446" ref_url="https://www.suse.com/security/cve/CVE-2014-1446" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0766-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00013.html" source="SUSE-SU"/>
    <description>
    The yam_ioctl function in drivers/net/hamradio/yam.c in the Linux kernel before 3.12.8 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability for an SIOCYAMGCFG ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1446/">CVE-2014-1446</cve>
	<bugzilla href="https://bugzilla.suse.com/858872">SUSE bug 858872</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589697" comment="kernel-default-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589698" comment="kernel-default-base-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589699" comment="kernel-default-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589700" comment="kernel-default-extra-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589701" comment="kernel-source-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589702" comment="kernel-syms-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589703" comment="kernel-trace-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589704" comment="kernel-xen-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589705" comment="kernel-xen-base-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589706" comment="kernel-xen-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589707" comment="kernel-xen-extra-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589708" comment="xen-kmp-default-4.2.4_02_3.0.101_0.35-0.7.45 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1447</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1447" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1447" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1447" ref_url="https://www.suse.com/security/cve/CVE-2014-1447" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-March/000738.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0270-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00062.html" source="SUSE-SU"/>
    <description>
    Race condition in the virNetServerClientStartKeepAlive function in libvirt before 1.2.1 allows remote attackers to cause a denial of service (libvirtd crash) by closing a connection before a keepalive response is sent.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1447/">CVE-2014-1447</cve>
	<bugzilla href="https://bugzilla.suse.com/858817">SUSE bug 858817</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592201" comment="libvirt-1.0.5.9-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592202" comment="libvirt-client-1.0.5.9-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592203" comment="libvirt-client-32bit-1.0.5.9-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592204" comment="libvirt-doc-1.0.5.9-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592205" comment="libvirt-python-1.0.5.9-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1477</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1477" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1477" ref_url="https://www.suse.com/security/cve/CVE-2014-1477" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0248-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1477/">CVE-2014-1477</cve>
	<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862345">SUSE bug 862345</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566436" comment="MozillaFirefox-24.3.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566437" comment="MozillaFirefox-branding-SLED-24-0.7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566438" comment="MozillaFirefox-translations-24.3.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566439" comment="libfreebl3-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566440" comment="libfreebl3-32bit-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566441" comment="libsoftokn3-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566442" comment="libsoftokn3-32bit-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566443" comment="mozilla-nss-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566444" comment="mozilla-nss-32bit-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566445" comment="mozilla-nss-tools-3.15.4-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1479</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1479" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1479" ref_url="https://www.suse.com/security/cve/CVE-2014-1479" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0248-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The System Only Wrapper (SOW) implementation in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 does not prevent certain cloning operations, which allows remote attackers to bypass intended restrictions on XUL content via vectors involving XBL content scopes.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1479/">CVE-2014-1479</cve>
	<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862348">SUSE bug 862348</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566436" comment="MozillaFirefox-24.3.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566437" comment="MozillaFirefox-branding-SLED-24-0.7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566438" comment="MozillaFirefox-translations-24.3.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566439" comment="libfreebl3-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566440" comment="libfreebl3-32bit-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566441" comment="libsoftokn3-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566442" comment="libsoftokn3-32bit-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566443" comment="mozilla-nss-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566444" comment="mozilla-nss-32bit-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566445" comment="mozilla-nss-tools-3.15.4-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1480</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1480" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1480" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1480" ref_url="https://www.suse.com/security/cve/CVE-2014-1480" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0248-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The file-download implementation in Mozilla Firefox before 27.0 and SeaMonkey before 2.24 does not properly restrict the timing of button selections, which allows remote attackers to conduct clickjacking attacks, and trigger unintended launching of a downloaded file, via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1480/">CVE-2014-1480</cve>
	<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566436" comment="MozillaFirefox-24.3.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566437" comment="MozillaFirefox-branding-SLED-24-0.7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566438" comment="MozillaFirefox-translations-24.3.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566439" comment="libfreebl3-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566440" comment="libfreebl3-32bit-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566441" comment="libsoftokn3-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566442" comment="libsoftokn3-32bit-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566443" comment="mozilla-nss-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566444" comment="mozilla-nss-32bit-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566445" comment="mozilla-nss-tools-3.15.4-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141481" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1481</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1481" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1481" ref_url="https://www.suse.com/security/cve/CVE-2014-1481" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0248-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 allow remote attackers to bypass intended restrictions on window objects by leveraging inconsistency in native getter methods across different JavaScript engines.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1481/">CVE-2014-1481</cve>
	<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862309">SUSE bug 862309</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566436" comment="MozillaFirefox-24.3.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566437" comment="MozillaFirefox-branding-SLED-24-0.7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566438" comment="MozillaFirefox-translations-24.3.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566439" comment="libfreebl3-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566440" comment="libfreebl3-32bit-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566441" comment="libsoftokn3-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566442" comment="libsoftokn3-32bit-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566443" comment="mozilla-nss-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566444" comment="mozilla-nss-32bit-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566445" comment="mozilla-nss-tools-3.15.4-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1482</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1482" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1482" ref_url="https://www.suse.com/security/cve/CVE-2014-1482" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0248-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    RasterImage.cpp in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 does not prevent access to discarded data, which allows remote attackers to execute arbitrary code or cause a denial of service (incorrect write operations) via crafted image data, as demonstrated by Goo Create.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-1482/">CVE-2014-1482</cve>
	<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862356">SUSE bug 862356</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566436" comment="MozillaFirefox-24.3.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566437" comment="MozillaFirefox-branding-SLED-24-0.7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566438" comment="MozillaFirefox-translations-24.3.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566439" comment="libfreebl3-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566440" comment="libfreebl3-32bit-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566441" comment="libsoftokn3-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566442" comment="libsoftokn3-32bit-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566443" comment="mozilla-nss-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566444" comment="mozilla-nss-32bit-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566445" comment="mozilla-nss-tools-3.15.4-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1483</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1483" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1483" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1483" ref_url="https://www.suse.com/security/cve/CVE-2014-1483" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0248-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 27.0 and SeaMonkey before 2.24 allow remote attackers to bypass the Same Origin Policy and obtain sensitive information by using an IFRAME element in conjunction with certain timing measurements involving the document.caretPositionFromPoint and document.elementFromPoint functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1483/">CVE-2014-1483</cve>
	<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862360">SUSE bug 862360</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566436" comment="MozillaFirefox-24.3.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566437" comment="MozillaFirefox-branding-SLED-24-0.7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566438" comment="MozillaFirefox-translations-24.3.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566439" comment="libfreebl3-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566440" comment="libfreebl3-32bit-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566441" comment="libsoftokn3-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566442" comment="libsoftokn3-32bit-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566443" comment="mozilla-nss-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566444" comment="mozilla-nss-32bit-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566445" comment="mozilla-nss-tools-3.15.4-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1484</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1484" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1484" ref_url="https://www.suse.com/security/cve/CVE-2014-1484" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0248-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 27.0 on Android 4.2 and earlier creates system-log entries containing profile paths, which allows attackers to obtain sensitive information via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1484/">CVE-2014-1484</cve>
	<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566436" comment="MozillaFirefox-24.3.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566437" comment="MozillaFirefox-branding-SLED-24-0.7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566438" comment="MozillaFirefox-translations-24.3.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566439" comment="libfreebl3-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566440" comment="libfreebl3-32bit-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566441" comment="libsoftokn3-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566442" comment="libsoftokn3-32bit-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566443" comment="mozilla-nss-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566444" comment="mozilla-nss-32bit-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566445" comment="mozilla-nss-tools-3.15.4-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1485</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1485" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1485" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1485" ref_url="https://www.suse.com/security/cve/CVE-2014-1485" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0248-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The Content Security Policy (CSP) implementation in Mozilla Firefox before 27.0 and SeaMonkey before 2.24 operates on XSLT stylesheets according to style-src directives instead of script-src directives, which might allow remote attackers to execute arbitrary XSLT code by leveraging insufficient style-src restrictions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1485/">CVE-2014-1485</cve>
	<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566436" comment="MozillaFirefox-24.3.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566437" comment="MozillaFirefox-branding-SLED-24-0.7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566438" comment="MozillaFirefox-translations-24.3.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566439" comment="libfreebl3-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566440" comment="libfreebl3-32bit-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566441" comment="libsoftokn3-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566442" comment="libsoftokn3-32bit-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566443" comment="mozilla-nss-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566444" comment="mozilla-nss-32bit-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566445" comment="mozilla-nss-tools-3.15.4-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1486</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1486" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1486" ref_url="https://www.suse.com/security/cve/CVE-2014-1486" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0248-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the imgRequestProxy function in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 allows remote attackers to execute arbitrary code via vectors involving unspecified Content-Type values for image data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1486/">CVE-2014-1486</cve>
	<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566436" comment="MozillaFirefox-24.3.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566437" comment="MozillaFirefox-branding-SLED-24-0.7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566438" comment="MozillaFirefox-translations-24.3.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566439" comment="libfreebl3-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566440" comment="libfreebl3-32bit-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566441" comment="libsoftokn3-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566442" comment="libsoftokn3-32bit-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566443" comment="mozilla-nss-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566444" comment="mozilla-nss-32bit-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566445" comment="mozilla-nss-tools-3.15.4-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1487</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1487" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1487" ref_url="https://www.suse.com/security/cve/CVE-2014-1487" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0248-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The Web workers implementation in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 allows remote attackers to bypass the Same Origin Policy and obtain sensitive authentication information via vectors involving error messages.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1487/">CVE-2014-1487</cve>
	<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566436" comment="MozillaFirefox-24.3.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566437" comment="MozillaFirefox-branding-SLED-24-0.7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566438" comment="MozillaFirefox-translations-24.3.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566439" comment="libfreebl3-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566440" comment="libfreebl3-32bit-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566441" comment="libsoftokn3-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566442" comment="libsoftokn3-32bit-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566443" comment="mozilla-nss-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566444" comment="mozilla-nss-32bit-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566445" comment="mozilla-nss-tools-3.15.4-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1488</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1488" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1488" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1488" ref_url="https://www.suse.com/security/cve/CVE-2014-1488" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0248-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The Web workers implementation in Mozilla Firefox before 27.0 and SeaMonkey before 2.24 allows remote attackers to execute arbitrary code via vectors involving termination of a worker process that has performed a cross-thread object-passing operation in conjunction with use of asm.js.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1488/">CVE-2014-1488</cve>
	<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566436" comment="MozillaFirefox-24.3.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566437" comment="MozillaFirefox-branding-SLED-24-0.7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566438" comment="MozillaFirefox-translations-24.3.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566439" comment="libfreebl3-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566440" comment="libfreebl3-32bit-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566441" comment="libsoftokn3-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566442" comment="libsoftokn3-32bit-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566443" comment="mozilla-nss-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566444" comment="mozilla-nss-32bit-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566445" comment="mozilla-nss-tools-3.15.4-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1489</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1489" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1489" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1489" ref_url="https://www.suse.com/security/cve/CVE-2014-1489" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0248-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 27.0 does not properly restrict access to about:home buttons by script on other pages, which allows user-assisted remote attackers to cause a denial of service (session restore) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1489/">CVE-2014-1489</cve>
	<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566436" comment="MozillaFirefox-24.3.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566437" comment="MozillaFirefox-branding-SLED-24-0.7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566438" comment="MozillaFirefox-translations-24.3.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566439" comment="libfreebl3-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566440" comment="libfreebl3-32bit-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566441" comment="libsoftokn3-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566442" comment="libsoftokn3-32bit-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566443" comment="mozilla-nss-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566444" comment="mozilla-nss-32bit-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566445" comment="mozilla-nss-tools-3.15.4-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1490</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1490" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1490" ref_url="https://www.suse.com/security/cve/CVE-2014-1490" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0248-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Race condition in libssl in Mozilla Network Security Services (NSS) before 3.15.4, as used in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, SeaMonkey before 2.24, and other products, allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via vectors involving a resumption handshake that triggers incorrect replacement of a session ticket.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1490/">CVE-2014-1490</cve>
	<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862300">SUSE bug 862300</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566436" comment="MozillaFirefox-24.3.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566437" comment="MozillaFirefox-branding-SLED-24-0.7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566438" comment="MozillaFirefox-translations-24.3.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566439" comment="libfreebl3-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566440" comment="libfreebl3-32bit-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566441" comment="libsoftokn3-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566442" comment="libsoftokn3-32bit-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566443" comment="mozilla-nss-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566444" comment="mozilla-nss-32bit-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566445" comment="mozilla-nss-tools-3.15.4-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1491</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1491" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1491" ref_url="https://www.suse.com/security/cve/CVE-2014-1491" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0248-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Network Security Services (NSS) before 3.15.4, as used in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, SeaMonkey before 2.24, and other products, does not properly restrict public values in Diffie-Hellman key exchanges, which makes it easier for remote attackers to bypass cryptographic protection mechanisms in ticket handling by leveraging use of a certain value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1491/">CVE-2014-1491</cve>
	<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862289">SUSE bug 862289</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566436" comment="MozillaFirefox-24.3.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566437" comment="MozillaFirefox-branding-SLED-24-0.7.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566438" comment="MozillaFirefox-translations-24.3.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566439" comment="libfreebl3-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566440" comment="libfreebl3-32bit-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566441" comment="libsoftokn3-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566442" comment="libsoftokn3-32bit-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566443" comment="mozilla-nss-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566444" comment="mozilla-nss-32bit-3.15.4-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566445" comment="mozilla-nss-tools-3.15.4-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1493</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1493" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1493" ref_url="https://www.suse.com/security/cve/CVE-2014-1493" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0448-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0584-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1493/">CVE-2014-1493</cve>
	<bugzilla href="https://bugzilla.suse.com/868603">SUSE bug 868603</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566446" comment="MozillaFirefox-24.4.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566447" comment="MozillaFirefox-branding-SLED-24-0.7.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566448" comment="MozillaFirefox-translations-24.4.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566331" comment="mozilla-nspr-4.10.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566332" comment="mozilla-nspr-32bit-4.10.4-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1494</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1494" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1494" ref_url="https://www.suse.com/security/cve/CVE-2014-1494" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0448-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0584-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 28.0 and SeaMonkey before 2.25 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1494/">CVE-2014-1494</cve>
	<bugzilla href="https://bugzilla.suse.com/868603">SUSE bug 868603</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566446" comment="MozillaFirefox-24.4.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566447" comment="MozillaFirefox-branding-SLED-24-0.7.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566448" comment="MozillaFirefox-translations-24.4.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566331" comment="mozilla-nspr-4.10.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566332" comment="mozilla-nspr-32bit-4.10.4-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141496" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1496</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1496" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1496" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1496" ref_url="https://www.suse.com/security/cve/CVE-2014-1496" source="SUSE CVE"/>
    <description>
    Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 might allow local users to gain privileges by modifying the extracted Mar contents during an update.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1496/">CVE-2014-1496</cve>
	<bugzilla href="https://bugzilla.suse.com/868603">SUSE bug 868603</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566446" comment="MozillaFirefox-24.4.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566447" comment="MozillaFirefox-branding-SLED-24-0.7.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566448" comment="MozillaFirefox-translations-24.4.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566331" comment="mozilla-nspr-4.10.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566332" comment="mozilla-nspr-32bit-4.10.4-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1497</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1497" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1497" ref_url="https://www.suse.com/security/cve/CVE-2014-1497" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0448-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0584-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The mozilla::WaveReader::DecodeAudioData function in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to obtain sensitive information from process heap memory, cause a denial of service (out-of-bounds read and application crash), or possibly have unspecified other impact via a crafted WAV file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1497/">CVE-2014-1497</cve>
	<bugzilla href="https://bugzilla.suse.com/868603">SUSE bug 868603</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566446" comment="MozillaFirefox-24.4.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566447" comment="MozillaFirefox-branding-SLED-24-0.7.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566448" comment="MozillaFirefox-translations-24.4.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566331" comment="mozilla-nspr-4.10.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566332" comment="mozilla-nspr-32bit-4.10.4-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1498</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1498" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1498" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1498" ref_url="https://www.suse.com/security/cve/CVE-2014-1498" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0448-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0584-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The crypto.generateCRMFRequest method in Mozilla Firefox before 28.0 and SeaMonkey before 2.25 does not properly validate a certain key type, which allows remote attackers to cause a denial of service (application crash) via vectors that trigger generation of a key that supports the Elliptic Curve ec-dual-use algorithm.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1498/">CVE-2014-1498</cve>
	<bugzilla href="https://bugzilla.suse.com/868603">SUSE bug 868603</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566446" comment="MozillaFirefox-24.4.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566447" comment="MozillaFirefox-branding-SLED-24-0.7.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566448" comment="MozillaFirefox-translations-24.4.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566331" comment="mozilla-nspr-4.10.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566332" comment="mozilla-nspr-32bit-4.10.4-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1499</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1499" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1499" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1499" ref_url="https://www.suse.com/security/cve/CVE-2014-1499" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0448-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0584-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 28.0 and SeaMonkey before 2.25 allow remote attackers to spoof the domain name in the WebRTC (1) camera or (2) microphone permission prompt by triggering navigation at a certain time during generation of this prompt.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1499/">CVE-2014-1499</cve>
	<bugzilla href="https://bugzilla.suse.com/868603">SUSE bug 868603</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566446" comment="MozillaFirefox-24.4.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566447" comment="MozillaFirefox-branding-SLED-24-0.7.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566448" comment="MozillaFirefox-translations-24.4.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566331" comment="mozilla-nspr-4.10.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566332" comment="mozilla-nspr-32bit-4.10.4-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1500</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1500" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1500" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1500" ref_url="https://www.suse.com/security/cve/CVE-2014-1500" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0448-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0584-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 28.0 and SeaMonkey before 2.25 allow remote attackers to cause a denial of service (resource consumption and application hang) via onbeforeunload events that trigger background JavaScript execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1500/">CVE-2014-1500</cve>
	<bugzilla href="https://bugzilla.suse.com/868603">SUSE bug 868603</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566446" comment="MozillaFirefox-24.4.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566447" comment="MozillaFirefox-branding-SLED-24-0.7.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566448" comment="MozillaFirefox-translations-24.4.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566331" comment="mozilla-nspr-4.10.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566332" comment="mozilla-nspr-32bit-4.10.4-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1501</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1501" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1501" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1501" ref_url="https://www.suse.com/security/cve/CVE-2014-1501" source="SUSE CVE"/>
    <description>
    Mozilla Firefox before 28.0 on Android allows remote attackers to bypass the Same Origin Policy and access arbitrary file: URLs via vectors involving the "Open Link in New Tab" menu selection.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1501/">CVE-2014-1501</cve>
	<bugzilla href="https://bugzilla.suse.com/868603">SUSE bug 868603</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566446" comment="MozillaFirefox-24.4.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566447" comment="MozillaFirefox-branding-SLED-24-0.7.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566448" comment="MozillaFirefox-translations-24.4.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566331" comment="mozilla-nspr-4.10.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566332" comment="mozilla-nspr-32bit-4.10.4-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1502</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1502" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1502" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1502" ref_url="https://www.suse.com/security/cve/CVE-2014-1502" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0448-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0584-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The (1) WebGL.compressedTexImage2D and (2) WebGL.compressedTexSubImage2D functions in Mozilla Firefox before 28.0 and SeaMonkey before 2.25 allow remote attackers to bypass the Same Origin Policy and render content in a different domain via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1502/">CVE-2014-1502</cve>
	<bugzilla href="https://bugzilla.suse.com/868603">SUSE bug 868603</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566446" comment="MozillaFirefox-24.4.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566447" comment="MozillaFirefox-branding-SLED-24-0.7.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566448" comment="MozillaFirefox-translations-24.4.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566331" comment="mozilla-nspr-4.10.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566332" comment="mozilla-nspr-32bit-4.10.4-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1504</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1504" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1504" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1504" ref_url="https://www.suse.com/security/cve/CVE-2014-1504" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0448-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0584-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The session-restore feature in Mozilla Firefox before 28.0 and SeaMonkey before 2.25 does not consider the Content Security Policy of a data: URL, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted document that is accessed after a browser restart.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1504/">CVE-2014-1504</cve>
	<bugzilla href="https://bugzilla.suse.com/868603">SUSE bug 868603</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566446" comment="MozillaFirefox-24.4.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566447" comment="MozillaFirefox-branding-SLED-24-0.7.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566448" comment="MozillaFirefox-translations-24.4.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566331" comment="mozilla-nspr-4.10.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566332" comment="mozilla-nspr-32bit-4.10.4-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1505</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1505" ref_url="https://www.suse.com/security/cve/CVE-2014-1505" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0448-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0584-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The SVG filter implementation in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to obtain sensitive displacement-correlation information, and possibly bypass the Same Origin Policy and read text from a different domain, via a timing attack involving feDisplacementMap elements, a related issue to CVE-2013-1693.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1505/">CVE-2014-1505</cve>
	<bugzilla href="https://bugzilla.suse.com/868603">SUSE bug 868603</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566446" comment="MozillaFirefox-24.4.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566447" comment="MozillaFirefox-branding-SLED-24-0.7.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566448" comment="MozillaFirefox-translations-24.4.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566331" comment="mozilla-nspr-4.10.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566332" comment="mozilla-nspr-32bit-4.10.4-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1508</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1508" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1508" ref_url="https://www.suse.com/security/cve/CVE-2014-1508" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0448-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0584-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The libxul.so!gfxContext::Polygon function in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to obtain sensitive information from process memory, cause a denial of service (out-of-bounds read and application crash), or possibly bypass the Same Origin Policy via vectors involving MathML polygon rendering.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1508/">CVE-2014-1508</cve>
	<bugzilla href="https://bugzilla.suse.com/868603">SUSE bug 868603</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566446" comment="MozillaFirefox-24.4.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566447" comment="MozillaFirefox-branding-SLED-24-0.7.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566448" comment="MozillaFirefox-translations-24.4.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566331" comment="mozilla-nspr-4.10.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566332" comment="mozilla-nspr-32bit-4.10.4-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1509</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1509" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1509" ref_url="https://www.suse.com/security/cve/CVE-2014-1509" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0448-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0584-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the _cairo_truetype_index_to_ucs4 function in cairo, as used in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25, allows remote attackers to execute arbitrary code via a crafted extension that renders fonts in a PDF document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1509/">CVE-2014-1509</cve>
	<bugzilla href="https://bugzilla.suse.com/868603">SUSE bug 868603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869339">SUSE bug 869339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566446" comment="MozillaFirefox-24.4.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566447" comment="MozillaFirefox-branding-SLED-24-0.7.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566448" comment="MozillaFirefox-translations-24.4.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566331" comment="mozilla-nspr-4.10.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566332" comment="mozilla-nspr-32bit-4.10.4-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1510</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1510" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1510" ref_url="https://www.suse.com/security/cve/CVE-2014-1510" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0448-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0584-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The Web IDL implementation in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to execute arbitrary JavaScript code with chrome privileges by using an IDL fragment to trigger a window.open call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1510/">CVE-2014-1510</cve>
	<bugzilla href="https://bugzilla.suse.com/868603">SUSE bug 868603</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566446" comment="MozillaFirefox-24.4.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566447" comment="MozillaFirefox-branding-SLED-24-0.7.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566448" comment="MozillaFirefox-translations-24.4.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566331" comment="mozilla-nspr-4.10.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566332" comment="mozilla-nspr-32bit-4.10.4-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1511</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1511" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1511" ref_url="https://www.suse.com/security/cve/CVE-2014-1511" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0448-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0584-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allow remote attackers to bypass the popup blocker via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1511/">CVE-2014-1511</cve>
	<bugzilla href="https://bugzilla.suse.com/868603">SUSE bug 868603</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566446" comment="MozillaFirefox-24.4.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566447" comment="MozillaFirefox-branding-SLED-24-0.7.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566448" comment="MozillaFirefox-translations-24.4.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566331" comment="mozilla-nspr-4.10.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566332" comment="mozilla-nspr-32bit-4.10.4-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1512</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1512" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1512" ref_url="https://www.suse.com/security/cve/CVE-2014-1512" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0448-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0584-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the TypeObject class in the JavaScript engine in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to execute arbitrary code by triggering extensive memory consumption while garbage collection is occurring, as demonstrated by improper handling of BumpChunk objects.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1512/">CVE-2014-1512</cve>
	<bugzilla href="https://bugzilla.suse.com/868603">SUSE bug 868603</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566446" comment="MozillaFirefox-24.4.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566447" comment="MozillaFirefox-branding-SLED-24-0.7.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566448" comment="MozillaFirefox-translations-24.4.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566331" comment="mozilla-nspr-4.10.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566332" comment="mozilla-nspr-32bit-4.10.4-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1513</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1513" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1513" ref_url="https://www.suse.com/security/cve/CVE-2014-1513" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0448-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0584-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    TypedArrayObject.cpp in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 does not prevent a zero-length transition during use of an ArrayBuffer object, which allows remote attackers to execute arbitrary code or cause a denial of service (heap-based out-of-bounds write or read) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1513/">CVE-2014-1513</cve>
	<bugzilla href="https://bugzilla.suse.com/868603">SUSE bug 868603</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566446" comment="MozillaFirefox-24.4.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566447" comment="MozillaFirefox-branding-SLED-24-0.7.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566448" comment="MozillaFirefox-translations-24.4.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566331" comment="mozilla-nspr-4.10.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566332" comment="mozilla-nspr-32bit-4.10.4-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141514" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1514</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1514" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1514" ref_url="https://www.suse.com/security/cve/CVE-2014-1514" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0448-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0584-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    vmtypedarrayobject.cpp in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 does not validate the length of the destination array before a copy operation, which allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write and application crash) by triggering incorrect use of the TypedArrayObject class.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1514/">CVE-2014-1514</cve>
	<bugzilla href="https://bugzilla.suse.com/868603">SUSE bug 868603</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566446" comment="MozillaFirefox-24.4.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566447" comment="MozillaFirefox-branding-SLED-24-0.7.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566448" comment="MozillaFirefox-translations-24.4.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566331" comment="mozilla-nspr-4.10.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566332" comment="mozilla-nspr-32bit-4.10.4-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1518</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1518" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1518" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1518" ref_url="https://www.suse.com/security/cve/CVE-2014-1518" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0638-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0638-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0665-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0665-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0599-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0602-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0629-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0640-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1518/">CVE-2014-1518</cve>
	<bugzilla href="https://bugzilla.suse.com/875803">SUSE bug 875803</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566324" comment="MozillaFirefox-24.5.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566325" comment="MozillaFirefox-branding-SLED-24-0.7.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566326" comment="MozillaFirefox-translations-24.5.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566327" comment="libfreebl3-3.16-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566328" comment="libfreebl3-32bit-3.16-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566329" comment="libsoftokn3-3.16-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566330" comment="libsoftokn3-32bit-3.16-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566331" comment="mozilla-nspr-4.10.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566332" comment="mozilla-nspr-32bit-4.10.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566333" comment="mozilla-nss-3.16-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566334" comment="mozilla-nss-32bit-3.16-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566335" comment="mozilla-nss-tools-3.16-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1520</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1520" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1520" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1520" ref_url="https://www.suse.com/security/cve/CVE-2014-1520" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0638-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0638-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00005.html" source="SUSE-SU"/>
    <description>
    maintenservice_installer.exe in the Maintenance Service Installer in Mozilla Firefox before 29.0 and Firefox ESR 24.x before 24.5 on Windows allows local users to gain privileges by placing a Trojan horse DLL file into a temporary directory at an unspecified point in the update process.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1520/">CVE-2014-1520</cve>
	<bugzilla href="https://bugzilla.suse.com/875803">SUSE bug 875803</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566324" comment="MozillaFirefox-24.5.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566325" comment="MozillaFirefox-branding-SLED-24-0.7.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566326" comment="MozillaFirefox-translations-24.5.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566327" comment="libfreebl3-3.16-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566328" comment="libfreebl3-32bit-3.16-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566329" comment="libsoftokn3-3.16-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566330" comment="libsoftokn3-32bit-3.16-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566331" comment="mozilla-nspr-4.10.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566332" comment="mozilla-nspr-32bit-4.10.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566333" comment="mozilla-nss-3.16-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566334" comment="mozilla-nss-32bit-3.16-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566335" comment="mozilla-nss-tools-3.16-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1523</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1523" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1523" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1523" ref_url="https://www.suse.com/security/cve/CVE-2014-1523" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0638-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0638-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0665-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0665-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0599-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0602-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0629-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0640-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the read_u32 function in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted JPEG image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1523/">CVE-2014-1523</cve>
	<bugzilla href="https://bugzilla.suse.com/875803">SUSE bug 875803</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566324" comment="MozillaFirefox-24.5.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566325" comment="MozillaFirefox-branding-SLED-24-0.7.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566326" comment="MozillaFirefox-translations-24.5.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566327" comment="libfreebl3-3.16-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566328" comment="libfreebl3-32bit-3.16-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566329" comment="libsoftokn3-3.16-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566330" comment="libsoftokn3-32bit-3.16-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566331" comment="mozilla-nspr-4.10.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566332" comment="mozilla-nspr-32bit-4.10.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566333" comment="mozilla-nss-3.16-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566334" comment="mozilla-nss-32bit-3.16-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566335" comment="mozilla-nss-tools-3.16-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1524</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1524" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1524" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1524" ref_url="https://www.suse.com/security/cve/CVE-2014-1524" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0638-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0638-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0665-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0665-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0599-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0602-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0629-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0640-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The nsXBLProtoImpl::InstallImplementation function in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 does not properly check whether objects are XBL objects, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow) via crafted JavaScript code that accesses a non-XBL object as if it were an XBL object.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1524/">CVE-2014-1524</cve>
	<bugzilla href="https://bugzilla.suse.com/875803">SUSE bug 875803</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566324" comment="MozillaFirefox-24.5.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566325" comment="MozillaFirefox-branding-SLED-24-0.7.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566326" comment="MozillaFirefox-translations-24.5.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566327" comment="libfreebl3-3.16-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566328" comment="libfreebl3-32bit-3.16-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566329" comment="libsoftokn3-3.16-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566330" comment="libsoftokn3-32bit-3.16-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566331" comment="mozilla-nspr-4.10.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566332" comment="mozilla-nspr-32bit-4.10.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566333" comment="mozilla-nss-3.16-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566334" comment="mozilla-nss-32bit-3.16-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566335" comment="mozilla-nss-tools-3.16-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1529</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1529" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1529" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1529" ref_url="https://www.suse.com/security/cve/CVE-2014-1529" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0638-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0638-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0665-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0665-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0599-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0602-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0629-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0640-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The Web Notification API in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to bypass intended source-component restrictions and execute arbitrary JavaScript code in a privileged context via a crafted web page for which Notification.permission is granted.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1529/">CVE-2014-1529</cve>
	<bugzilla href="https://bugzilla.suse.com/875803">SUSE bug 875803</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566324" comment="MozillaFirefox-24.5.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566325" comment="MozillaFirefox-branding-SLED-24-0.7.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566326" comment="MozillaFirefox-translations-24.5.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566327" comment="libfreebl3-3.16-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566328" comment="libfreebl3-32bit-3.16-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566329" comment="libsoftokn3-3.16-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566330" comment="libsoftokn3-32bit-3.16-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566331" comment="mozilla-nspr-4.10.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566332" comment="mozilla-nspr-32bit-4.10.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566333" comment="mozilla-nss-3.16-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566334" comment="mozilla-nss-32bit-3.16-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566335" comment="mozilla-nss-tools-3.16-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1530</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1530" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1530" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1530" ref_url="https://www.suse.com/security/cve/CVE-2014-1530" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0638-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0638-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0665-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0665-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0599-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0602-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0629-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0640-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The docshell implementation in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to trigger the loading of a URL with a spoofed baseURI property, and conduct cross-site scripting (XSS) attacks, via a crafted web site that performs history navigation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1530/">CVE-2014-1530</cve>
	<bugzilla href="https://bugzilla.suse.com/875378">SUSE bug 875378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/875803">SUSE bug 875803</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566324" comment="MozillaFirefox-24.5.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566325" comment="MozillaFirefox-branding-SLED-24-0.7.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566326" comment="MozillaFirefox-translations-24.5.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566327" comment="libfreebl3-3.16-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566328" comment="libfreebl3-32bit-3.16-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566329" comment="libsoftokn3-3.16-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566330" comment="libsoftokn3-32bit-3.16-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566331" comment="mozilla-nspr-4.10.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566332" comment="mozilla-nspr-32bit-4.10.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566333" comment="mozilla-nss-3.16-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566334" comment="mozilla-nss-32bit-3.16-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566335" comment="mozilla-nss-tools-3.16-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1531</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1531" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1531" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1531" ref_url="https://www.suse.com/security/cve/CVE-2014-1531" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0638-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0638-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0665-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0665-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0599-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0602-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0629-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0640-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsGenericHTMLElement::GetWidthHeightForImage function in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving an imgLoader object that is not properly handled during an image-resize operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1531/">CVE-2014-1531</cve>
	<bugzilla href="https://bugzilla.suse.com/875803">SUSE bug 875803</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566324" comment="MozillaFirefox-24.5.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566325" comment="MozillaFirefox-branding-SLED-24-0.7.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566326" comment="MozillaFirefox-translations-24.5.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566327" comment="libfreebl3-3.16-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566328" comment="libfreebl3-32bit-3.16-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566329" comment="libsoftokn3-3.16-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566330" comment="libsoftokn3-32bit-3.16-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566331" comment="mozilla-nspr-4.10.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566332" comment="mozilla-nspr-32bit-4.10.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566333" comment="mozilla-nss-3.16-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566334" comment="mozilla-nss-32bit-3.16-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566335" comment="mozilla-nss-tools-3.16-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1532</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1532" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1532" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1532" ref_url="https://www.suse.com/security/cve/CVE-2014-1532" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0638-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0638-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0665-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0665-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0599-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0602-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0629-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0640-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsHostResolver::ConditionallyRefreshRecord function in libxul.so in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors related to host resolution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1532/">CVE-2014-1532</cve>
	<bugzilla href="https://bugzilla.suse.com/875803">SUSE bug 875803</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566324" comment="MozillaFirefox-24.5.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566325" comment="MozillaFirefox-branding-SLED-24-0.7.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566326" comment="MozillaFirefox-translations-24.5.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566327" comment="libfreebl3-3.16-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566328" comment="libfreebl3-32bit-3.16-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566329" comment="libsoftokn3-3.16-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566330" comment="libsoftokn3-32bit-3.16-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566331" comment="mozilla-nspr-4.10.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566332" comment="mozilla-nspr-32bit-4.10.4-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566333" comment="mozilla-nss-3.16-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566334" comment="mozilla-nss-32bit-3.16-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566335" comment="mozilla-nss-tools-3.16-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1533</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1533" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1533" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1533" ref_url="https://www.suse.com/security/cve/CVE-2014-1533" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0824-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0824-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0824-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0797-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0819-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0855-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0858-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 30.0, Firefox ESR 24.x before 24.6, and Thunderbird before 24.6 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1533/">CVE-2014-1533</cve>
	<bugzilla href="https://bugzilla.suse.com/881874">SUSE bug 881874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566301" comment="MozillaFirefox-24.6.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566302" comment="MozillaFirefox-branding-SLED-24-0.7.48 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566303" comment="MozillaFirefox-translations-24.6.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566304" comment="libfreebl3-3.16.1-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566305" comment="libfreebl3-32bit-3.16.1-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566306" comment="libsoftokn3-3.16.1-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566307" comment="libsoftokn3-32bit-3.16.1-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566308" comment="mozilla-nspr-4.10.6-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566309" comment="mozilla-nspr-32bit-4.10.6-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566310" comment="mozilla-nss-3.16.1-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566311" comment="mozilla-nss-32bit-3.16.1-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566312" comment="mozilla-nss-tools-3.16.1-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1534</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1534" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1534" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1534" ref_url="https://www.suse.com/security/cve/CVE-2014-1534" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0824-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0824-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0824-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0797-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0819-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0855-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0858-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 30.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1534/">CVE-2014-1534</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566301" comment="MozillaFirefox-24.6.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566302" comment="MozillaFirefox-branding-SLED-24-0.7.48 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566303" comment="MozillaFirefox-translations-24.6.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566304" comment="libfreebl3-3.16.1-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566305" comment="libfreebl3-32bit-3.16.1-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566306" comment="libsoftokn3-3.16.1-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566307" comment="libsoftokn3-32bit-3.16.1-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566308" comment="mozilla-nspr-4.10.6-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566309" comment="mozilla-nspr-32bit-4.10.6-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566310" comment="mozilla-nss-3.16.1-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566311" comment="mozilla-nss-32bit-3.16.1-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566312" comment="mozilla-nss-tools-3.16.1-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1536</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1536" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1536" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1536" ref_url="https://www.suse.com/security/cve/CVE-2014-1536" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0824-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0824-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0824-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0797-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0819-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0855-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0858-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The PropertyProvider::FindJustificationRange function in Mozilla Firefox before 30.0 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1536/">CVE-2014-1536</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566301" comment="MozillaFirefox-24.6.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566302" comment="MozillaFirefox-branding-SLED-24-0.7.48 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566303" comment="MozillaFirefox-translations-24.6.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566304" comment="libfreebl3-3.16.1-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566305" comment="libfreebl3-32bit-3.16.1-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566306" comment="libsoftokn3-3.16.1-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566307" comment="libsoftokn3-32bit-3.16.1-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566308" comment="mozilla-nspr-4.10.6-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566309" comment="mozilla-nspr-32bit-4.10.6-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566310" comment="mozilla-nss-3.16.1-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566311" comment="mozilla-nss-32bit-3.16.1-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566312" comment="mozilla-nss-tools-3.16.1-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1537</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1537" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1537" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1537" ref_url="https://www.suse.com/security/cve/CVE-2014-1537" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0824-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0824-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0824-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0797-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0819-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0855-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0858-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the mozilla::dom::workers::WorkerPrivateParent function in Mozilla Firefox before 30.0 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1537/">CVE-2014-1537</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566301" comment="MozillaFirefox-24.6.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566302" comment="MozillaFirefox-branding-SLED-24-0.7.48 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566303" comment="MozillaFirefox-translations-24.6.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566304" comment="libfreebl3-3.16.1-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566305" comment="libfreebl3-32bit-3.16.1-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566306" comment="libsoftokn3-3.16.1-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566307" comment="libsoftokn3-32bit-3.16.1-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566308" comment="mozilla-nspr-4.10.6-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566309" comment="mozilla-nspr-32bit-4.10.6-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566310" comment="mozilla-nss-3.16.1-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566311" comment="mozilla-nss-32bit-3.16.1-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566312" comment="mozilla-nss-tools-3.16.1-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1538</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1538" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1538" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1538" ref_url="https://www.suse.com/security/cve/CVE-2014-1538" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0824-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0824-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0824-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0797-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0819-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0855-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0858-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsTextEditRules::CreateMozBR function in Mozilla Firefox before 30.0, Firefox ESR 24.x before 24.6, and Thunderbird before 24.6 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1538/">CVE-2014-1538</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566301" comment="MozillaFirefox-24.6.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566302" comment="MozillaFirefox-branding-SLED-24-0.7.48 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566303" comment="MozillaFirefox-translations-24.6.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566304" comment="libfreebl3-3.16.1-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566305" comment="libfreebl3-32bit-3.16.1-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566306" comment="libsoftokn3-3.16.1-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566307" comment="libsoftokn3-32bit-3.16.1-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566308" comment="mozilla-nspr-4.10.6-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566309" comment="mozilla-nspr-32bit-4.10.6-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566310" comment="mozilla-nss-3.16.1-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566311" comment="mozilla-nss-32bit-3.16.1-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566312" comment="mozilla-nss-tools-3.16.1-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1541</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1541" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1541" ref_url="https://www.suse.com/security/cve/CVE-2014-1541" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0824-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0824-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0824-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0797-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0819-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0855-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0858-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the RefreshDriverTimer::TickDriver function in the SMIL Animation Controller in Mozilla Firefox before 30.0, Firefox ESR 24.x before 24.6, and Thunderbird before 24.6 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via crafted web content.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1541/">CVE-2014-1541</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566301" comment="MozillaFirefox-24.6.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566302" comment="MozillaFirefox-branding-SLED-24-0.7.48 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566303" comment="MozillaFirefox-translations-24.6.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566304" comment="libfreebl3-3.16.1-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566305" comment="libfreebl3-32bit-3.16.1-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566306" comment="libsoftokn3-3.16.1-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566307" comment="libsoftokn3-32bit-3.16.1-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566308" comment="mozilla-nspr-4.10.6-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566309" comment="mozilla-nspr-32bit-4.10.6-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566310" comment="mozilla-nss-3.16.1-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566311" comment="mozilla-nss-32bit-3.16.1-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566312" comment="mozilla-nss-tools-3.16.1-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1544</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1544" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1544" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1544" ref_url="https://www.suse.com/security/cve/CVE-2014-1544" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0960-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0939-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0950-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0976-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the CERT_DestroyCertificate function in libnss3.so in Mozilla Network Security Services (NSS) 3.x, as used in Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7, allows remote attackers to execute arbitrary code via vectors that trigger certain improper removal of an NSSCertificate structure from a trust domain.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1544/">CVE-2014-1544</cve>
	<bugzilla href="https://bugzilla.suse.com/887746">SUSE bug 887746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566449" comment="MozillaFirefox-24.7.0esr-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566450" comment="MozillaFirefox-translations-24.7.0esr-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566451" comment="libfreebl3-3.16.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566452" comment="libfreebl3-32bit-3.16.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566453" comment="libsoftokn3-3.16.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566454" comment="libsoftokn3-32bit-3.16.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566455" comment="mozilla-nss-3.16.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566456" comment="mozilla-nss-32bit-3.16.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566457" comment="mozilla-nss-tools-3.16.2-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1545</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1545" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1545" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1545" ref_url="https://www.suse.com/security/cve/CVE-2014-1545" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0824-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0824-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0824-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0797-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0819-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0855-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0858-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Netscape Portable Runtime (NSPR) before 4.10.6 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write) via vectors involving the sprintf and console functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1545/">CVE-2014-1545</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566301" comment="MozillaFirefox-24.6.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566302" comment="MozillaFirefox-branding-SLED-24-0.7.48 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566303" comment="MozillaFirefox-translations-24.6.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566304" comment="libfreebl3-3.16.1-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566305" comment="libfreebl3-32bit-3.16.1-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566306" comment="libsoftokn3-3.16.1-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566307" comment="libsoftokn3-32bit-3.16.1-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566308" comment="mozilla-nspr-4.10.6-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566309" comment="mozilla-nspr-32bit-4.10.6-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566310" comment="mozilla-nss-3.16.1-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566311" comment="mozilla-nss-32bit-3.16.1-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566312" comment="mozilla-nss-tools-3.16.1-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1547</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1547" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1547" ref_url="https://www.suse.com/security/cve/CVE-2014-1547" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0960-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0939-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0950-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0976-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1547/">CVE-2014-1547</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566449" comment="MozillaFirefox-24.7.0esr-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566450" comment="MozillaFirefox-translations-24.7.0esr-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566451" comment="libfreebl3-3.16.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566452" comment="libfreebl3-32bit-3.16.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566453" comment="libsoftokn3-3.16.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566454" comment="libsoftokn3-32bit-3.16.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566455" comment="mozilla-nss-3.16.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566456" comment="mozilla-nss-32bit-3.16.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566457" comment="mozilla-nss-tools-3.16.2-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1548</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1548" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1548" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1548" ref_url="https://www.suse.com/security/cve/CVE-2014-1548" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0960-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0939-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0950-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0976-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 31.0 and Thunderbird before 31.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1548/">CVE-2014-1548</cve>
	<bugzilla href="https://bugzilla.suse.com/887746">SUSE bug 887746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566449" comment="MozillaFirefox-24.7.0esr-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566450" comment="MozillaFirefox-translations-24.7.0esr-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566451" comment="libfreebl3-3.16.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566452" comment="libfreebl3-32bit-3.16.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566453" comment="libsoftokn3-3.16.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566454" comment="libsoftokn3-32bit-3.16.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566455" comment="mozilla-nss-3.16.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566456" comment="mozilla-nss-32bit-3.16.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566457" comment="mozilla-nss-tools-3.16.2-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1555</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1555" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1555" ref_url="https://www.suse.com/security/cve/CVE-2014-1555" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0960-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0939-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0950-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0976-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsDocLoader::OnProgress function in Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7 allows remote attackers to execute arbitrary code via vectors that trigger a FireOnStateChange event.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1555/">CVE-2014-1555</cve>
	<bugzilla href="https://bugzilla.suse.com/887746">SUSE bug 887746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566449" comment="MozillaFirefox-24.7.0esr-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566450" comment="MozillaFirefox-translations-24.7.0esr-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566451" comment="libfreebl3-3.16.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566452" comment="libfreebl3-32bit-3.16.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566453" comment="libsoftokn3-3.16.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566454" comment="libsoftokn3-32bit-3.16.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566455" comment="mozilla-nss-3.16.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566456" comment="mozilla-nss-32bit-3.16.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566457" comment="mozilla-nss-tools-3.16.2-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1556</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1556" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1556" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1556" ref_url="https://www.suse.com/security/cve/CVE-2014-1556" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0960-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0939-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0950-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0976-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7 allow remote attackers to execute arbitrary code via crafted WebGL content constructed with the Cesium JavaScript library.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1556/">CVE-2014-1556</cve>
	<bugzilla href="https://bugzilla.suse.com/887746">SUSE bug 887746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566449" comment="MozillaFirefox-24.7.0esr-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566450" comment="MozillaFirefox-translations-24.7.0esr-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566451" comment="libfreebl3-3.16.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566452" comment="libfreebl3-32bit-3.16.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566453" comment="libsoftokn3-3.16.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566454" comment="libsoftokn3-32bit-3.16.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566455" comment="mozilla-nss-3.16.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566456" comment="mozilla-nss-32bit-3.16.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566457" comment="mozilla-nss-tools-3.16.2-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1557</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1557" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1557" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1557" ref_url="https://www.suse.com/security/cve/CVE-2014-1557" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0960-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0939-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0950-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0976-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The ConvolveHorizontally function in Skia, as used in Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7, does not properly handle the discarding of image data during function execution, which allows remote attackers to execute arbitrary code by triggering prolonged image scaling, as demonstrated by scaling of a high-quality image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1557/">CVE-2014-1557</cve>
	<bugzilla href="https://bugzilla.suse.com/887746">SUSE bug 887746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566449" comment="MozillaFirefox-24.7.0esr-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566450" comment="MozillaFirefox-translations-24.7.0esr-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566451" comment="libfreebl3-3.16.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566452" comment="libfreebl3-32bit-3.16.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566453" comment="libsoftokn3-3.16.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566454" comment="libsoftokn3-32bit-3.16.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566455" comment="mozilla-nss-3.16.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566456" comment="mozilla-nss-32bit-3.16.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566457" comment="mozilla-nss-tools-3.16.2-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1562</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1562" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1562" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1562" ref_url="https://www.suse.com/security/cve/CVE-2014-1562" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1120-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1120-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1098-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox before 32.0, Firefox ESR 24.x before 24.8 and 31.x before 31.1, and Thunderbird 24.x before 24.8 and 31.x before 31.1 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1562/">CVE-2014-1562</cve>
	<bugzilla href="https://bugzilla.suse.com/894370">SUSE bug 894370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566458" comment="MozillaFirefox-24.8.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566459" comment="MozillaFirefox-translations-24.8.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566460" comment="libfreebl3-3.16.4-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566461" comment="libfreebl3-32bit-3.16.4-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566462" comment="libsoftokn3-3.16.4-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566463" comment="libsoftokn3-32bit-3.16.4-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566464" comment="mozilla-nspr-4.10.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566465" comment="mozilla-nspr-32bit-4.10.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566466" comment="mozilla-nss-3.16.4-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566467" comment="mozilla-nss-32bit-3.16.4-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566468" comment="mozilla-nss-tools-3.16.4-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1567</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1567" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1567" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1567" ref_url="https://www.suse.com/security/cve/CVE-2014-1567" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1120-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1120-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1098-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in DirectionalityUtils.cpp in Mozilla Firefox before 32.0, Firefox ESR 24.x before 24.8 and 31.x before 31.1, and Thunderbird 24.x before 24.8 and 31.x before 31.1 allows remote attackers to execute arbitrary code via text that is improperly handled during the interaction between directionality resolution and layout.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1567/">CVE-2014-1567</cve>
	<bugzilla href="https://bugzilla.suse.com/894370">SUSE bug 894370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566458" comment="MozillaFirefox-24.8.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566459" comment="MozillaFirefox-translations-24.8.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566460" comment="libfreebl3-3.16.4-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566461" comment="libfreebl3-32bit-3.16.4-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566462" comment="libsoftokn3-3.16.4-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566463" comment="libsoftokn3-32bit-3.16.4-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566464" comment="mozilla-nspr-4.10.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566465" comment="mozilla-nspr-32bit-4.10.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566466" comment="mozilla-nss-3.16.4-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566467" comment="mozilla-nss-32bit-3.16.4-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566468" comment="mozilla-nss-tools-3.16.4-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1568</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1568" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1568" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1568" ref_url="https://www.suse.com/security/cve/CVE-2014-1568" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1220-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1220-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1220-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1220-4" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001078.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="TID7015701" ref_url="https://www.suse.com/support/kb/doc/?id=7015701" source="SUSE-SU"/>
		<reference ref_id="TID7015705" ref_url="https://www.suse.com/support/kb/doc/?id=7015705" source="SUSE-SU"/>
		<reference ref_id="TID7015713" ref_url="https://www.suse.com/support/kb/doc/?id=7015713" source="SUSE-SU"/>
		<reference ref_id="TID7015715" ref_url="https://www.suse.com/support/kb/doc/?id=7015715" source="SUSE-SU"/>
		<reference ref_id="TID7015717" ref_url="https://www.suse.com/support/kb/doc/?id=7015717" source="SUSE-SU"/>
		<reference ref_id="TID7015720" ref_url="https://www.suse.com/support/kb/doc/?id=7015720" source="SUSE-SU"/>
		<reference ref_id="TID7016147" ref_url="https://www.suse.com/support/kb/doc/?id=7016147" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1224-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1232-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00039.html" source="SUSE-SU"/>
    <description>
    Mozilla Network Security Services (NSS) before 3.16.2.1, 3.16.x before 3.16.5, and 3.17.x before 3.17.1, as used in Mozilla Firefox before 32.0.3, Mozilla Firefox ESR 24.x before 24.8.1 and 31.x before 31.1.1, Mozilla Thunderbird before 24.8.1 and 31.x before 31.1.2, Mozilla SeaMonkey before 2.29.1, Google Chrome before 37.0.2062.124 on Windows and OS X, and Google Chrome OS before 37.0.2062.120, does not properly parse ASN.1 values in X.509 certificates, which makes it easier for remote attackers to spoof RSA signatures via a crafted certificate, aka a "signature malleability" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1568/">CVE-2014-1568</cve>
	<bugzilla href="https://bugzilla.suse.com/1107874">SUSE bug 1107874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897890">SUSE bug 897890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898959">SUSE bug 898959</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566813" comment="libfreebl3-3.16.5-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566814" comment="libfreebl3-32bit-3.16.5-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566815" comment="libsoftokn3-3.16.5-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566816" comment="libsoftokn3-32bit-3.16.5-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566817" comment="mozilla-nss-3.16.5-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566818" comment="mozilla-nss-32bit-3.16.5-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566819" comment="mozilla-nss-tools-3.16.5-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1569</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1569" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1569" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1569" ref_url="https://www.suse.com/security/cve/CVE-2014-1569" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0076-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0171-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0173-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html" source="SUSE-SU"/>
    <description>
    The definite_length_decoder function in lib/util/quickder.c in Mozilla Network Security Services (NSS) before 3.16.2.4 and 3.17.x before 3.17.3 does not ensure that the DER encoding of an ASN.1 length is properly formed, which allows remote attackers to conduct data-smuggling attacks by using a long byte sequence for an encoding, as demonstrated by the SEC_QuickDERDecodeItem function's improper handling of an arbitrary-length encoding of 0x00.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1569/">CVE-2014-1569</cve>
	<bugzilla href="https://bugzilla.suse.com/910647">SUSE bug 910647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913096">SUSE bug 913096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917597">SUSE bug 917597</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566471" comment="MozillaFirefox-31.4.0esr-0.8.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566472" comment="MozillaFirefox-translations-31.4.0esr-0.8.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566473" comment="libfreebl3-3.17.3-0.8.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566474" comment="libfreebl3-32bit-3.17.3-0.8.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566475" comment="libsoftokn3-3.17.3-0.8.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566476" comment="libsoftokn3-32bit-3.17.3-0.8.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566477" comment="mozilla-nss-3.17.3-0.8.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566478" comment="mozilla-nss-32bit-3.17.3-0.8.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566479" comment="mozilla-nss-tools-3.17.3-0.8.11 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1574</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1574" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1574" ref_url="https://www.suse.com/security/cve/CVE-2014-1574" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1385-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1343-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1344-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1345-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1346-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1655-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1574/">CVE-2014-1574</cve>
	<bugzilla href="https://bugzilla.suse.com/900941">SUSE bug 900941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566510" comment="MozillaFirefox-31.2.0esr-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566511" comment="MozillaFirefox-branding-SLED-31.0-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566512" comment="MozillaFirefox-translations-31.2.0esr-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566513" comment="libfreebl3-3.17.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566514" comment="libfreebl3-32bit-3.17.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566515" comment="libsoftokn3-3.17.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566516" comment="libsoftokn3-32bit-3.17.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566517" comment="mozilla-nspr-4.10.7-0.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566518" comment="mozilla-nspr-32bit-4.10.7-0.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566519" comment="mozilla-nss-3.17.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566520" comment="mozilla-nss-32bit-3.17.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566521" comment="mozilla-nss-tools-3.17.2-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1575</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1575" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1575" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1575" ref_url="https://www.suse.com/security/cve/CVE-2014-1575" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1385-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1344-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1345-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1655-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00068.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 33.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to improper interaction between threading and garbage collection in the GCRuntime::triggerGC function in js/src/jsgc.cpp, and unknown other vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1575/">CVE-2014-1575</cve>
	<bugzilla href="https://bugzilla.suse.com/900941">SUSE bug 900941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566510" comment="MozillaFirefox-31.2.0esr-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566511" comment="MozillaFirefox-branding-SLED-31.0-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566512" comment="MozillaFirefox-translations-31.2.0esr-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566513" comment="libfreebl3-3.17.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566514" comment="libfreebl3-32bit-3.17.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566515" comment="libsoftokn3-3.17.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566516" comment="libsoftokn3-32bit-3.17.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566517" comment="mozilla-nspr-4.10.7-0.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566518" comment="mozilla-nspr-32bit-4.10.7-0.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566519" comment="mozilla-nss-3.17.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566520" comment="mozilla-nss-32bit-3.17.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566521" comment="mozilla-nss-tools-3.17.2-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1576</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1576" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1576" ref_url="https://www.suse.com/security/cve/CVE-2014-1576" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1385-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1343-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1344-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1345-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1346-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1655-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the nsTransformedTextRun function in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allows remote attackers to execute arbitrary code via Cascading Style Sheets (CSS) token sequences that trigger changes to capitalization style.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1576/">CVE-2014-1576</cve>
	<bugzilla href="https://bugzilla.suse.com/900941">SUSE bug 900941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566510" comment="MozillaFirefox-31.2.0esr-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566511" comment="MozillaFirefox-branding-SLED-31.0-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566512" comment="MozillaFirefox-translations-31.2.0esr-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566513" comment="libfreebl3-3.17.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566514" comment="libfreebl3-32bit-3.17.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566515" comment="libsoftokn3-3.17.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566516" comment="libsoftokn3-32bit-3.17.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566517" comment="mozilla-nspr-4.10.7-0.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566518" comment="mozilla-nspr-32bit-4.10.7-0.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566519" comment="mozilla-nss-3.17.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566520" comment="mozilla-nss-32bit-3.17.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566521" comment="mozilla-nss-tools-3.17.2-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1577</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1577" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1577" ref_url="https://www.suse.com/security/cve/CVE-2014-1577" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1385-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1343-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1344-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1345-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1346-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1655-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    The mozilla::dom::OscillatorNodeEngine::ComputeCustom function in the Web Audio subsystem in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read, memory corruption, and application crash) via an invalid custom waveform that triggers a calculation of a negative frequency value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1577/">CVE-2014-1577</cve>
	<bugzilla href="https://bugzilla.suse.com/900941">SUSE bug 900941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566510" comment="MozillaFirefox-31.2.0esr-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566511" comment="MozillaFirefox-branding-SLED-31.0-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566512" comment="MozillaFirefox-translations-31.2.0esr-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566513" comment="libfreebl3-3.17.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566514" comment="libfreebl3-32bit-3.17.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566515" comment="libsoftokn3-3.17.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566516" comment="libsoftokn3-32bit-3.17.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566517" comment="mozilla-nspr-4.10.7-0.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566518" comment="mozilla-nspr-32bit-4.10.7-0.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566519" comment="mozilla-nss-3.17.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566520" comment="mozilla-nss-32bit-3.17.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566521" comment="mozilla-nss-tools-3.17.2-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1578</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1578" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1578" ref_url="https://www.suse.com/security/cve/CVE-2014-1578" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1385-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1343-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1344-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1345-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1346-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1655-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    The get_tile function in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly execute arbitrary code via WebM frames with invalid tile sizes that are improperly handled in buffering operations during video playback.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1578/">CVE-2014-1578</cve>
	<bugzilla href="https://bugzilla.suse.com/900941">SUSE bug 900941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566510" comment="MozillaFirefox-31.2.0esr-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566511" comment="MozillaFirefox-branding-SLED-31.0-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566512" comment="MozillaFirefox-translations-31.2.0esr-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566513" comment="libfreebl3-3.17.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566514" comment="libfreebl3-32bit-3.17.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566515" comment="libsoftokn3-3.17.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566516" comment="libsoftokn3-32bit-3.17.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566517" comment="mozilla-nspr-4.10.7-0.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566518" comment="mozilla-nspr-32bit-4.10.7-0.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566519" comment="mozilla-nss-3.17.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566520" comment="mozilla-nss-32bit-3.17.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566521" comment="mozilla-nss-tools-3.17.2-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1581</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1581" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1581" ref_url="https://www.suse.com/security/cve/CVE-2014-1581" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1385-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1343-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1344-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1345-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1346-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1655-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in DirectionalityUtils.cpp in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allows remote attackers to execute arbitrary code via text that is improperly handled during the interaction between directionality resolution and layout.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1581/">CVE-2014-1581</cve>
	<bugzilla href="https://bugzilla.suse.com/900941">SUSE bug 900941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566510" comment="MozillaFirefox-31.2.0esr-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566511" comment="MozillaFirefox-branding-SLED-31.0-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566512" comment="MozillaFirefox-translations-31.2.0esr-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566513" comment="libfreebl3-3.17.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566514" comment="libfreebl3-32bit-3.17.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566515" comment="libsoftokn3-3.17.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566516" comment="libsoftokn3-32bit-3.17.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566517" comment="mozilla-nspr-4.10.7-0.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566518" comment="mozilla-nspr-32bit-4.10.7-0.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566519" comment="mozilla-nss-3.17.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566520" comment="mozilla-nss-32bit-3.17.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566521" comment="mozilla-nss-tools-3.17.2-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1583</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1583" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1583" ref_url="https://www.suse.com/security/cve/CVE-2014-1583" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1385-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1344-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1345-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1655-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00068.html" source="SUSE-SU"/>
    <description>
    The Alarm API in Mozilla Firefox before 33.0 and Firefox ESR 31.x before 31.2 does not properly restrict toJSON calls, which allows remote attackers to bypass the Same Origin Policy via crafted API calls that access sensitive information within the JSON data of an alarm.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1583/">CVE-2014-1583</cve>
	<bugzilla href="https://bugzilla.suse.com/900941">SUSE bug 900941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566510" comment="MozillaFirefox-31.2.0esr-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566511" comment="MozillaFirefox-branding-SLED-31.0-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566512" comment="MozillaFirefox-translations-31.2.0esr-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566513" comment="libfreebl3-3.17.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566514" comment="libfreebl3-32bit-3.17.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566515" comment="libsoftokn3-3.17.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566516" comment="libsoftokn3-32bit-3.17.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566517" comment="mozilla-nspr-4.10.7-0.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566518" comment="mozilla-nspr-32bit-4.10.7-0.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566519" comment="mozilla-nss-3.17.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566520" comment="mozilla-nss-32bit-3.17.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566521" comment="mozilla-nss-tools-3.17.2-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1585</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1585" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1585" ref_url="https://www.suse.com/security/cve/CVE-2014-1585" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1385-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1343-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1344-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1345-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1346-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1655-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    The WebRTC video-sharing feature in dom/media/MediaManager.cpp in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 does not properly recognize Stop Sharing actions for videos in IFRAME elements, which allows remote attackers to obtain sensitive information from the local camera by maintaining a session after the user tries to discontinue streaming.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1585/">CVE-2014-1585</cve>
	<bugzilla href="https://bugzilla.suse.com/900941">SUSE bug 900941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566510" comment="MozillaFirefox-31.2.0esr-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566511" comment="MozillaFirefox-branding-SLED-31.0-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566512" comment="MozillaFirefox-translations-31.2.0esr-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566513" comment="libfreebl3-3.17.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566514" comment="libfreebl3-32bit-3.17.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566515" comment="libsoftokn3-3.17.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566516" comment="libsoftokn3-32bit-3.17.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566517" comment="mozilla-nspr-4.10.7-0.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566518" comment="mozilla-nspr-32bit-4.10.7-0.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566519" comment="mozilla-nss-3.17.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566520" comment="mozilla-nss-32bit-3.17.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566521" comment="mozilla-nss-tools-3.17.2-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1586</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1586" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1586" ref_url="https://www.suse.com/security/cve/CVE-2014-1586" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1385-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1343-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1344-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1345-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1346-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1655-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    content/base/src/nsDocument.cpp in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 does not consider whether WebRTC video sharing is occurring, which allows remote attackers to obtain sensitive information from the local camera in certain IFRAME situations by maintaining a session after the user temporarily navigates away.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1586/">CVE-2014-1586</cve>
	<bugzilla href="https://bugzilla.suse.com/900941">SUSE bug 900941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566510" comment="MozillaFirefox-31.2.0esr-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566511" comment="MozillaFirefox-branding-SLED-31.0-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566512" comment="MozillaFirefox-translations-31.2.0esr-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566513" comment="libfreebl3-3.17.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566514" comment="libfreebl3-32bit-3.17.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566515" comment="libsoftokn3-3.17.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566516" comment="libsoftokn3-32bit-3.17.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566517" comment="mozilla-nspr-4.10.7-0.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566518" comment="mozilla-nspr-32bit-4.10.7-0.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566519" comment="mozilla-nss-3.17.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566520" comment="mozilla-nss-32bit-3.17.2-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566521" comment="mozilla-nss-tools-3.17.2-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1587</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1587" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1587" ref_url="https://www.suse.com/security/cve/CVE-2014-1587" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1624-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1581-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1654-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1655-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1656-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1587/">CVE-2014-1587</cve>
	<bugzilla href="https://bugzilla.suse.com/908009">SUSE bug 908009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566469" comment="MozillaFirefox-31.3.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566470" comment="MozillaFirefox-translations-31.3.0esr-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1588</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1588" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1588" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1588" ref_url="https://www.suse.com/security/cve/CVE-2014-1588" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1624-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1581-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1655-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1656-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00069.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 34.0 and SeaMonkey before 2.31 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1588/">CVE-2014-1588</cve>
	<bugzilla href="https://bugzilla.suse.com/908009">SUSE bug 908009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566469" comment="MozillaFirefox-31.3.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566470" comment="MozillaFirefox-translations-31.3.0esr-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141589" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1589</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1589" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1589" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1589" ref_url="https://www.suse.com/security/cve/CVE-2014-1589" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1624-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1581-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1655-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1656-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00069.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 34.0 and SeaMonkey before 2.31 provide stylesheets with an incorrect primary namespace, which allows remote attackers to bypass intended access restrictions via an XBL binding.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1589/">CVE-2014-1589</cve>
	<bugzilla href="https://bugzilla.suse.com/908009">SUSE bug 908009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566469" comment="MozillaFirefox-31.3.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566470" comment="MozillaFirefox-translations-31.3.0esr-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1590</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1590" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1590" ref_url="https://www.suse.com/security/cve/CVE-2014-1590" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1624-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1581-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1654-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1655-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1656-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    The XMLHttpRequest.prototype.send method in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allows remote attackers to cause a denial of service (application crash) via a crafted JavaScript object.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1590/">CVE-2014-1590</cve>
	<bugzilla href="https://bugzilla.suse.com/908009">SUSE bug 908009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566469" comment="MozillaFirefox-31.3.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566470" comment="MozillaFirefox-translations-31.3.0esr-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1591</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1591" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1591" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1591" ref_url="https://www.suse.com/security/cve/CVE-2014-1591" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1624-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1581-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1655-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1656-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00069.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox 33.0 and SeaMonkey before 2.31 include path strings in CSP violation reports, which allows remote attackers to obtain sensitive information via a web site that receives a report after a redirect.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1591/">CVE-2014-1591</cve>
	<bugzilla href="https://bugzilla.suse.com/908009">SUSE bug 908009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566469" comment="MozillaFirefox-31.3.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566470" comment="MozillaFirefox-translations-31.3.0esr-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1592</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1592" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1592" ref_url="https://www.suse.com/security/cve/CVE-2014-1592" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1624-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1581-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1654-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1655-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1656-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsHtml5TreeOperation function in xul.dll in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allows remote attackers to execute arbitrary code by adding a second root element to an HTML5 document during parsing.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1592/">CVE-2014-1592</cve>
	<bugzilla href="https://bugzilla.suse.com/908009">SUSE bug 908009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566469" comment="MozillaFirefox-31.3.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566470" comment="MozillaFirefox-translations-31.3.0esr-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1593</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1593" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1593" ref_url="https://www.suse.com/security/cve/CVE-2014-1593" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1624-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1581-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1654-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1655-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1656-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the mozilla::FileBlockCache::Read function in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allows remote attackers to execute arbitrary code via crafted media content.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1593/">CVE-2014-1593</cve>
	<bugzilla href="https://bugzilla.suse.com/908009">SUSE bug 908009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566469" comment="MozillaFirefox-31.3.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566470" comment="MozillaFirefox-translations-31.3.0esr-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1594</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1594" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1594" ref_url="https://www.suse.com/security/cve/CVE-2014-1594" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1624-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1581-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1654-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1655-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1656-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 might allow remote attackers to execute arbitrary code by leveraging an incorrect cast from the BasicThebesLayer data type to the BasicContainerLayer data type.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1594/">CVE-2014-1594</cve>
	<bugzilla href="https://bugzilla.suse.com/908009">SUSE bug 908009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566469" comment="MozillaFirefox-31.3.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566470" comment="MozillaFirefox-translations-31.3.0esr-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1595</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1595" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1595" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1595" ref_url="https://www.suse.com/security/cve/CVE-2014-1595" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1624-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00014.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, and Thunderbird before 31.3 on Apple OS X 10.10 omit a CoreGraphics disable-logging action that is needed by jemalloc-based applications, which allows local users to obtain sensitive information by reading /tmp files, as demonstrated by credential information.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1595/">CVE-2014-1595</cve>
	<bugzilla href="https://bugzilla.suse.com/908009">SUSE bug 908009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566469" comment="MozillaFirefox-31.3.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566470" comment="MozillaFirefox-translations-31.3.0esr-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1642</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1642" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1642" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1642" ref_url="https://www.suse.com/security/cve/CVE-2014-1642" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0483-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00010.html" source="SUSE-SU"/>
    <description>
    The IRQ setup in Xen 4.2.x and 4.3.x, when using device passthrough and configured to support a large number of CPUs, frees certain memory that may still be intended for use, which allows local guest administrators to cause a denial of service (memory corruption and hypervisor crash) and possibly execute arbitrary code via vectors related to an out-of-memory error that triggers a (1) use-after-free or (2) double free.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1642/">CVE-2014-1642</cve>
	<bugzilla href="https://bugzilla.suse.com/858496">SUSE bug 858496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860092">SUSE bug 860092</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567225" comment="xen-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567226" comment="xen-doc-html-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567227" comment="xen-doc-pdf-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567228" comment="xen-kmp-default-4.2.4_02_3.0.101_0.15-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567229" comment="xen-kmp-pae-4.2.4_02_3.0.101_0.15-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567230" comment="xen-libs-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567231" comment="xen-libs-32bit-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567232" comment="xen-tools-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567233" comment="xen-tools-domU-4.2.4_02-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141666" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1666</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1666" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1666" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1666" ref_url="https://www.suse.com/security/cve/CVE-2014-1666" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0372-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0483-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00010.html" source="SUSE-SU"/>
    <description>
    The do_physdev_op function in Xen 4.1.5, 4.1.6.1, 4.2.2 through 4.2.3, and 4.3.x does not properly restrict access to the (1) PHYSDEVOP_prepare_msix and (2) PHYSDEVOP_release_msix operations, which allows local PV guests to cause a denial of service (host or guest malfunction) or possibly gain privileges via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-1666/">CVE-2014-1666</cve>
	<bugzilla href="https://bugzilla.suse.com/860302">SUSE bug 860302</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567225" comment="xen-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567226" comment="xen-doc-html-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567227" comment="xen-doc-pdf-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567228" comment="xen-kmp-default-4.2.4_02_3.0.101_0.15-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567229" comment="xen-kmp-pae-4.2.4_02_3.0.101_0.15-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567230" comment="xen-libs-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567231" comment="xen-libs-32bit-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567232" comment="xen-tools-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567233" comment="xen-tools-domU-4.2.4_02-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1737</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1737" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1737" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1737" ref_url="https://www.suse.com/security/cve/CVE-2014-1737" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0667-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0683-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000880.html" source="SUSE-SU"/>
		<reference ref_id="TID7015062" ref_url="https://www.suse.com/support/kb/doc?id=7015062" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0766-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00013.html" source="SUSE-SU"/>
    <description>
    The raw_cmd_copyin function in drivers/block/floppy.c in the Linux kernel through 3.14.3 does not properly handle error conditions during processing of an FDRAWCMD ioctl call, which allows local users to trigger kfree operations and gain privileges by leveraging write access to a /dev/fd device.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1737/">CVE-2014-1737</cve>
	<bugzilla href="https://bugzilla.suse.com/875798">SUSE bug 875798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877345">SUSE bug 877345</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592539" comment="kernel-default-3.0.101-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592540" comment="kernel-default-base-3.0.101-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592541" comment="kernel-default-devel-3.0.101-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592542" comment="kernel-default-extra-3.0.101-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592543" comment="kernel-source-3.0.101-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592544" comment="kernel-syms-3.0.101-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592545" comment="kernel-trace-devel-3.0.101-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592546" comment="kernel-xen-3.0.101-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592547" comment="kernel-xen-base-3.0.101-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592548" comment="kernel-xen-devel-3.0.101-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592549" comment="kernel-xen-extra-3.0.101-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592550" comment="xen-kmp-default-4.2.4_02_3.0.101_0.29-0.7.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1738</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1738" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1738" ref_url="https://www.suse.com/security/cve/CVE-2014-1738" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0667-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0683-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000880.html" source="SUSE-SU"/>
		<reference ref_id="TID7015062" ref_url="https://www.suse.com/support/kb/doc?id=7015062" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0766-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00013.html" source="SUSE-SU"/>
    <description>
    The raw_cmd_copyout function in drivers/block/floppy.c in the Linux kernel through 3.14.3 does not properly restrict access to certain pointers during processing of an FDRAWCMD ioctl call, which allows local users to obtain sensitive information from kernel heap memory by leveraging write access to a /dev/fd device.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1738/">CVE-2014-1738</cve>
	<bugzilla href="https://bugzilla.suse.com/875798">SUSE bug 875798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877345">SUSE bug 877345</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592539" comment="kernel-default-3.0.101-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592540" comment="kernel-default-base-3.0.101-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592541" comment="kernel-default-devel-3.0.101-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592542" comment="kernel-default-extra-3.0.101-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592543" comment="kernel-source-3.0.101-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592544" comment="kernel-syms-3.0.101-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592545" comment="kernel-trace-devel-3.0.101-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592546" comment="kernel-xen-3.0.101-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592547" comment="kernel-xen-base-3.0.101-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592548" comment="kernel-xen-devel-3.0.101-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592549" comment="kernel-xen-extra-3.0.101-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592550" comment="xen-kmp-default-4.2.4_02_3.0.101_0.29-0.7.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1739</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1739" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1739" ref_url="https://www.suse.com/security/cve/CVE-2014-1739" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1316-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1246-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
    <description>
    The media_device_enum_entities function in drivers/media/media-device.c in the Linux kernel before 3.14.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory by leveraging /dev/media0 read access for a MEDIA_IOC_ENUM_ENTITIES ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1739/">CVE-2014-1739</cve>
	<bugzilla href="https://bugzilla.suse.com/882804">SUSE bug 882804</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566710" comment="kernel-default-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566711" comment="kernel-default-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566712" comment="kernel-default-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566713" comment="kernel-default-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566718" comment="kernel-source-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566719" comment="kernel-syms-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566720" comment="kernel-trace-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566721" comment="kernel-xen-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566722" comment="kernel-xen-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566723" comment="kernel-xen-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566724" comment="kernel-xen-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566725" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141874" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1874</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1874" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1874" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1874" ref_url="https://www.suse.com/security/cve/CVE-2014-1874" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0766-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00013.html" source="SUSE-SU"/>
    <description>
    The security_context_to_sid_core function in security/selinux/ss/services.c in the Linux kernel before 3.13.4 allows local users to cause a denial of service (system crash) by leveraging the CAP_MAC_ADMIN capability to set a zero-length security context.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1874/">CVE-2014-1874</cve>
	<bugzilla href="https://bugzilla.suse.com/863335">SUSE bug 863335</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589697" comment="kernel-default-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589698" comment="kernel-default-base-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589699" comment="kernel-default-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589700" comment="kernel-default-extra-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589701" comment="kernel-source-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589702" comment="kernel-syms-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589703" comment="kernel-trace-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589704" comment="kernel-xen-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589705" comment="kernel-xen-base-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589706" comment="kernel-xen-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589707" comment="kernel-xen-extra-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589708" comment="xen-kmp-default-4.2.4_02_3.0.101_0.35-0.7.45 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1876</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1876" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1876" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1876" ref_url="https://www.suse.com/security/cve/CVE-2014-1876" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    The unpacker::redirect_stdio function in unpack.cpp in unpack200 in OpenJDK 6, 7, and 8; Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JRockit R27.8.1 and R28.3.1; and Java SE Embedded 7u51 does not securely create temporary files when a log file cannot be opened, which allows local users to overwrite arbitrary files via a symlink attack on /tmp/unpack.log.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1876/">CVE-2014-1876</cve>
	<bugzilla href="https://bugzilla.suse.com/863305">SUSE bug 863305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592272" comment="java-1_7_0-openjdk-1.7.0.6-0.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592273" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592274" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1891</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1891" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1891" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1891" ref_url="https://www.suse.com/security/cve/CVE-2014-1891" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0372-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0483-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00010.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the (1) FLASK_GETBOOL, (2) FLASK_SETBOOL, (3) FLASK_USER, and (4) FLASK_CONTEXT_TO_SID suboperations in the flask hypercall in Xen 4.3.x, 4.2.x, 4.1.x, 3.2.x, and earlier, when XSM is enabled, allow local users to cause a denial of service (processor fault) via unspecified vectors, a different vulnerability than CVE-2014-1892, CVE-2014-1893, and CVE-2014-1894.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1891/">CVE-2014-1891</cve>
	<bugzilla href="https://bugzilla.suse.com/860163">SUSE bug 860163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567225" comment="xen-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567226" comment="xen-doc-html-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567227" comment="xen-doc-pdf-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567228" comment="xen-kmp-default-4.2.4_02_3.0.101_0.15-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567229" comment="xen-kmp-pae-4.2.4_02_3.0.101_0.15-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567230" comment="xen-libs-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567231" comment="xen-libs-32bit-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567232" comment="xen-tools-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567233" comment="xen-tools-domU-4.2.4_02-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141892" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1892</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1892" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1892" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1892" ref_url="https://www.suse.com/security/cve/CVE-2014-1892" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0372-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0483-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00010.html" source="SUSE-SU"/>
    <description>
    Xen 3.3 through 4.1, when XSM is enabled, allows local users to cause a denial of service via vectors related to a "large memory allocation," a different vulnerability than CVE-2014-1891, CVE-2014-1893, and CVE-2014-1894.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1892/">CVE-2014-1892</cve>
	<bugzilla href="https://bugzilla.suse.com/860163">SUSE bug 860163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567225" comment="xen-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567226" comment="xen-doc-html-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567227" comment="xen-doc-pdf-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567228" comment="xen-kmp-default-4.2.4_02_3.0.101_0.15-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567229" comment="xen-kmp-pae-4.2.4_02_3.0.101_0.15-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567230" comment="xen-libs-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567231" comment="xen-libs-32bit-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567232" comment="xen-tools-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567233" comment="xen-tools-domU-4.2.4_02-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1893</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1893" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1893" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1893" ref_url="https://www.suse.com/security/cve/CVE-2014-1893" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0372-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0483-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00010.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the (1) FLASK_GETBOOL and (2) FLASK_SETBOOL suboperations in the flask hypercall in Xen 4.1.x, 3.3.x, 3.2.x, and earlier, when XSM is enabled, allow local users to cause a denial of service (processor fault) via unspecified vectors, a different vulnerability than CVE-2014-1891, CVE-2014-1892, and CVE-2014-1894.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1893/">CVE-2014-1893</cve>
	<bugzilla href="https://bugzilla.suse.com/860163">SUSE bug 860163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567225" comment="xen-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567226" comment="xen-doc-html-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567227" comment="xen-doc-pdf-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567228" comment="xen-kmp-default-4.2.4_02_3.0.101_0.15-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567229" comment="xen-kmp-pae-4.2.4_02_3.0.101_0.15-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567230" comment="xen-libs-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567231" comment="xen-libs-32bit-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567232" comment="xen-tools-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567233" comment="xen-tools-domU-4.2.4_02-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141894" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1894</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1894" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1894" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1894" ref_url="https://www.suse.com/security/cve/CVE-2014-1894" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0372-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0483-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00010.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in unspecified suboperations in the flask hypercall in Xen 3.2.x and earlier, when XSM is enabled, allow local users to cause a denial of service (processor fault) via unspecified vectors, a different vulnerability than CVE-2014-1891, CVE-2014-1892, and CVE-2014-1893.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1894/">CVE-2014-1894</cve>
	<bugzilla href="https://bugzilla.suse.com/860163">SUSE bug 860163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567225" comment="xen-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567226" comment="xen-doc-html-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567227" comment="xen-doc-pdf-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567228" comment="xen-kmp-default-4.2.4_02_3.0.101_0.15-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567229" comment="xen-kmp-pae-4.2.4_02_3.0.101_0.15-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567230" comment="xen-libs-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567231" comment="xen-libs-32bit-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567232" comment="xen-tools-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567233" comment="xen-tools-domU-4.2.4_02-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1895</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1895" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1895" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1895" ref_url="https://www.suse.com/security/cve/CVE-2014-1895" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0483-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00010.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in the flask_security_avc_cachestats function in xsm/flask/flask_op.c in Xen 4.2.x and 4.3.x, when the maximum number of physical CPUs are in use, allows local users to cause a denial of service (host crash) or obtain sensitive information from hypervisor memory by leveraging a FLASK_AVC_CACHESTAT hypercall, which triggers a buffer over-read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1895/">CVE-2014-1895</cve>
	<bugzilla href="https://bugzilla.suse.com/860165">SUSE bug 860165</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567225" comment="xen-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567226" comment="xen-doc-html-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567227" comment="xen-doc-pdf-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567228" comment="xen-kmp-default-4.2.4_02_3.0.101_0.15-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567229" comment="xen-kmp-pae-4.2.4_02_3.0.101_0.15-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567230" comment="xen-libs-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567231" comment="xen-libs-32bit-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567232" comment="xen-tools-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567233" comment="xen-tools-domU-4.2.4_02-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1896</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1896" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1896" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1896" ref_url="https://www.suse.com/security/cve/CVE-2014-1896" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0483-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00010.html" source="SUSE-SU"/>
    <description>
    The (1) do_send and (2) do_recv functions in io.c in libvchan in Xen 4.2.x, 4.3.x, and 4.4-RC series allows local guests to cause a denial of service or possibly gain privileges via crafted xenstore ring indexes, which triggers a "read or write past the end of the ring."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1896/">CVE-2014-1896</cve>
	<bugzilla href="https://bugzilla.suse.com/860300">SUSE bug 860300</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567225" comment="xen-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567226" comment="xen-doc-html-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567227" comment="xen-doc-pdf-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567228" comment="xen-kmp-default-4.2.4_02_3.0.101_0.15-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567229" comment="xen-kmp-pae-4.2.4_02_3.0.101_0.15-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567230" comment="xen-libs-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567231" comment="xen-libs-32bit-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567232" comment="xen-tools-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567233" comment="xen-tools-domU-4.2.4_02-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141912" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1912</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1912" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1912" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1912" ref_url="https://www.suse.com/security/cve/CVE-2014-1912" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0380-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0498-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0518-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0597-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1734-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00111.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the socket.recvfrom_into function in Modules/socketmodule.c in Python 2.5 before 2.7.7, 3.x before 3.3.4, and 3.4.x before 3.4rc1 allows remote attackers to execute arbitrary code via a crafted string.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-10"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-1912/">CVE-2014-1912</cve>
	<bugzilla href="https://bugzilla.suse.com/1049392">SUSE bug 1049392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049422">SUSE bug 1049422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863741">SUSE bug 863741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882915">SUSE bug 882915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912739">SUSE bug 912739</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567081" comment="libpython2_6-1_0-2.6.9-0.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567082" comment="libpython2_6-1_0-32bit-2.6.9-0.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567083" comment="python-2.6.9-0.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567084" comment="python-base-2.6.9-0.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567085" comment="python-base-32bit-2.6.9-0.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567086" comment="python-curses-2.6.9-0.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567087" comment="python-devel-2.6.9-0.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563804" comment="python-tk-2.6.9-0.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567088" comment="python-xml-2.6.9-0.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1947</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1947" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1947" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1947" ref_url="https://www.suse.com/security/cve/CVE-2014-1947" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-March/000751.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the WritePSDImage function in coders/psd.c in ImageMagick 6.5.4 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large number of layers in a PSD image, involving the L%02ld string, a different vulnerability than CVE-2014-2030.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1947/">CVE-2014-1947</cve>
	<bugzilla href="https://bugzilla.suse.com/863838">SUSE bug 863838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905260">SUSE bug 905260</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592829" comment="ImageMagick-6.4.3.6-7.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592830" comment="libMagick++1-6.4.3.6-7.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592831" comment="libMagickCore1-6.4.3.6-7.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592832" comment="libMagickCore1-32bit-6.4.3.6-7.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592833" comment="libMagickWand1-6.4.3.6-7.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1950</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1950" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1950" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1950" ref_url="https://www.suse.com/security/cve/CVE-2014-1950" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0372-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0483-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00010.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the xc_cpupool_getinfo function in Xen 4.1.x through 4.3.x, when using a multithreaded toolstack, does not properly handle a failure by the xc_cpumap_alloc function, which allows local users with access to management functions to cause a denial of service (heap corruption) and possibly gain privileges via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1950/">CVE-2014-1950</cve>
	<bugzilla href="https://bugzilla.suse.com/861256">SUSE bug 861256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567225" comment="xen-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567226" comment="xen-doc-html-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567227" comment="xen-doc-pdf-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567228" comment="xen-kmp-default-4.2.4_02_3.0.101_0.15-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567229" comment="xen-kmp-pae-4.2.4_02_3.0.101_0.15-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567230" comment="xen-libs-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567231" comment="xen-libs-32bit-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567232" comment="xen-tools-4.2.4_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567233" comment="xen-tools-domU-4.2.4_02-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142270" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2270</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2270" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2270" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2270" ref_url="https://www.suse.com/security/cve/CVE-2014-2270" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0670-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000820.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0364-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0367-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0435-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00084.html" source="SUSE-SU"/>
    <description>
    softmagic.c in file before 5.17 and libmagic allows context-dependent attackers to cause a denial of service (out-of-bounds memory access and crash) via crafted offsets in the softmagic of a PE executable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2270/">CVE-2014-2270</cve>
	<bugzilla href="https://bugzilla.suse.com/866750">SUSE bug 866750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883306">SUSE bug 883306</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592845" comment="file-4.24-43.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592846" comment="file-32bit-4.24-43.25.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142281" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2281</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2281" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2281" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2281" ref_url="https://www.suse.com/security/cve/CVE-2014-2281" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000780.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0382-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0383-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00047.html" source="SUSE-SU"/>
    <description>
    The nfs_name_snoop_add_name function in epan/dissectors/packet-nfs.c in the NFS dissector in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 does not validate a certain length value, which allows remote attackers to cause a denial of service (memory corruption and application crash) via a crafted NFS packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2281/">CVE-2014-2281</cve>
	<bugzilla href="https://bugzilla.suse.com/867485">SUSE bug 867485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592851" comment="wireshark-1.8.13-0.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2282</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2282" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2282" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2282" ref_url="https://www.suse.com/security/cve/CVE-2014-2282" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000780.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0382-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00046.html" source="SUSE-SU"/>
    <description>
    The dissect_protocol_data_parameter function in epan/dissectors/packet-m3ua.c in the M3UA dissector in Wireshark 1.10.x before 1.10.6 does not properly allocate memory, which allows remote attackers to cause a denial of service (application crash) via a crafted SS7 MTP3 packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2282/">CVE-2014-2282</cve>
	<bugzilla href="https://bugzilla.suse.com/867485">SUSE bug 867485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592851" comment="wireshark-1.8.13-0.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2283</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2283" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2283" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2283" ref_url="https://www.suse.com/security/cve/CVE-2014-2283" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000780.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0382-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0383-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00047.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-rlc in the RLC dissector in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 uses inconsistent memory-management approaches, which allows remote attackers to cause a denial of service (use-after-free error and application crash) via a crafted UMTS Radio Link Control packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2283/">CVE-2014-2283</cve>
	<bugzilla href="https://bugzilla.suse.com/867485">SUSE bug 867485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592851" comment="wireshark-1.8.13-0.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2284</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2284" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2284" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2284" ref_url="https://www.suse.com/security/cve/CVE-2014-2284" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000786.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0398-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0399-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00061.html" source="SUSE-SU"/>
    <description>
    The Linux implementation of the ICMP-MIB in Net-SNMP 5.5 before 5.5.2.1, 5.6.x before 5.6.2.1, and 5.7.x before 5.7.2.1 does not properly validate input, which allows remote attackers to cause a denial of service via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-12"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2284/">CVE-2014-2284</cve>
	<bugzilla href="https://bugzilla.suse.com/866942">SUSE bug 866942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/875217">SUSE bug 875217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969779">SUSE bug 969779</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592854" comment="libsnmp15-5.4.2.1-8.12.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592855" comment="libsnmp15-32bit-5.4.2.1-8.12.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592856" comment="net-snmp-5.4.2.1-8.12.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592857" comment="perl-SNMP-5.4.2.1-8.12.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592858" comment="snmp-mibs-5.4.2.1-8.12.20.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142299" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2299</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2299" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2299" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2299" ref_url="https://www.suse.com/security/cve/CVE-2014-2299" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000780.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0382-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0383-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00047.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the mpeg_read function in wiretap/mpeg.c in the MPEG parser in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a large record in MPEG data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2299/">CVE-2014-2299</cve>
	<bugzilla href="https://bugzilla.suse.com/867485">SUSE bug 867485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592851" comment="wireshark-1.8.13-0.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142309" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2309</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2309" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2309" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2309" ref_url="https://www.suse.com/security/cve/CVE-2014-2309" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0957-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    The ip6_route_add function in net/ipv6/route.c in the Linux kernel through 3.13.6 does not properly count the addition of routes, which allows remote attackers to cause a denial of service (memory consumption) via a flood of ICMPv6 Router Advertisement packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2309/">CVE-2014-2309</cve>
	<bugzilla href="https://bugzilla.suse.com/824295">SUSE bug 824295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/867531">SUSE bug 867531</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589697" comment="kernel-default-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589698" comment="kernel-default-base-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589699" comment="kernel-default-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589700" comment="kernel-default-extra-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589701" comment="kernel-source-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589702" comment="kernel-syms-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589703" comment="kernel-trace-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589704" comment="kernel-xen-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589705" comment="kernel-xen-base-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589706" comment="kernel-xen-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589707" comment="kernel-xen-extra-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589708" comment="xen-kmp-default-4.2.4_02_3.0.101_0.35-0.7.45 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2310</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2310" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2310" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2310" ref_url="https://www.suse.com/security/cve/CVE-2014-2310" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000786.html" source="SUSE-SU"/>
    <description>
    The AgentX subagent in Net-SNMP before 5.4.4 allows remote attackers to cause a denial of service (hang) by sending a multi-object request with an Object ID (OID) containing more subids than previous requests, a different vulnerability than CVE-2012-6151.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-12"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2310/">CVE-2014-2310</cve>
	<bugzilla href="https://bugzilla.suse.com/867349">SUSE bug 867349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/875217">SUSE bug 875217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969779">SUSE bug 969779</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592854" comment="libsnmp15-5.4.2.1-8.12.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592855" comment="libsnmp15-32bit-5.4.2.1-8.12.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592856" comment="net-snmp-5.4.2.1-8.12.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592857" comment="perl-SNMP-5.4.2.1-8.12.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592858" comment="snmp-mibs-5.4.2.1-8.12.20.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142338" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2338</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2338" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2338" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2338" ref_url="https://www.suse.com/security/cve/CVE-2014-2338" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0529-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0697-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0700-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00066.html" source="SUSE-SU"/>
    <description>
    IKEv2 in strongSwan 4.0.7 before 5.1.3 allows remote attackers to bypass authentication by rekeying an IKE_SA during (1) initiation or (2) re-authentication, which triggers the IKE_SA state to be set to established.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2338/">CVE-2014-2338</cve>
	<bugzilla href="https://bugzilla.suse.com/870572">SUSE bug 870572</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592865" comment="strongswan-4.4.0-6.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592866" comment="strongswan-doc-4.4.0-6.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142397" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2397</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2397" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2397" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2397" ref_url="https://www.suse.com/security/cve/CVE-2014-2397" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u51 and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2397/">CVE-2014-2397</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592272" comment="java-1_7_0-openjdk-1.7.0.6-0.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592273" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592274" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142398" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2398</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2398" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2398" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2398" ref_url="https://www.suse.com/security/cve/CVE-2014-2398" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JavaFX 2.2.51; and JRockit R27.8.1 and R28.3.1 allows remote authenticated users to affect integrity via unknown vectors related to Javadoc.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-2398/">CVE-2014-2398</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592272" comment="java-1_7_0-openjdk-1.7.0.6-0.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592273" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592274" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2402</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2402" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2402" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2402" ref_url="https://www.suse.com/security/cve/CVE-2014-2402" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u51 and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2014-0432 and CVE-2014-0455.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2402/">CVE-2014-2402</cve>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592272" comment="java-1_7_0-openjdk-1.7.0.6-0.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592273" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592274" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142403" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2403</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2403" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2403" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2403" ref_url="https://www.suse.com/security/cve/CVE-2014-2403" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality via vectors related to JAXP.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2403/">CVE-2014-2403</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592272" comment="java-1_7_0-openjdk-1.7.0.6-0.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592273" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592274" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2412</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2412" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2412" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2412" ref_url="https://www.suse.com/security/cve/CVE-2014-2412" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, SE 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT, a different vulnerability than CVE-2014-0451.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2412/">CVE-2014-2412</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592272" comment="java-1_7_0-openjdk-1.7.0.6-0.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592273" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592274" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142413" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2413</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2413" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2413" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2413" ref_url="https://www.suse.com/security/cve/CVE-2014-2413" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u51 and 8, and Java SE Embedded 7u51, allows remote attackers to affect integrity via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2413/">CVE-2014-2413</cve>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592272" comment="java-1_7_0-openjdk-1.7.0.6-0.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592273" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592274" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2414</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2414" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2414" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2414" ref_url="https://www.suse.com/security/cve/CVE-2014-2414" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JAXB.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2414/">CVE-2014-2414</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592272" comment="java-1_7_0-openjdk-1.7.0.6-0.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592273" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592274" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2419</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2419" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2419" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2419" ref_url="https://www.suse.com/security/cve/CVE-2014-2419" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00012.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.35 and earlier and 5.6.15 and earlier allows remote authenticated users to affect availability via unknown vectors related to Partition.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2419/">CVE-2014-2419</cve>
	<bugzilla href="https://bugzilla.suse.com/873896">SUSE bug 873896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999706">SUSE bug 999706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591847" comment="libmysql55client18-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591848" comment="libmysql55client18-32bit-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591849" comment="libmysql55client_r18-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591850" comment="libmysql55client_r18-32bit-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591851" comment="libmysqlclient15-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591852" comment="libmysqlclient15-32bit-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591853" comment="libmysqlclient_r15-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591854" comment="libmysqlclient_r15-32bit-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591855" comment="mysql-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591856" comment="mysql-client-5.5.37-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2421</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2421" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2421" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2421" ref_url="https://www.suse.com/security/cve/CVE-2014-2421" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JavaFX 2.2.51; and Java SE Embedded 7u51 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2421/">CVE-2014-2421</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592272" comment="java-1_7_0-openjdk-1.7.0.6-0.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592273" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592274" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2423</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2423" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2423" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2423" ref_url="https://www.suse.com/security/cve/CVE-2014-2423" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JAX-WS, a different vulnerability than CVE-2014-0452 and CVE-2014-0458.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2423/">CVE-2014-2423</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592272" comment="java-1_7_0-openjdk-1.7.0.6-0.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592273" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592274" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2427</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2427" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2427" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2427" ref_url="https://www.suse.com/security/cve/CVE-2014-2427" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2427/">CVE-2014-2427</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592272" comment="java-1_7_0-openjdk-1.7.0.6-0.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592273" comment="java-1_7_0-openjdk-demo-1.7.0.6-0.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592274" comment="java-1_7_0-openjdk-devel-1.7.0.6-0.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2430</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2430" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2430" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2430" ref_url="https://www.suse.com/security/cve/CVE-2014-2430" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00012.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.36 and earlier and 5.6.16 and earlier allows remote authenticated users to affect availability via unknown vectors related to Performance Schema.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2430/">CVE-2014-2430</cve>
	<bugzilla href="https://bugzilla.suse.com/873896">SUSE bug 873896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999706">SUSE bug 999706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591847" comment="libmysql55client18-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591848" comment="libmysql55client18-32bit-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591849" comment="libmysql55client_r18-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591850" comment="libmysql55client_r18-32bit-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591851" comment="libmysqlclient15-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591852" comment="libmysqlclient15-32bit-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591853" comment="libmysqlclient_r15-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591854" comment="libmysqlclient_r15-32bit-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591855" comment="mysql-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591856" comment="mysql-client-5.5.37-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2431</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2431" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2431" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2431" ref_url="https://www.suse.com/security/cve/CVE-2014-2431" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00012.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.36 and earlier and 5.6.16 and earlier allows remote attackers to affect availability via unknown vectors related to Options.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2431/">CVE-2014-2431</cve>
	<bugzilla href="https://bugzilla.suse.com/873896">SUSE bug 873896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999706">SUSE bug 999706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591847" comment="libmysql55client18-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591848" comment="libmysql55client18-32bit-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591849" comment="libmysql55client_r18-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591850" comment="libmysql55client_r18-32bit-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591851" comment="libmysqlclient15-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591852" comment="libmysqlclient15-32bit-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591853" comment="libmysqlclient_r15-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591854" comment="libmysqlclient_r15-32bit-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591855" comment="mysql-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591856" comment="mysql-client-5.5.37-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2432</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2432" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2432" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2432" ref_url="https://www.suse.com/security/cve/CVE-2014-2432" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00012.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability Oracle the MySQL Server component 5.5.35 and earlier and 5.6.15 and earlier allows remote authenticated users to affect availability via unknown vectors related to Federated.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2432/">CVE-2014-2432</cve>
	<bugzilla href="https://bugzilla.suse.com/873896">SUSE bug 873896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999706">SUSE bug 999706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591847" comment="libmysql55client18-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591848" comment="libmysql55client18-32bit-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591849" comment="libmysql55client_r18-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591850" comment="libmysql55client_r18-32bit-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591851" comment="libmysqlclient15-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591852" comment="libmysqlclient15-32bit-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591853" comment="libmysqlclient_r15-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591854" comment="libmysqlclient_r15-32bit-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591855" comment="mysql-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591856" comment="mysql-client-5.5.37-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2434</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2434" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2434" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2434" ref_url="https://www.suse.com/security/cve/CVE-2014-2434" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00012.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.15 and earlier allows remote authenticated users to affect availability via vectors related to DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2434/">CVE-2014-2434</cve>
	<bugzilla href="https://bugzilla.suse.com/873896">SUSE bug 873896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999706">SUSE bug 999706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591847" comment="libmysql55client18-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591848" comment="libmysql55client18-32bit-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591849" comment="libmysql55client_r18-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591850" comment="libmysql55client_r18-32bit-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591851" comment="libmysqlclient15-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591852" comment="libmysqlclient15-32bit-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591853" comment="libmysqlclient_r15-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591854" comment="libmysqlclient_r15-32bit-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591855" comment="mysql-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591856" comment="mysql-client-5.5.37-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2435</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2435" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2435" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2435" ref_url="https://www.suse.com/security/cve/CVE-2014-2435" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00012.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.16 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2435/">CVE-2014-2435</cve>
	<bugzilla href="https://bugzilla.suse.com/1021755">SUSE bug 1021755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873896">SUSE bug 873896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999706">SUSE bug 999706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591847" comment="libmysql55client18-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591848" comment="libmysql55client18-32bit-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591849" comment="libmysql55client_r18-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591850" comment="libmysql55client_r18-32bit-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591851" comment="libmysqlclient15-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591852" comment="libmysqlclient15-32bit-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591853" comment="libmysqlclient_r15-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591854" comment="libmysqlclient_r15-32bit-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591855" comment="mysql-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591856" comment="mysql-client-5.5.37-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2436</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2436" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2436" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2436" ref_url="https://www.suse.com/security/cve/CVE-2014-2436" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00012.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.36 and earlier and 5.6.16 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to RBR.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2436/">CVE-2014-2436</cve>
	<bugzilla href="https://bugzilla.suse.com/873896">SUSE bug 873896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999706">SUSE bug 999706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591847" comment="libmysql55client18-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591848" comment="libmysql55client18-32bit-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591849" comment="libmysql55client_r18-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591850" comment="libmysql55client_r18-32bit-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591851" comment="libmysqlclient15-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591852" comment="libmysqlclient15-32bit-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591853" comment="libmysqlclient_r15-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591854" comment="libmysqlclient_r15-32bit-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591855" comment="mysql-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591856" comment="mysql-client-5.5.37-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2438</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2438" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2438" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2438" ref_url="https://www.suse.com/security/cve/CVE-2014-2438" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00012.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.35 and earlier and 5.6.15 and earlier allows remote authenticated users to affect availability via unknown vectors related to Replication.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-2438/">CVE-2014-2438</cve>
	<bugzilla href="https://bugzilla.suse.com/873896">SUSE bug 873896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999706">SUSE bug 999706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591847" comment="libmysql55client18-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591848" comment="libmysql55client18-32bit-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591849" comment="libmysql55client_r18-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591850" comment="libmysql55client_r18-32bit-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591851" comment="libmysqlclient15-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591852" comment="libmysqlclient15-32bit-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591853" comment="libmysqlclient_r15-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591854" comment="libmysqlclient_r15-32bit-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591855" comment="mysql-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591856" comment="mysql-client-5.5.37-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2440</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2440" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2440" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2440" ref_url="https://www.suse.com/security/cve/CVE-2014-2440" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00012.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the MySQL Client component in Oracle MySQL 5.5.36 and earlier and 5.6.16 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2440/">CVE-2014-2440</cve>
	<bugzilla href="https://bugzilla.suse.com/873896">SUSE bug 873896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999706">SUSE bug 999706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591847" comment="libmysql55client18-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591848" comment="libmysql55client18-32bit-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591849" comment="libmysql55client_r18-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591850" comment="libmysql55client_r18-32bit-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591851" comment="libmysqlclient15-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591852" comment="libmysqlclient15-32bit-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591853" comment="libmysqlclient_r15-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591854" comment="libmysqlclient_r15-32bit-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591855" comment="mysql-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591856" comment="mysql-client-5.5.37-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2442</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2442" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2442" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2442" ref_url="https://www.suse.com/security/cve/CVE-2014-2442" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00012.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.15 and earlier allows remote authenticated users to affect availability via vectors related to MyISAM.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2442/">CVE-2014-2442</cve>
	<bugzilla href="https://bugzilla.suse.com/873896">SUSE bug 873896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999706">SUSE bug 999706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591847" comment="libmysql55client18-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591848" comment="libmysql55client18-32bit-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591849" comment="libmysql55client_r18-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591850" comment="libmysql55client_r18-32bit-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591851" comment="libmysqlclient15-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591852" comment="libmysqlclient15-32bit-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591853" comment="libmysqlclient_r15-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591854" comment="libmysqlclient_r15-32bit-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591855" comment="mysql-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591856" comment="mysql-client-5.5.37-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2444</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2444" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2444" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2444" ref_url="https://www.suse.com/security/cve/CVE-2014-2444" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00012.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.15 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to InnoDB.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2444/">CVE-2014-2444</cve>
	<bugzilla href="https://bugzilla.suse.com/873896">SUSE bug 873896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999706">SUSE bug 999706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591847" comment="libmysql55client18-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591848" comment="libmysql55client18-32bit-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591849" comment="libmysql55client_r18-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591850" comment="libmysql55client_r18-32bit-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591851" comment="libmysqlclient15-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591852" comment="libmysqlclient15-32bit-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591853" comment="libmysqlclient_r15-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591854" comment="libmysqlclient_r15-32bit-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591855" comment="mysql-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591856" comment="mysql-client-5.5.37-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2450</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2450" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2450" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2450" ref_url="https://www.suse.com/security/cve/CVE-2014-2450" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00012.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.15 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2450/">CVE-2014-2450</cve>
	<bugzilla href="https://bugzilla.suse.com/873896">SUSE bug 873896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999706">SUSE bug 999706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591847" comment="libmysql55client18-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591848" comment="libmysql55client18-32bit-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591849" comment="libmysql55client_r18-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591850" comment="libmysql55client_r18-32bit-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591851" comment="libmysqlclient15-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591852" comment="libmysqlclient15-32bit-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591853" comment="libmysqlclient_r15-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591854" comment="libmysqlclient_r15-32bit-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591855" comment="mysql-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591856" comment="mysql-client-5.5.37-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2451</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2451" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2451" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2451" ref_url="https://www.suse.com/security/cve/CVE-2014-2451" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00012.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.15 and earlier allows remote authenticated users to affect availability via unknown vectors related to Privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2451/">CVE-2014-2451</cve>
	<bugzilla href="https://bugzilla.suse.com/873896">SUSE bug 873896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999706">SUSE bug 999706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009591847" comment="libmysql55client18-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591848" comment="libmysql55client18-32bit-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591849" comment="libmysql55client_r18-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591850" comment="libmysql55client_r18-32bit-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591851" comment="libmysqlclient15-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591852" comment="libmysqlclient15-32bit-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591853" comment="libmysqlclient_r15-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591854" comment="libmysqlclient_r15-32bit-5.0.96-0.6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591855" comment="mysql-5.5.37-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009591856" comment="mysql-client-5.5.37-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2483</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2483" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2483" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2483" ref_url="https://www.suse.com/security/cve/CVE-2014-2483" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java SE component in Oracle Java SE Java SE 7u60 and OpenJDK 7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2014-4223. NOTE: the previous information is from the July 2014 CPU. Oracle has not commented on another vendor's claim that the issue is related to improper restriction of the "use of privileged annotations."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2483/">CVE-2014-2483</cve>
	<bugzilla href="https://bugzilla.suse.com/887530">SUSE bug 887530</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592869" comment="java-1_7_0-openjdk-1.7.0.65-0.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592870" comment="java-1_7_0-openjdk-demo-1.7.0.65-0.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592871" comment="java-1_7_0-openjdk-devel-1.7.0.65-0.7.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2484</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2484" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2484" ref_url="https://www.suse.com/security/cve/CVE-2014-2484" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1072-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.6.17 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to SRFTS.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2484/">CVE-2014-2484</cve>
	<bugzilla href="https://bugzilla.suse.com/887580">SUSE bug 887580</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566834" comment="libmysql55client18-5.5.39-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566835" comment="libmysql55client18-32bit-5.5.39-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566836" comment="libmysql55client_r18-5.5.39-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566837" comment="libmysql55client_r18-32bit-5.5.39-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566838" comment="libmysqlclient15-5.0.96-0.6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566839" comment="libmysqlclient15-32bit-5.0.96-0.6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566840" comment="libmysqlclient_r15-5.0.96-0.6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566841" comment="libmysqlclient_r15-32bit-5.0.96-0.6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566842" comment="mysql-5.5.39-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566843" comment="mysql-client-5.5.39-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2490</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2490" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2490" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2490" ref_url="https://www.suse.com/security/cve/CVE-2014-2490" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java SE component in Oracle Java SE 7u60 and SE 8u5 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2490/">CVE-2014-2490</cve>
	<bugzilla href="https://bugzilla.suse.com/887530">SUSE bug 887530</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592869" comment="java-1_7_0-openjdk-1.7.0.65-0.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592870" comment="java-1_7_0-openjdk-demo-1.7.0.65-0.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592871" comment="java-1_7_0-openjdk-devel-1.7.0.65-0.7.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2494</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2494" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2494" ref_url="https://www.suse.com/security/cve/CVE-2014-2494" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1072-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.37 and earlier allows remote authenticated users to affect availability via vectors related to ENARC.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2494/">CVE-2014-2494</cve>
	<bugzilla href="https://bugzilla.suse.com/887580">SUSE bug 887580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915914">SUSE bug 915914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566834" comment="libmysql55client18-5.5.39-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566835" comment="libmysql55client18-32bit-5.5.39-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566836" comment="libmysql55client_r18-5.5.39-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566837" comment="libmysql55client_r18-32bit-5.5.39-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566838" comment="libmysqlclient15-5.0.96-0.6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566839" comment="libmysqlclient15-32bit-5.0.96-0.6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566840" comment="libmysqlclient_r15-5.0.96-0.6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566841" comment="libmysqlclient_r15-32bit-5.0.96-0.6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566842" comment="mysql-5.5.39-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566843" comment="mysql-client-5.5.39-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2523</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2523" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2523" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2523" ref_url="https://www.suse.com/security/cve/CVE-2014-2523" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0766-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00013.html" source="SUSE-SU"/>
    <description>
    net/netfilter/nf_conntrack_proto_dccp.c in the Linux kernel through 3.13.6 uses a DCCP header pointer incorrectly, which allows remote attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a DCCP packet that triggers a call to the (1) dccp_new, (2) dccp_packet, or (3) dccp_error function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-2523/">CVE-2014-2523</cve>
	<bugzilla href="https://bugzilla.suse.com/868653">SUSE bug 868653</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589697" comment="kernel-default-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589698" comment="kernel-default-base-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589699" comment="kernel-default-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589700" comment="kernel-default-extra-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589701" comment="kernel-source-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589702" comment="kernel-syms-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589703" comment="kernel-trace-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589704" comment="kernel-xen-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589705" comment="kernel-xen-base-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589706" comment="kernel-xen-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589707" comment="kernel-xen-extra-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589708" comment="xen-kmp-default-4.2.4_02_3.0.101_0.35-0.7.45 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2527</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2527" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2527" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2527" ref_url="https://www.suse.com/security/cve/CVE-2014-2527" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000932.html" source="SUSE-SU"/>
    <description>
    kcleanup.cpp in KDirStat 2.7.0 does not properly quote strings when deleting a directory, which allows remote attackers to execute arbitrary commands via a " (double quote) character in the directory name, a different vulnerability than CVE-2014-2528.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2527/">CVE-2014-2527</cve>
	<bugzilla href="https://bugzilla.suse.com/868682">SUSE bug 868682</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566708" comment="kdirstat-2.4.4-255.28.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2528</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2528" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2528" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2528" ref_url="https://www.suse.com/security/cve/CVE-2014-2528" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000932.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0984-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00015.html" source="SUSE-SU"/>
    <description>
    kcleanup.cpp in KDirStat 2.7.3 does not properly quote strings when deleting a directory, which allows remote attackers to execute arbitrary commands via a ' (single quote) character in the directory name, a different vulnerability than CVE-2014-2527.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2528/">CVE-2014-2528</cve>
	<bugzilla href="https://bugzilla.suse.com/868682">SUSE bug 868682</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566708" comment="kdirstat-2.4.4-255.28.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2532</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2532" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2532" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2532" ref_url="https://www.suse.com/security/cve/CVE-2014-2532" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000878.html" source="SUSE-SU"/>
    <description>
    sshd in OpenSSH before 6.6 does not properly support wildcards on AcceptEnv lines in sshd_config, which allows remote attackers to bypass intended environment restrictions by using a substring located before a wildcard character.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2014-2532/">CVE-2014-2532</cve>
	<bugzilla href="https://bugzilla.suse.com/1074631">SUSE bug 1074631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869101">SUSE bug 869101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890850">SUSE bug 890850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916239">SUSE bug 916239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996040">SUSE bug 996040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567015" comment="openssh-6.2p2-0.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567016" comment="openssh-askpass-6.2p2-0.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567017" comment="openssh-askpass-gnome-6.2p2-0.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2583</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2583" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2583" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2583" ref_url="https://www.suse.com/security/cve/CVE-2014-2583" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000812.html" source="SUSE-SU"/>
    <description>
    Multiple directory traversal vulnerabilities in pam_timestamp.c in the pam_timestamp module for Linux-PAM (aka pam) 1.1.8 allow local users to create arbitrary files or possibly bypass authentication via a .. (dot dot) in the (1) PAM_RUSER value to the get_ruser function or (2) PAM_TTY value to the check_tty function, which is used by the format_timestamp_name function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2583/">CVE-2014-2583</cve>
	<bugzilla href="https://bugzilla.suse.com/870433">SUSE bug 870433</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567031" comment="pam-1.1.5-0.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567032" comment="pam-32bit-1.1.5-0.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567033" comment="pam-doc-1.1.5-0.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2599</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2599" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2599" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2599" ref_url="https://www.suse.com/security/cve/CVE-2014-2599" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001135.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00002.html" source="SUSE-SU"/>
    <description>
    The HVMOP_set_mem_access HVM control operations in Xen 4.1.x for 32-bit and 4.1.x through 4.4.x for 64-bit allow local guest administrators to cause a denial of service (CPU consumption) by leveraging access to certain service domains for HVM guests and a large input.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2599/">CVE-2014-2599</cve>
	<bugzilla href="https://bugzilla.suse.com/867910">SUSE bug 867910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880751">SUSE bug 880751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903970">SUSE bug 903970</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567234" comment="xen-4.2.4_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567235" comment="xen-doc-html-4.2.4_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567236" comment="xen-doc-pdf-4.2.4_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567237" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567238" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567239" comment="xen-libs-4.2.4_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567240" comment="xen-libs-32bit-4.2.4_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567241" comment="xen-tools-4.2.4_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567242" comment="xen-tools-domU-4.2.4_04-0.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2672</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2672" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2672" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2672" ref_url="https://www.suse.com/security/cve/CVE-2014-2672" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000882.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00010.html" source="SUSE-SU"/>
    <description>
    Race condition in the ath_tx_aggr_sleep function in drivers/net/wireless/ath/ath9k/xmit.c in the Linux kernel before 3.13.7 allows remote attackers to cause a denial of service (system crash) via a large amount of network traffic that triggers certain list deletions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2672/">CVE-2014-2672</cve>
	<bugzilla href="https://bugzilla.suse.com/871148">SUSE bug 871148</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566375" comment="compat-wireless-kmp-default-3.13_3.0.101_0.31-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566376" comment="compat-wireless-kmp-pae-3.13_3.0.101_0.31-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566377" comment="compat-wireless-kmp-xen-3.13_3.0.101_0.31-0.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2678</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2678" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2678" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2678" ref_url="https://www.suse.com/security/cve/CVE-2014-2678" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0766-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0840-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0856-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00000.html" source="SUSE-SU"/>
    <description>
    The rds_iw_laddr_check function in net/rds/iw.c in the Linux kernel through 3.14 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a bind system call for an RDS socket on a system that lacks RDS transports.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2678/">CVE-2014-2678</cve>
	<bugzilla href="https://bugzilla.suse.com/871561">SUSE bug 871561</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589697" comment="kernel-default-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589698" comment="kernel-default-base-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589699" comment="kernel-default-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589700" comment="kernel-default-extra-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589701" comment="kernel-source-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589702" comment="kernel-syms-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589703" comment="kernel-trace-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589704" comment="kernel-xen-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589705" comment="kernel-xen-base-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589706" comment="kernel-xen-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589707" comment="kernel-xen-extra-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589708" comment="xen-kmp-default-4.2.4_02_3.0.101_0.35-0.7.45 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2706</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2706" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2706" ref_url="https://www.suse.com/security/cve/CVE-2014-2706" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1316-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1246-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00056.html" source="SUSE-SU"/>
    <description>
    Race condition in the mac80211 subsystem in the Linux kernel before 3.13.7 allows remote attackers to cause a denial of service (system crash) via network traffic that improperly interacts with the WLAN_STA_PS_STA state (aka power-save mode), related to sta_info.c and tx.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2706/">CVE-2014-2706</cve>
	<bugzilla href="https://bugzilla.suse.com/871797">SUSE bug 871797</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566710" comment="kernel-default-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566711" comment="kernel-default-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566712" comment="kernel-default-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566713" comment="kernel-default-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566718" comment="kernel-source-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566719" comment="kernel-syms-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566720" comment="kernel-trace-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566721" comment="kernel-xen-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566722" comment="kernel-xen-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566723" comment="kernel-xen-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566724" comment="kernel-xen-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566725" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2851</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2851" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2851" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2851" ref_url="https://www.suse.com/security/cve/CVE-2014-2851" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000987.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0840-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0856-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1246-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00056.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the ping_init_sock function in net/ipv4/ping.c in the Linux kernel through 3.14.1 allows local users to cause a denial of service (use-after-free and system crash) or possibly gain privileges via a crafted application that leverages an improperly managed reference counter.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2851/">CVE-2014-2851</cve>
	<bugzilla href="https://bugzilla.suse.com/824295">SUSE bug 824295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873374">SUSE bug 873374</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589697" comment="kernel-default-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589698" comment="kernel-default-base-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589699" comment="kernel-default-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589700" comment="kernel-default-extra-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589701" comment="kernel-source-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589702" comment="kernel-syms-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589703" comment="kernel-trace-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589704" comment="kernel-xen-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589705" comment="kernel-xen-base-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589706" comment="kernel-xen-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589707" comment="kernel-xen-extra-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589708" comment="xen-kmp-default-4.2.4_02_3.0.101_0.35-0.7.45 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2891</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2891" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2891" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2891" ref_url="https://www.suse.com/security/cve/CVE-2014-2891" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001493.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0697-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0700-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00066.html" source="SUSE-SU"/>
    <description>
    strongSwan before 5.1.2 allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon crash) via a crafted ID_DER_ASN1_DN ID payload.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-2891/">CVE-2014-2891</cve>
	<bugzilla href="https://bugzilla.suse.com/876449">SUSE bug 876449</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567146" comment="strongswan-4.4.0-6.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567147" comment="strongswan-doc-4.4.0-6.25.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142894" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2894</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2894" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2894" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2894" ref_url="https://www.suse.com/security/cve/CVE-2014-2894" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000876.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in the cmd_smart function in the smart self test in hw/ide/core.c in QEMU before 2.0 allows local users to have unspecified impact via a SMART EXECUTE OFFLINE command that triggers a buffer underflow and memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2894/">CVE-2014-2894</cve>
	<bugzilla href="https://bugzilla.suse.com/874749">SUSE bug 874749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592469" comment="kvm-1.4.2-0.15.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2977</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2977" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2977" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2977" ref_url="https://www.suse.com/security/cve/CVE-2014-2977" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0839-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00019.html" source="SUSE-SU"/>
    <description>
    Multiple integer signedness errors in the Dispatch_Write function in proxy/dispatcher/idirectfbsurface_dispatcher.c in DirectFB 1.4.13 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via the Voodoo interface, which triggers a stack-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-2977/">CVE-2014-2977</cve>
	<bugzilla href="https://bugzilla.suse.com/878345">SUSE bug 878345</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334236" comment="DirectFB is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2978</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2978" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2978" ref_url="https://www.suse.com/security/cve/CVE-2014-2978" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0839-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00019.html" source="SUSE-SU"/>
    <description>
    The Dispatch_Write function in proxy/dispatcher/idirectfbsurface_dispatcher.c in DirectFB 1.4.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via the Voodoo interface, which triggers an out-of-bounds write.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-2978/">CVE-2014-2978</cve>
	<bugzilla href="https://bugzilla.suse.com/878349">SUSE bug 878349</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334236" comment="DirectFB is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3121</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3121" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3121" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3121" ref_url="https://www.suse.com/security/cve/CVE-2014-3121" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0838-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0814-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00038.html" source="SUSE-SU"/>
    <description>
    rxvt-unicode before 9.20 does not properly handle OSC escape sequences, which allows user-assisted remote attackers to manipulate arbitrary X window properties and execute arbitrary commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3121/">CVE-2014-3121</cve>
	<bugzilla href="https://bugzilla.suse.com/876101">SUSE bug 876101</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567103" comment="rxvt-unicode-9.05-1.19.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3122</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3122" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3122" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3122" ref_url="https://www.suse.com/security/cve/CVE-2014-3122" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0766-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0840-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0856-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00000.html" source="SUSE-SU"/>
    <description>
    The try_to_unmap_cluster function in mm/rmap.c in the Linux kernel before 3.14.3 does not properly consider which pages must be locked, which allows local users to cause a denial of service (system crash) by triggering a memory-usage pattern that requires removal of page-table mappings.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3122/">CVE-2014-3122</cve>
	<bugzilla href="https://bugzilla.suse.com/824295">SUSE bug 824295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876102">SUSE bug 876102</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589697" comment="kernel-default-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589698" comment="kernel-default-base-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589699" comment="kernel-default-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589700" comment="kernel-default-extra-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589701" comment="kernel-source-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589702" comment="kernel-syms-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589703" comment="kernel-trace-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589704" comment="kernel-xen-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589705" comment="kernel-xen-base-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589706" comment="kernel-xen-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589707" comment="kernel-xen-extra-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589708" comment="xen-kmp-default-4.2.4_02_3.0.101_0.35-0.7.45 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3144</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3144" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3144" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3144" ref_url="https://www.suse.com/security/cve/CVE-2014-3144" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0840-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0957-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1246-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00056.html" source="SUSE-SU"/>
    <description>
    The (1) BPF_S_ANC_NLATTR and (2) BPF_S_ANC_NLATTR_NEST extension implementations in the sk_run_filter function in net/core/filter.c in the Linux kernel through 3.14.3 do not check whether a certain length value is sufficiently large, which allows local users to cause a denial of service (integer underflow and system crash) via crafted BPF instructions.  NOTE: the affected code was moved to the __skb_get_nlattr and __skb_get_nlattr_nest functions before the vulnerability was announced.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-06"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3144/">CVE-2014-3144</cve>
	<bugzilla href="https://bugzilla.suse.com/824295">SUSE bug 824295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877257">SUSE bug 877257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889071">SUSE bug 889071</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589697" comment="kernel-default-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589698" comment="kernel-default-base-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589699" comment="kernel-default-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589700" comment="kernel-default-extra-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589701" comment="kernel-source-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589702" comment="kernel-syms-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589703" comment="kernel-trace-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589704" comment="kernel-xen-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589705" comment="kernel-xen-base-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589706" comment="kernel-xen-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589707" comment="kernel-xen-extra-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589708" comment="xen-kmp-default-4.2.4_02_3.0.101_0.35-0.7.45 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3145</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3145" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3145" ref_url="https://www.suse.com/security/cve/CVE-2014-3145" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0840-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0957-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1246-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00056.html" source="SUSE-SU"/>
    <description>
    The BPF_S_ANC_NLATTR_NEST extension implementation in the sk_run_filter function in net/core/filter.c in the Linux kernel through 3.14.3 uses the reverse order in a certain subtraction, which allows local users to cause a denial of service (over-read and system crash) via crafted BPF instructions.  NOTE: the affected code was moved to the __skb_get_nlattr_nest function before the vulnerability was announced.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3145/">CVE-2014-3145</cve>
	<bugzilla href="https://bugzilla.suse.com/824295">SUSE bug 824295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877257">SUSE bug 877257</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589697" comment="kernel-default-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589698" comment="kernel-default-base-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589699" comment="kernel-default-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589700" comment="kernel-default-extra-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589701" comment="kernel-source-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589702" comment="kernel-syms-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589703" comment="kernel-trace-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589704" comment="kernel-xen-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589705" comment="kernel-xen-base-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589706" comment="kernel-xen-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589707" comment="kernel-xen-extra-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589708" comment="xen-kmp-default-4.2.4_02_3.0.101_0.35-0.7.45 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3146</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3146" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3146" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3146" ref_url="https://www.suse.com/security/cve/CVE-2014-3146" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0735-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00083.html" source="SUSE-SU"/>
    <description>
    Incomplete blacklist vulnerability in the lxml.html.clean module in lxml before 3.3.5 allows remote attackers to conduct cross-site scripting (XSS) attacks via control characters in the link scheme to the clean_html function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3146/">CVE-2014-3146</cve>
	<bugzilla href="https://bugzilla.suse.com/1118088">SUSE bug 1118088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877258">SUSE bug 877258</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567097" comment="python-lxml-2.3.6-0.13.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3153</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3153" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3153" ref_url="https://www.suse.com/security/cve/CVE-2014-3153" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0775-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0796-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0837-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0837-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0840-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0856-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0878-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00006.html" source="SUSE-SU"/>
    <description>
    The futex_requeue function in kernel/futex.c in the Linux kernel through 3.14.5 does not ensure that calls have two different futex addresses, which allows local users to gain privileges via a crafted FUTEX_REQUEUE command that facilitates unsafe waiter modification.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-14"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3153/">CVE-2014-3153</cve>
	<bugzilla href="https://bugzilla.suse.com/877775">SUSE bug 877775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880892">SUSE bug 880892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882228">SUSE bug 882228</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566710" comment="kernel-default-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566711" comment="kernel-default-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566712" comment="kernel-default-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566713" comment="kernel-default-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566718" comment="kernel-source-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566719" comment="kernel-syms-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566720" comment="kernel-trace-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566721" comment="kernel-xen-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566722" comment="kernel-xen-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566723" comment="kernel-xen-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566724" comment="kernel-xen-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566725" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3158</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3158" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3158" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3158" ref_url="https://www.suse.com/security/cve/CVE-2014-3158" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000983.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1135-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00026.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the getword function in options.c in pppd in Paul's PPP Package (ppp) before 2.4.7 allows attackers to "access privileged options" via a long word in an options file, which triggers a heap-based buffer overflow that "[corrupts] security-relevant variables."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3158/">CVE-2014-3158</cve>
	<bugzilla href="https://bugzilla.suse.com/891489">SUSE bug 891489</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567058" comment="ppp-2.4.5.git-2.29.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3181</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3181" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3181" ref_url="https://www.suse.com/security/cve/CVE-2014-3181" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    Multiple stack-based buffer overflows in the magicmouse_raw_event function in drivers/hid/hid-magicmouse.c in the Magic Mouse HID driver in the Linux kernel through 3.16.3 allow physically proximate attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a crafted device that provides a large amount of (1) EHCI or (2) XHCI data associated with an event.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3181/">CVE-2014-3181</cve>
	<bugzilla href="https://bugzilla.suse.com/896382">SUSE bug 896382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590044" comment="kernel-bigsmp-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590045" comment="kernel-default-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590046" comment="kernel-default-base-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590047" comment="kernel-default-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590048" comment="kernel-default-extra-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590049" comment="kernel-pae-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590050" comment="kernel-pae-base-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590051" comment="kernel-pae-devel-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590052" comment="kernel-pae-extra-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590053" comment="kernel-source-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590054" comment="kernel-syms-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590055" comment="kernel-trace-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590056" comment="kernel-xen-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590057" comment="kernel-xen-base-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590058" comment="kernel-xen-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590059" comment="kernel-xen-extra-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590060" comment="xen-kmp-default-4.2.5_02_3.0.101_0.46-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590061" comment="xen-kmp-pae-4.2.5_02_3.0.101_0.42-0.7.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3184</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3184" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3184" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3184" ref_url="https://www.suse.com/security/cve/CVE-2014-3184" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    The report_fixup functions in the HID subsystem in the Linux kernel before 3.16.2 might allow physically proximate attackers to cause a denial of service (out-of-bounds write) via a crafted device that provides a small report descriptor, related to (1) drivers/hid/hid-cherry.c, (2) drivers/hid/hid-kye.c, (3) drivers/hid/hid-lg.c, (4) drivers/hid/hid-monterey.c, (5) drivers/hid/hid-petalynx.c, and (6) drivers/hid/hid-sunplus.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3184/">CVE-2014-3184</cve>
	<bugzilla href="https://bugzilla.suse.com/896390">SUSE bug 896390</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590044" comment="kernel-bigsmp-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590045" comment="kernel-default-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590046" comment="kernel-default-base-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590047" comment="kernel-default-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590048" comment="kernel-default-extra-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590049" comment="kernel-pae-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590050" comment="kernel-pae-base-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590051" comment="kernel-pae-devel-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590052" comment="kernel-pae-extra-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590053" comment="kernel-source-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590054" comment="kernel-syms-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590055" comment="kernel-trace-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590056" comment="kernel-xen-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590057" comment="kernel-xen-base-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590058" comment="kernel-xen-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590059" comment="kernel-xen-extra-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590060" comment="xen-kmp-default-4.2.5_02_3.0.101_0.46-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590061" comment="xen-kmp-pae-4.2.5_02_3.0.101_0.42-0.7.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3185</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3185" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3185" ref_url="https://www.suse.com/security/cve/CVE-2014-3185" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in the command_port_read_callback function in drivers/usb/serial/whiteheat.c in the Whiteheat USB Serial Driver in the Linux kernel before 3.16.2 allow physically proximate attackers to execute arbitrary code or cause a denial of service (memory corruption and system crash) via a crafted device that provides a large amount of (1) EHCI or (2) XHCI data associated with a bulk response.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3185/">CVE-2014-3185</cve>
	<bugzilla href="https://bugzilla.suse.com/896391">SUSE bug 896391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590044" comment="kernel-bigsmp-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590045" comment="kernel-default-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590046" comment="kernel-default-base-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590047" comment="kernel-default-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590048" comment="kernel-default-extra-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590049" comment="kernel-pae-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590050" comment="kernel-pae-base-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590051" comment="kernel-pae-devel-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590052" comment="kernel-pae-extra-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590053" comment="kernel-source-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590054" comment="kernel-syms-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590055" comment="kernel-trace-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590056" comment="kernel-xen-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590057" comment="kernel-xen-base-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590058" comment="kernel-xen-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590059" comment="kernel-xen-extra-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590060" comment="xen-kmp-default-4.2.5_02_3.0.101_0.46-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590061" comment="xen-kmp-pae-4.2.5_02_3.0.101_0.42-0.7.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3186</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3186" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3186" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3186" ref_url="https://www.suse.com/security/cve/CVE-2014-3186" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the picolcd_raw_event function in devices/hid/hid-picolcd_core.c in the PicoLCD HID device driver in the Linux kernel through 3.16.3, as used in Android on Nexus 7 devices, allows physically proximate attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a crafted device that sends a large report.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3186/">CVE-2014-3186</cve>
	<bugzilla href="https://bugzilla.suse.com/896392">SUSE bug 896392</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590044" comment="kernel-bigsmp-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590045" comment="kernel-default-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590046" comment="kernel-default-base-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590047" comment="kernel-default-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590048" comment="kernel-default-extra-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590049" comment="kernel-pae-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590050" comment="kernel-pae-base-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590051" comment="kernel-pae-devel-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590052" comment="kernel-pae-extra-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590053" comment="kernel-source-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590054" comment="kernel-syms-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590055" comment="kernel-trace-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590056" comment="kernel-xen-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590057" comment="kernel-xen-base-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590058" comment="kernel-xen-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590059" comment="kernel-xen-extra-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590060" comment="xen-kmp-default-4.2.5_02_3.0.101_0.46-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590061" comment="xen-kmp-pae-4.2.5_02_3.0.101_0.42-0.7.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3248</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3248" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3248" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3248" ref_url="https://www.suse.com/security/cve/CVE-2014-3248" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000903.html" source="SUSE-SU"/>
    <description>
    Untrusted search path vulnerability in Puppet Enterprise 2.8 before 2.8.7, Puppet before 2.7.26 and 3.x before 3.6.2, Facter 1.6.x and 2.x before 2.0.2, Hiera before 1.3.4, and Mcollective before 2.5.2, when running with Ruby 1.9.1 or earlier, allows local users to gain privileges via a Trojan horse file in the current working directory, as demonstrated using (1) rubygems/defaults/operating_system.rb, (2) Win32API.rb, (3) Win32API.so, (4) safe_yaml.rb, (5) safe_yaml/deep.rb, or (6) safe_yaml/deep.so; or (7) operatingsystem.rb, (8) operatingsystem.so, (9) osfamily.rb, or (10) osfamily.so in puppet/confine.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3248/">CVE-2014-3248</cve>
	<bugzilla href="https://bugzilla.suse.com/879913">SUSE bug 879913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567060" comment="puppet-2.6.18-0.16.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143250" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3250</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3250" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3250" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3250" ref_url="https://www.suse.com/security/cve/CVE-2014-3250" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000903.html" source="SUSE-SU"/>
    <description>
    The default vhost configuration file in Puppet before 3.6.2 does not include the SSLCARevocationCheck directive, which might allow remote attackers to obtain sensitive information via a revoked certificate when a Puppet master runs with Apache 2.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3250/">CVE-2014-3250</cve>
	<bugzilla href="https://bugzilla.suse.com/879913">SUSE bug 879913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567060" comment="puppet-2.6.18-0.16.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3421</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3421" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3421" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3421" ref_url="https://www.suse.com/security/cve/CVE-2014-3421" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001372.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1460-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00080.html" source="SUSE-SU"/>
    <description>
    lisp/gnus/gnus-fun.el in GNU Emacs 24.3 and earlier allows local users to overwrite arbitrary files via a symlink attack on the /tmp/gnus.face.ppm temporary file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3421/">CVE-2014-3421</cve>
	<bugzilla href="https://bugzilla.suse.com/876847">SUSE bug 876847</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566416" comment="emacs-22.3-4.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566417" comment="emacs-info-22.3-4.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566418" comment="emacs-x11-22.3-4.42.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3422</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3422" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3422" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3422" ref_url="https://www.suse.com/security/cve/CVE-2014-3422" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001372.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1460-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00080.html" source="SUSE-SU"/>
    <description>
    lisp/emacs-lisp/find-gc.el in GNU Emacs 24.3 and earlier allows local users to overwrite arbitrary files via a symlink attack on a temporary file under /tmp/esrc/.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3422/">CVE-2014-3422</cve>
	<bugzilla href="https://bugzilla.suse.com/876847">SUSE bug 876847</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566416" comment="emacs-22.3-4.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566417" comment="emacs-info-22.3-4.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566418" comment="emacs-x11-22.3-4.42.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3423</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3423" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3423" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3423" ref_url="https://www.suse.com/security/cve/CVE-2014-3423" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001372.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1460-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00080.html" source="SUSE-SU"/>
    <description>
    lisp/net/browse-url.el in GNU Emacs 24.3 and earlier allows local users to overwrite arbitrary files via a symlink attack on a /tmp/Mosaic.##### temporary file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3423/">CVE-2014-3423</cve>
	<bugzilla href="https://bugzilla.suse.com/876847">SUSE bug 876847</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566416" comment="emacs-22.3-4.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566417" comment="emacs-info-22.3-4.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566418" comment="emacs-x11-22.3-4.42.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3424</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3424" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3424" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3424" ref_url="https://www.suse.com/security/cve/CVE-2014-3424" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001372.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1460-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00080.html" source="SUSE-SU"/>
    <description>
    lisp/net/tramp-sh.el in GNU Emacs 24.3 and earlier allows local users to overwrite arbitrary files via a symlink attack on a /tmp/tramp.##### temporary file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3424/">CVE-2014-3424</cve>
	<bugzilla href="https://bugzilla.suse.com/876847">SUSE bug 876847</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566416" comment="emacs-22.3-4.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566417" comment="emacs-info-22.3-4.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566418" comment="emacs-x11-22.3-4.42.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3461</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3461" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3461" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3461" ref_url="https://www.suse.com/security/cve/CVE-2014-3461" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001032.html" source="SUSE-SU"/>
    <description>
    hw/usb/bus.c in QEMU 1.6.2 allows remote attackers to execute arbitrary code via crafted savevm data, which triggers a heap-based buffer overflow, related to "USB post load checks."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3461/">CVE-2014-3461</cve>
	<bugzilla href="https://bugzilla.suse.com/878541">SUSE bug 878541</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566778" comment="kvm-1.4.2-0.17.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3466</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3466" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3466" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3466" ref_url="https://www.suse.com/security/cve/CVE-2014-3466" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0758-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0758-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0788-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0788-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="TID7015302" ref_url="https://www.suse.com/support/kb/doc?id=7015302" source="SUSE-SU"/>
		<reference ref_id="TID7015303" ref_url="https://www.suse.com/support/kb/doc?id=7015303" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0763-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00010.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the read_server_hello function in lib/gnutls_handshake.c in GnuTLS before 3.1.25, 3.2.x before 3.2.15, and 3.3.x before 3.3.4 allows remote servers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a long session id in a ServerHello message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3466/">CVE-2014-3466</cve>
	<bugzilla href="https://bugzilla.suse.com/880730">SUSE bug 880730</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566601" comment="gnutls-2.4.1-24.39.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566602" comment="libgnutls26-2.4.1-24.39.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566603" comment="libgnutls26-32bit-2.4.1-24.39.51.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3467</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3467" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3467" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3467" ref_url="https://www.suse.com/security/cve/CVE-2014-3467" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0788-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0788-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0931-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="TID7015302" ref_url="https://www.suse.com/support/kb/doc?id=7015302" source="SUSE-SU"/>
		<reference ref_id="TID7015303" ref_url="https://www.suse.com/support/kb/doc?id=7015303" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the DER decoder in GNU Libtasn1 before 3.6, as used in GnuTLS, allow remote attackers to cause a denial of service (out-of-bounds read) via crafted ASN.1 data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3467/">CVE-2014-3467</cve>
	<bugzilla href="https://bugzilla.suse.com/880737">SUSE bug 880737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880910">SUSE bug 880910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566921" comment="libtasn1-1.5-1.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566922" comment="libtasn1-3-1.5-1.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566923" comment="libtasn1-3-32bit-1.5-1.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3468</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3468" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3468" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3468" ref_url="https://www.suse.com/security/cve/CVE-2014-3468" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0788-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0788-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0931-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="TID7015302" ref_url="https://www.suse.com/support/kb/doc?id=7015302" source="SUSE-SU"/>
		<reference ref_id="TID7015303" ref_url="https://www.suse.com/support/kb/doc?id=7015303" source="SUSE-SU"/>
    <description>
    The asn1_get_bit_der function in GNU Libtasn1 before 3.6 does not properly report an error when a negative bit length is identified, which allows context-dependent attackers to cause out-of-bounds access via crafted ASN.1 data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3468/">CVE-2014-3468</cve>
	<bugzilla href="https://bugzilla.suse.com/880735">SUSE bug 880735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880910">SUSE bug 880910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566921" comment="libtasn1-1.5-1.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566922" comment="libtasn1-3-1.5-1.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566923" comment="libtasn1-3-32bit-1.5-1.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3469</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3469" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3469" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3469" ref_url="https://www.suse.com/security/cve/CVE-2014-3469" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0788-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0788-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0931-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="TID7015302" ref_url="https://www.suse.com/support/kb/doc?id=7015302" source="SUSE-SU"/>
		<reference ref_id="TID7015303" ref_url="https://www.suse.com/support/kb/doc?id=7015303" source="SUSE-SU"/>
    <description>
    The (1) asn1_read_value_type and (2) asn1_read_value functions in GNU Libtasn1 before 3.6 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via a NULL value in an ivalue argument.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3469/">CVE-2014-3469</cve>
	<bugzilla href="https://bugzilla.suse.com/880738">SUSE bug 880738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880910">SUSE bug 880910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566921" comment="libtasn1-1.5-1.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566922" comment="libtasn1-3-1.5-1.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566923" comment="libtasn1-3-32bit-1.5-1.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3470</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3470" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3470" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3470" ref_url="https://www.suse.com/security/cve/CVE-2014-3470" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0759-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0759-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0761-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0762-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1557-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="TID7008708" ref_url="https://www.suse.com/support/kb/doc/?id=7008708" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="TID7015162" ref_url="https://www.suse.com/support/kb/doc?id=7015162" source="SUSE-SU"/>
		<reference ref_id="TID7015189" ref_url="https://www.suse.com/support/kb/doc?id=7015189" source="SUSE-SU"/>
		<reference ref_id="TID7015264" ref_url="https://www.suse.com/support/kb/doc?id=7015264" source="SUSE-SU"/>
		<reference ref_id="TID7015300" ref_url="https://www.suse.com/support/kb/doc?id=7015300" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0765-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h, when an anonymous ECDH cipher suite is used, allows remote attackers to cause a denial of service (NULL pointer dereference and client crash) by triggering a NULL certificate value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-12"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3470/">CVE-2014-3470</cve>
	<bugzilla href="https://bugzilla.suse.com/880891">SUSE bug 880891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883126">SUSE bug 883126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885777">SUSE bug 885777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590584" comment="compat-openssl097g-0.9.7g-146.22.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590585" comment="compat-openssl097g-32bit-0.9.7g-146.22.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592639" comment="libopenssl0_9_8-0.9.8j-0.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592640" comment="libopenssl0_9_8-32bit-0.9.8j-0.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592641" comment="openssl-0.9.8j-0.58.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3471</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3471" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3471" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3471" ref_url="https://www.suse.com/security/cve/CVE-2014-3471" source="SUSE CVE"/>
    <description>
    Use-after-free vulnerability in hw/pci/pcie.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (QEMU instance crash) via hotplug and hotunplug operations of Virtio block devices.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3471/">CVE-2014-3471</cve>
	<bugzilla href="https://bugzilla.suse.com/883826">SUSE bug 883826</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334251" comment="kvm is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3477</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3477" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3477" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3477" ref_url="https://www.suse.com/security/cve/CVE-2014-3477" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000891.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0821-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0874-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00012.html" source="SUSE-SU"/>
    <description>
    The dbus-daemon in D-Bus 1.2.x through 1.4.x, 1.6.x before 1.6.20, and 1.8.x before 1.8.4, sends an AccessDenied error to the service instead of a client when the client is prohibited from accessing the service, which allows local users to cause a denial of service (initialization failure and exit) or possibly conduct a side-channel attack via a D-Bus message to an inactive service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3477/">CVE-2014-3477</cve>
	<bugzilla href="https://bugzilla.suse.com/1010769">SUSE bug 1010769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/881137">SUSE bug 881137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592883" comment="dbus-1-1.2.10-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592884" comment="dbus-1-32bit-1.2.10-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592885" comment="dbus-1-x11-1.2.10-3.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3493</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3493" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3493" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3493" ref_url="https://www.suse.com/security/cve/CVE-2014-3493" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000917.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0857-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0859-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0944-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00034.html" source="SUSE-SU"/>
    <description>
    The push_ascii function in smbd in Samba 3.6.x before 3.6.24, 4.0.x before 4.0.19, and 4.1.x before 4.1.9 allows remote authenticated users to cause a denial of service (memory corruption and daemon crash) via an attempt to read a Unicode pathname without specifying use of Unicode, leading to a character-set conversion failure that triggers an invalid pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3493/">CVE-2014-3493</cve>
	<bugzilla href="https://bugzilla.suse.com/878642">SUSE bug 878642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880962">SUSE bug 880962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883758">SUSE bug 883758</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592471" comment="libldb1-3.6.3-0.52.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592472" comment="libldb1-32bit-3.6.3-0.52.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592473" comment="libsmbclient0-3.6.3-0.52.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592474" comment="libsmbclient0-32bit-3.6.3-0.52.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592475" comment="libtalloc2-3.6.3-0.52.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592476" comment="libtalloc2-32bit-3.6.3-0.52.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592477" comment="libtdb1-3.6.3-0.52.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592478" comment="libtdb1-32bit-3.6.3-0.52.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592479" comment="libtevent0-3.6.3-0.52.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592480" comment="libtevent0-32bit-3.6.3-0.52.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592481" comment="libwbclient0-3.6.3-0.52.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592482" comment="libwbclient0-32bit-3.6.3-0.52.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592483" comment="samba-3.6.3-0.52.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592484" comment="samba-32bit-3.6.3-0.52.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592485" comment="samba-client-3.6.3-0.52.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592486" comment="samba-client-32bit-3.6.3-0.52.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592487" comment="samba-doc-3.6.3-0.52.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592488" comment="samba-krb-printing-3.6.3-0.52.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592489" comment="samba-winbind-3.6.3-0.52.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592490" comment="samba-winbind-32bit-3.6.3-0.52.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3505</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3505" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3505" ref_url="https://www.suse.com/security/cve/CVE-2014-3505" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001012.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1052-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (application crash) via crafted DTLS packets that trigger an error condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3505/">CVE-2014-3505</cve>
	<bugzilla href="https://bugzilla.suse.com/890759">SUSE bug 890759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890764">SUSE bug 890764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890767">SUSE bug 890767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592891" comment="libopenssl0_9_8-0.9.8j-0.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592892" comment="libopenssl0_9_8-32bit-0.9.8j-0.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592893" comment="openssl-0.9.8j-0.62.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3506</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3506" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3506" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3506" ref_url="https://www.suse.com/security/cve/CVE-2014-3506" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001012.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1052-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (memory consumption) via crafted DTLS handshake messages that trigger memory allocations corresponding to large length values.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3506/">CVE-2014-3506</cve>
	<bugzilla href="https://bugzilla.suse.com/890759">SUSE bug 890759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890764">SUSE bug 890764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890768">SUSE bug 890768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592891" comment="libopenssl0_9_8-0.9.8j-0.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592892" comment="libopenssl0_9_8-32bit-0.9.8j-0.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592893" comment="openssl-0.9.8j-0.62.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3507</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3507" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3507" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3507" ref_url="https://www.suse.com/security/cve/CVE-2014-3507" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001012.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1052-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    Memory leak in d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (memory consumption) via zero-length DTLS fragments that trigger improper handling of the return value of a certain insert function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3507/">CVE-2014-3507</cve>
	<bugzilla href="https://bugzilla.suse.com/890759">SUSE bug 890759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890764">SUSE bug 890764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890769">SUSE bug 890769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592891" comment="libopenssl0_9_8-0.9.8j-0.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592892" comment="libopenssl0_9_8-32bit-0.9.8j-0.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592893" comment="openssl-0.9.8j-0.62.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3508</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3508" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3508" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3508" ref_url="https://www.suse.com/security/cve/CVE-2014-3508" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1557-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001094.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="TID7014420" ref_url="https://www.suse.com/support/kb/doc/?id=7014420" source="SUSE-SU"/>
		<reference ref_id="TID7016328" ref_url="https://www.suse.com/support/kb/doc/?id=7016328" source="SUSE-SU"/>
		<reference ref_id="TID7016875" ref_url="https://www.suse.com/support/kb/doc/?id=7016875" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1052-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    The OBJ_obj2txt function in crypto/objects/obj_dat.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i, when pretty printing is used, does not ensure the presence of '\0' characters, which allows context-dependent attackers to obtain sensitive information from process stack memory by reading output from X509_name_oneline, X509_name_print_ex, and unspecified other functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3508/">CVE-2014-3508</cve>
	<bugzilla href="https://bugzilla.suse.com/890759">SUSE bug 890759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890764">SUSE bug 890764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950708">SUSE bug 950708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590584" comment="compat-openssl097g-0.9.7g-146.22.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590585" comment="compat-openssl097g-32bit-0.9.7g-146.22.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592891" comment="libopenssl0_9_8-0.9.8j-0.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592892" comment="libopenssl0_9_8-32bit-0.9.8j-0.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592893" comment="openssl-0.9.8j-0.62.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3510</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3510" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3510" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3510" ref_url="https://www.suse.com/security/cve/CVE-2014-3510" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001012.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1052-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote DTLS servers to cause a denial of service (NULL pointer dereference and client application crash) via a crafted handshake message in conjunction with a (1) anonymous DH or (2) anonymous ECDH ciphersuite.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3510/">CVE-2014-3510</cve>
	<bugzilla href="https://bugzilla.suse.com/890759">SUSE bug 890759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890764">SUSE bug 890764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890770">SUSE bug 890770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592891" comment="libopenssl0_9_8-0.9.8j-0.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592892" comment="libopenssl0_9_8-32bit-0.9.8j-0.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592893" comment="openssl-0.9.8j-0.62.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3537</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3537" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3537" ref_url="https://www.suse.com/security/cve/CVE-2014-3537" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000963.html" source="SUSE-SU"/>
    <description>
    The web interface in CUPS before 1.7.4 allows local users in the lp group to read arbitrary files via a symlink attack on a file in /var/cache/cups/rss/.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3537/">CVE-2014-3537</cve>
	<bugzilla href="https://bugzilla.suse.com/887240">SUSE bug 887240</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566380" comment="cups-1.3.9-8.46.52.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566381" comment="cups-client-1.3.9-8.46.52.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566382" comment="cups-libs-1.3.9-8.46.52.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566383" comment="cups-libs-32bit-1.3.9-8.46.52.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3564</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3564" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3564" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3564" ref_url="https://www.suse.com/security/cve/CVE-2014-3564" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000977.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1039-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00026.html" source="SUSE-SU"/>
    <description>
    Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3564/">CVE-2014-3564</cve>
	<bugzilla href="https://bugzilla.suse.com/890123">SUSE bug 890123</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566614" comment="gpgme-1.1.6-25.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566615" comment="libgpgme11-1.1.6-25.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3565</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3565" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3565" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3565" ref_url="https://www.suse.com/security/cve/CVE-2014-3565" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000988.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1108-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00013.html" source="SUSE-SU"/>
    <description>
    snmplib/mib.c in net-snmp 5.7.0 and earlier, when the -OQ option is used, allows remote attackers to cause a denial of service (snmptrapd crash) via a crafted SNMP trap message, which triggers a conversion to the variable type designated in the MIB file, as demonstrated by a NULL type in an ifMtu trap message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-12"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3565/">CVE-2014-3565</cve>
	<bugzilla href="https://bugzilla.suse.com/894361">SUSE bug 894361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969779">SUSE bug 969779</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566916" comment="libsnmp15-5.4.2.1-8.12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563659" comment="libsnmp15-32bit-5.4.2.1-8.12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566917" comment="net-snmp-5.4.2.1-8.12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566918" comment="perl-SNMP-5.4.2.1-8.12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566919" comment="snmp-mibs-5.4.2.1-8.12.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3566</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3566" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1357-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1361-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1387-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1409-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1549-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1557-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1457-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002292.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7010166" ref_url="https://www.suse.com/support/kb/doc/?id=7010166" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="TID7014420" ref_url="https://www.suse.com/support/kb/doc/?id=7014420" source="SUSE-SU"/>
		<reference ref_id="TID7015773" ref_url="https://www.suse.com/support/kb/doc?id=7015773" source="SUSE-SU"/>
		<reference ref_id="TID7015777" ref_url="https://www.suse.com/support/kb/doc/?id=7015777" source="SUSE-SU"/>
		<reference ref_id="TID7015785" ref_url="https://www.suse.com/support/kb/doc/?id=7015785" source="SUSE-SU"/>
		<reference ref_id="TID7015793" ref_url="https://www.suse.com/support/kb/doc/?id=7015793" source="SUSE-SU"/>
		<reference ref_id="TID7015804" ref_url="https://www.suse.com/support/kb/doc/?id=7015804" source="SUSE-SU"/>
		<reference ref_id="TID7015805" ref_url="https://www.suse.com/support/kb/doc/?id=7015805" source="SUSE-SU"/>
		<reference ref_id="TID7015809" ref_url="https://www.suse.com/support/kb/doc/?id=7015809" source="SUSE-SU"/>
		<reference ref_id="TID7015826" ref_url="https://www.suse.com/support/kb/doc/?id=7015826" source="SUSE-SU"/>
		<reference ref_id="TID7015854" ref_url="https://www.suse.com/support/kb/doc/?id=7015854" source="SUSE-SU"/>
		<reference ref_id="TID7015987" ref_url="https://www.suse.com/support/kb/doc/?id=7015987" source="SUSE-SU"/>
		<reference ref_id="TID7016067" ref_url="https://www.suse.com/support/kb/doc/?id=7016067" source="SUSE-SU"/>
		<reference ref_id="TID7016068" ref_url="https://www.suse.com/support/kb/doc/?id=7016068" source="SUSE-SU"/>
		<reference ref_id="TID7016144" ref_url="https://www.suse.com/support/kb/doc/?id=7016144" source="SUSE-SU"/>
		<reference ref_id="TID7016205" ref_url="https://www.suse.com/support/kb/doc/?id=7016205" source="SUSE-SU"/>
		<reference ref_id="TID7016299" ref_url="https://www.suse.com/support/kb/doc?id=7016299" source="SUSE-SU"/>
		<reference ref_id="TID7016328" ref_url="https://www.suse.com/support/kb/doc/?id=7016328" source="SUSE-SU"/>
		<reference ref_id="TID7016351" ref_url="https://www.suse.com/support/kb/doc/?id=7016351" source="SUSE-SU"/>
		<reference ref_id="TID7016875" ref_url="https://www.suse.com/support/kb/doc/?id=7016875" source="SUSE-SU"/>
		<reference ref_id="TID7017332" ref_url="https://www.suse.com/support/kb/doc/?id=7017332" source="SUSE-SU"/>
		<reference ref_id="TID7021300" ref_url="https://www.suse.com/support/kb/doc/?id=7021300" source="SUSE-SU"/>
		<reference ref_id="TID7021433" ref_url="https://www.suse.com/support/kb/doc/?id=7021433" source="SUSE-SU"/>
		<reference ref_id="TID7021975" ref_url="https://www.suse.com/support/kb/doc/?id=7021975" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1384-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1395-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0190-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2877-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0980-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the "POODLE" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566</cve>
	<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031023">SUSE bug 1031023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901223">SUSE bug 901223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901254">SUSE bug 901254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901277">SUSE bug 901277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901748">SUSE bug 901748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901757">SUSE bug 901757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901759">SUSE bug 901759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901889">SUSE bug 901889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901968">SUSE bug 901968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902229">SUSE bug 902229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902233">SUSE bug 902233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902476">SUSE bug 902476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903405">SUSE bug 903405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903684">SUSE bug 903684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914041">SUSE bug 914041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590584" comment="compat-openssl097g-0.9.7g-146.22.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590585" comment="compat-openssl097g-32bit-0.9.7g-146.22.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566419" comment="evolution-data-server-2.28.2-0.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566420" comment="evolution-data-server-32bit-2.28.2-0.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566421" comment="evolution-data-server-lang-2.28.2-0.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592957" comment="java-1_7_0-openjdk-1.7.0.75-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592958" comment="java-1_7_0-openjdk-demo-1.7.0.75-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592959" comment="java-1_7_0-openjdk-devel-1.7.0.75-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566844" comment="libopenssl0_9_8-0.9.8j-0.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566845" comment="libopenssl0_9_8-32bit-0.9.8j-0.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566933" comment="libwsman1-2.2.3-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566846" comment="openssl-0.9.8j-0.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566934" comment="openwsman-client-2.2.3-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566935" comment="openwsman-server-2.2.3-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592960" comment="pure-ftpd-1.0.22-3.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592961" comment="suseRegister-1.4-1.35.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3567</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3567" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3567" ref_url="https://www.suse.com/security/cve/CVE-2014-3567" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1357-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1361-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1387-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001084.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1426-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-24"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3567/">CVE-2014-3567</cve>
	<bugzilla href="https://bugzilla.suse.com/877506">SUSE bug 877506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901277">SUSE bug 901277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566844" comment="libopenssl0_9_8-0.9.8j-0.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566845" comment="libopenssl0_9_8-32bit-0.9.8j-0.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566846" comment="openssl-0.9.8j-0.66.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3568</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3568" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3568" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3568" ref_url="https://www.suse.com/security/cve/CVE-2014-3568" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1357-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1361-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1387-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1409-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1557-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001094.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1426-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j does not properly enforce the no-ssl3 build option, which allows remote attackers to bypass intended access restrictions via an SSL 3.0 handshake, related to s23_clnt.c and s23_srvr.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-24"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3568/">CVE-2014-3568</cve>
	<bugzilla href="https://bugzilla.suse.com/901277">SUSE bug 901277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911399">SUSE bug 911399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986238">SUSE bug 986238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590584" comment="compat-openssl097g-0.9.7g-146.22.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590585" comment="compat-openssl097g-32bit-0.9.7g-146.22.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566844" comment="libopenssl0_9_8-0.9.8j-0.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566845" comment="libopenssl0_9_8-32bit-0.9.8j-0.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566846" comment="openssl-0.9.8j-0.66.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3569</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3569" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3569" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3569" ref_url="https://www.suse.com/security/cve/CVE-2014-3569" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="TID7016027" ref_url="https://www.suse.com/support/kb/doc/?id=7016027" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0130-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 0.9.8zc, 1.0.0o, and 1.0.1j does not properly handle attempts to use unsupported protocols, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an unexpected handshake, as demonstrated by an SSLv3 handshake to a no-ssl3 application with certain error handling.  NOTE: this issue became relevant after the CVE-2014-3568 fix.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3569/">CVE-2014-3569</cve>
	<bugzilla href="https://bugzilla.suse.com/911399">SUSE bug 911399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986238">SUSE bug 986238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592963" comment="libmysql55client18-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592964" comment="libmysql55client18-32bit-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592965" comment="libmysql55client_r18-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592966" comment="libmysql55client_r18-32bit-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590297" comment="libmysqlclient15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590298" comment="libmysqlclient15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590299" comment="libmysqlclient_r15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590300" comment="libmysqlclient_r15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592967" comment="mysql-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592968" comment="mysql-client-5.5.43-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3570</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3570" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3570" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3570" ref_url="https://www.suse.com/security/cve/CVE-2014-3570" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0172-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0130-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    The BN_sqr implementation in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not properly calculate the square of a BIGNUM value, which might make it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors, related to crypto/bn/asm/mips.pl, crypto/bn/asm/x86_64-gcc.c, and crypto/bn/bn_asm.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3570/">CVE-2014-3570</cve>
	<bugzilla href="https://bugzilla.suse.com/912296">SUSE bug 912296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944456">SUSE bug 944456</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592978" comment="compat-openssl097g-0.9.7g-146.22.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592979" comment="compat-openssl097g-32bit-0.9.7g-146.22.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592963" comment="libmysql55client18-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592964" comment="libmysql55client18-32bit-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592965" comment="libmysql55client_r18-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592966" comment="libmysql55client_r18-32bit-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590297" comment="libmysqlclient15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590298" comment="libmysqlclient15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590299" comment="libmysqlclient_r15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590300" comment="libmysqlclient_r15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592980" comment="libopenssl0_9_8-0.9.8j-0.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592981" comment="libopenssl0_9_8-32bit-0.9.8j-0.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592967" comment="mysql-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592968" comment="mysql-client-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592982" comment="openssl-0.9.8j-0.68.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3571</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3571" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3571" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3571" ref_url="https://www.suse.com/security/cve/CVE-2014-3571" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0172-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0130-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted DTLS message that is processed with a different read operation for the handshake header than for the handshake body, related to the dtls1_get_record function in d1_pkt.c and the ssl3_read_n function in s3_pkt.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3571/">CVE-2014-3571</cve>
	<bugzilla href="https://bugzilla.suse.com/912294">SUSE bug 912294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592963" comment="libmysql55client18-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592964" comment="libmysql55client18-32bit-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592965" comment="libmysql55client_r18-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592966" comment="libmysql55client_r18-32bit-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590297" comment="libmysqlclient15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590298" comment="libmysqlclient15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590299" comment="libmysqlclient_r15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590300" comment="libmysqlclient_r15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592980" comment="libopenssl0_9_8-0.9.8j-0.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592981" comment="libopenssl0_9_8-32bit-0.9.8j-0.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592967" comment="mysql-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592968" comment="mysql-client-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592982" comment="openssl-0.9.8j-0.68.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3572</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3572" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3572" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3572" ref_url="https://www.suse.com/security/cve/CVE-2014-3572" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0172-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0130-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct ECDHE-to-ECDH downgrade attacks and trigger a loss of forward secrecy by omitting the ServerKeyExchange message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3572/">CVE-2014-3572</cve>
	<bugzilla href="https://bugzilla.suse.com/912015">SUSE bug 912015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592978" comment="compat-openssl097g-0.9.7g-146.22.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592979" comment="compat-openssl097g-32bit-0.9.7g-146.22.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592963" comment="libmysql55client18-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592964" comment="libmysql55client18-32bit-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592965" comment="libmysql55client_r18-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592966" comment="libmysql55client_r18-32bit-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590297" comment="libmysqlclient15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590298" comment="libmysqlclient15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590299" comment="libmysqlclient_r15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590300" comment="libmysqlclient_r15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592980" comment="libopenssl0_9_8-0.9.8j-0.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592981" comment="libopenssl0_9_8-32bit-0.9.8j-0.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592967" comment="mysql-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592968" comment="mysql-client-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592982" comment="openssl-0.9.8j-0.68.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3575</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3575" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3575" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3575" ref_url="https://www.suse.com/security/cve/CVE-2014-3575" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1116-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00018.html" source="SUSE-SU"/>
    <description>
    The OLE preview generation in Apache OpenOffice before 4.1.1 and OpenOffice.org (OOo) might allow remote attackers to embed arbitrary data into documents via crafted OLE objects.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3575/">CVE-2014-3575</cve>
	<bugzilla href="https://bugzilla.suse.com/893141">SUSE bug 893141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934423">SUSE bug 934423</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009563580" comment="libreoffice-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563581" comment="libreoffice-base-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563582" comment="libreoffice-base-drivers-postgresql-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563583" comment="libreoffice-base-extensions-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563585" comment="libreoffice-calc-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563586" comment="libreoffice-calc-extensions-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563587" comment="libreoffice-draw-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563588" comment="libreoffice-draw-extensions-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563589" comment="libreoffice-filters-optional-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563590" comment="libreoffice-gnome-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563591" comment="libreoffice-help-cs-4.0.3.3.26-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563592" comment="libreoffice-help-da-4.0.3.3.26-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563593" comment="libreoffice-help-de-4.0.3.3.26-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563594" comment="libreoffice-help-en-GB-4.0.3.3.26-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563595" comment="libreoffice-help-en-US-4.0.3.3.26-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563596" comment="libreoffice-help-es-4.0.3.3.26-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563597" comment="libreoffice-help-fr-4.0.3.3.26-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563598" comment="libreoffice-help-gu-IN-4.0.3.3.26-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563599" comment="libreoffice-help-hi-IN-4.0.3.3.26-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563600" comment="libreoffice-help-hu-4.0.3.3.26-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563601" comment="libreoffice-help-it-4.0.3.3.26-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563602" comment="libreoffice-help-ja-4.0.3.3.26-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563603" comment="libreoffice-help-ko-4.0.3.3.26-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563604" comment="libreoffice-help-nl-4.0.3.3.26-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563605" comment="libreoffice-help-pl-4.0.3.3.26-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563606" comment="libreoffice-help-pt-4.0.3.3.26-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563607" comment="libreoffice-help-pt-BR-4.0.3.3.26-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563608" comment="libreoffice-help-ru-4.0.3.3.26-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563609" comment="libreoffice-help-sv-4.0.3.3.26-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563610" comment="libreoffice-help-zh-CN-4.0.3.3.26-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563611" comment="libreoffice-help-zh-TW-4.0.3.3.26-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563612" comment="libreoffice-icon-themes-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563613" comment="libreoffice-impress-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563614" comment="libreoffice-impress-extensions-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563615" comment="libreoffice-kde-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563616" comment="libreoffice-kde4-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563617" comment="libreoffice-l10n-af-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563618" comment="libreoffice-l10n-ar-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563619" comment="libreoffice-l10n-ca-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563620" comment="libreoffice-l10n-cs-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563621" comment="libreoffice-l10n-da-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563622" comment="libreoffice-l10n-de-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563624" comment="libreoffice-l10n-en-GB-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563625" comment="libreoffice-l10n-es-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563626" comment="libreoffice-l10n-fi-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563627" comment="libreoffice-l10n-fr-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563628" comment="libreoffice-l10n-gu-IN-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563629" comment="libreoffice-l10n-hi-IN-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563630" comment="libreoffice-l10n-hu-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563631" comment="libreoffice-l10n-it-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563632" comment="libreoffice-l10n-ja-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563633" comment="libreoffice-l10n-ko-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563634" comment="libreoffice-l10n-nb-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563635" comment="libreoffice-l10n-nl-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563636" comment="libreoffice-l10n-nn-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563637" comment="libreoffice-l10n-pl-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563639" comment="libreoffice-l10n-pt-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563640" comment="libreoffice-l10n-pt-BR-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563641" comment="libreoffice-l10n-ru-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563642" comment="libreoffice-l10n-sk-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563643" comment="libreoffice-l10n-sv-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563644" comment="libreoffice-l10n-xh-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563645" comment="libreoffice-l10n-zh-CN-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563646" comment="libreoffice-l10n-zh-TW-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563647" comment="libreoffice-l10n-zu-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563648" comment="libreoffice-mailmerge-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563649" comment="libreoffice-math-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563650" comment="libreoffice-mono-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563651" comment="libreoffice-officebean-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563652" comment="libreoffice-pyuno-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563654" comment="libreoffice-writer-4.0.3.3.26-0.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563655" comment="libreoffice-writer-extensions-4.0.3.3.26-0.6.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3591</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3591" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3591" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3591" ref_url="https://www.suse.com/security/cve/CVE-2014-3591" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001602.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1503-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-09/msg00005.html" source="SUSE-SU"/>
    <description>
    Libgcrypt before 1.6.3 and GnuPG before 1.4.19 does not implement ciphertext blinding for Elgamal decryption, which allows physically proximate attackers to obtain the server's private key by determining factors using crafted ciphertext and the fluctuations in the electromagnetic field during multiplication.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3591/">CVE-2014-3591</cve>
	<bugzilla href="https://bugzilla.suse.com/920057">SUSE bug 920057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949135">SUSE bug 949135</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566821" comment="libgcrypt11-1.5.0-0.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566822" comment="libgcrypt11-32bit-1.5.0-0.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333951" comment="gpg2 is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566821" comment="libgcrypt11-1.5.0-0.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566822" comment="libgcrypt11-32bit-1.5.0-0.19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3601</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3601" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3601" ref_url="https://www.suse.com/security/cve/CVE-2014-3601" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    The kvm_iommu_map_pages function in virt/kvm/iommu.c in the Linux kernel through 3.16.1 miscalculates the number of pages during the handling of a mapping failure, which allows guest OS users to (1) cause a denial of service (host OS memory corruption) or possibly have unspecified other impact by triggering a large gfn value or (2) cause a denial of service (host OS memory consumption) by triggering a small gfn value that leads to permanently pinned pages.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3601/">CVE-2014-3601</cve>
	<bugzilla href="https://bugzilla.suse.com/892782">SUSE bug 892782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902675">SUSE bug 902675</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590044" comment="kernel-bigsmp-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590045" comment="kernel-default-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590046" comment="kernel-default-base-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590047" comment="kernel-default-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590048" comment="kernel-default-extra-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590049" comment="kernel-pae-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590050" comment="kernel-pae-base-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590051" comment="kernel-pae-devel-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590052" comment="kernel-pae-extra-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590053" comment="kernel-source-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590054" comment="kernel-syms-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590055" comment="kernel-trace-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590056" comment="kernel-xen-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590057" comment="kernel-xen-base-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590058" comment="kernel-xen-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590059" comment="kernel-xen-extra-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590060" comment="xen-kmp-default-4.2.5_02_3.0.101_0.46-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590061" comment="xen-kmp-pae-4.2.5_02_3.0.101_0.42-0.7.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3610</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3610" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3610" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3610" ref_url="https://www.suse.com/security/cve/CVE-2014-3610" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    The WRMSR processing functionality in the KVM subsystem in the Linux kernel through 3.17.2 does not properly handle the writing of a non-canonical address to a model-specific register, which allows guest OS users to cause a denial of service (host OS crash) by leveraging guest OS privileges, related to the wrmsr_interception function in arch/x86/kvm/svm.c and the handle_wrmsr function in arch/x86/kvm/vmx.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3610/">CVE-2014-3610</cve>
	<bugzilla href="https://bugzilla.suse.com/899192">SUSE bug 899192</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590044" comment="kernel-bigsmp-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590045" comment="kernel-default-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590046" comment="kernel-default-base-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590047" comment="kernel-default-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590048" comment="kernel-default-extra-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590049" comment="kernel-pae-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590050" comment="kernel-pae-base-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590051" comment="kernel-pae-devel-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590052" comment="kernel-pae-extra-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590053" comment="kernel-source-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590054" comment="kernel-syms-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590055" comment="kernel-trace-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590056" comment="kernel-xen-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590057" comment="kernel-xen-base-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590058" comment="kernel-xen-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590059" comment="kernel-xen-extra-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590060" comment="xen-kmp-default-4.2.5_02_3.0.101_0.46-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590061" comment="xen-kmp-pae-4.2.5_02_3.0.101_0.42-0.7.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3613</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3613" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3613" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3613" ref_url="https://www.suse.com/security/cve/CVE-2014-3613" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001199.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1139-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00024.html" source="SUSE-SU"/>
    <description>
    cURL and libcurl before 7.38.0 does not properly handle IP addresses in cookie domain names, which allows remote attackers to set cookies for or send arbitrary cookies to certain sites, as demonstrated by a site at 192.168.0.1 setting cookies for a site at 127.168.0.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3613/">CVE-2014-3613</cve>
	<bugzilla href="https://bugzilla.suse.com/894575">SUSE bug 894575</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566390" comment="curl-7.19.7-1.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566391" comment="libcurl4-7.19.7-1.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566392" comment="libcurl4-32bit-7.19.7-1.40.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3618</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3618" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3618" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3618" ref_url="https://www.suse.com/security/cve/CVE-2014-3618" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1137-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1114-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00008.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in formisc.c in formail in procmail 3.22 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted email header, related to "unbalanced quotes."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-10"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3618/">CVE-2014-3618</cve>
	<bugzilla href="https://bugzilla.suse.com/1068648">SUSE bug 1068648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/894999">SUSE bug 894999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898303">SUSE bug 898303</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567059" comment="procmail-3.22-240.8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3633</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3633" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3633" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3633" ref_url="https://www.suse.com/security/cve/CVE-2014-3633" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001247.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1290-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1293-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-10/msg00017.html" source="SUSE-SU"/>
    <description>
    The qemuDomainGetBlockIoTune function in qemu/qemu_driver.c in libvirt before 1.2.9, when a disk has been hot-plugged or removed from the live image, allows remote attackers to cause a denial of service (crash) or read sensitive heap information via a crafted blkiotune query, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3633/">CVE-2014-3633</cve>
	<bugzilla href="https://bugzilla.suse.com/897783">SUSE bug 897783</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566781" comment="kvm-1.4.2-0.21.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566782" comment="libvirt-1.0.5.9-0.19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566783" comment="libvirt-client-1.0.5.9-0.19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566784" comment="libvirt-client-32bit-1.0.5.9-0.19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566785" comment="libvirt-doc-1.0.5.9-0.19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566786" comment="libvirt-python-1.0.5.9-0.19.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3638</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3638" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3638" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3638" ref_url="https://www.suse.com/security/cve/CVE-2014-3638" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1146-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1228-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1239-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html" source="SUSE-SU"/>
    <description>
    The bus_connections_check_reply function in config-parser.c in D-Bus before 1.6.24 and 1.8.x before 1.8.8 allows local users to cause a denial of service (CPU consumption) via a large number of method calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3638/">CVE-2014-3638</cve>
	<bugzilla href="https://bugzilla.suse.com/896453">SUSE bug 896453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903055">SUSE bug 903055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903057">SUSE bug 903057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566393" comment="dbus-1-1.2.10-3.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566394" comment="dbus-1-32bit-1.2.10-3.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566395" comment="dbus-1-x11-1.2.10-3.31.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3640</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3640" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3640" ref_url="https://www.suse.com/security/cve/CVE-2014-3640" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
    <description>
    The sosendto function in slirp/udp.c in QEMU before 2.1.2 allows local users to cause a denial of service (NULL pointer dereference) by sending a udp packet with a value of 0 in the source port and address, which triggers access of an uninitialized socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3640/">CVE-2014-3640</cve>
	<bugzilla href="https://bugzilla.suse.com/897654">SUSE bug 897654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965112">SUSE bug 965112</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566781" comment="kvm-1.4.2-0.21.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566782" comment="libvirt-1.0.5.9-0.19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566783" comment="libvirt-client-1.0.5.9-0.19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566784" comment="libvirt-client-32bit-1.0.5.9-0.19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566785" comment="libvirt-doc-1.0.5.9-0.19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566786" comment="libvirt-python-1.0.5.9-0.19.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567467" comment="xen-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567468" comment="xen-doc-html-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567469" comment="xen-kmp-default-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567470" comment="xen-kmp-pae-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567471" comment="xen-libs-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567472" comment="xen-libs-32bit-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567473" comment="xen-tools-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567474" comment="xen-tools-domU-4.4.4_02-32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3646</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3646" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3646" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3646" ref_url="https://www.suse.com/security/cve/CVE-2014-3646" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel through 3.17.2 does not have an exit handler for the INVVPID instruction, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3646/">CVE-2014-3646</cve>
	<bugzilla href="https://bugzilla.suse.com/899192">SUSE bug 899192</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590044" comment="kernel-bigsmp-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590045" comment="kernel-default-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590046" comment="kernel-default-base-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590047" comment="kernel-default-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590048" comment="kernel-default-extra-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590049" comment="kernel-pae-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590050" comment="kernel-pae-base-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590051" comment="kernel-pae-devel-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590052" comment="kernel-pae-extra-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590053" comment="kernel-source-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590054" comment="kernel-syms-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590055" comment="kernel-trace-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590056" comment="kernel-xen-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590057" comment="kernel-xen-base-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590058" comment="kernel-xen-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590059" comment="kernel-xen-extra-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590060" comment="xen-kmp-default-4.2.5_02_3.0.101_0.46-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590061" comment="xen-kmp-pae-4.2.5_02_3.0.101_0.42-0.7.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3647</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3647" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3647" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3647" ref_url="https://www.suse.com/security/cve/CVE-2014-3647" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    arch/x86/kvm/emulate.c in the KVM subsystem in the Linux kernel through 3.17.2 does not properly perform RIP changes, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2014-3647/">CVE-2014-3647</cve>
	<bugzilla href="https://bugzilla.suse.com/1013038">SUSE bug 1013038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134834">SUSE bug 1134834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899192">SUSE bug 899192</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590044" comment="kernel-bigsmp-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590045" comment="kernel-default-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590046" comment="kernel-default-base-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590047" comment="kernel-default-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590048" comment="kernel-default-extra-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590049" comment="kernel-pae-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590050" comment="kernel-pae-base-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590051" comment="kernel-pae-devel-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590052" comment="kernel-pae-extra-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590053" comment="kernel-source-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590054" comment="kernel-syms-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590055" comment="kernel-trace-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590056" comment="kernel-xen-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590057" comment="kernel-xen-base-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590058" comment="kernel-xen-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590059" comment="kernel-xen-extra-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590060" comment="xen-kmp-default-4.2.5_02_3.0.101_0.46-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590061" comment="xen-kmp-pae-4.2.5_02_3.0.101_0.42-0.7.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143657" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3657</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3657" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3657" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3657" ref_url="https://www.suse.com/security/cve/CVE-2014-3657" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001247.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1290-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1293-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-10/msg00017.html" source="SUSE-SU"/>
    <description>
    The virDomainListPopulate function in conf/domain_conf.c in libvirt before 1.2.9 does not clean up the lock on the list of domains, which allows remote attackers to cause a denial of service (deadlock) via a NULL value in the second parameter in the virConnectListAllDomains API command.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3657/">CVE-2014-3657</cve>
	<bugzilla href="https://bugzilla.suse.com/897783">SUSE bug 897783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899484">SUSE bug 899484</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566781" comment="kvm-1.4.2-0.21.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566782" comment="libvirt-1.0.5.9-0.19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566783" comment="libvirt-client-1.0.5.9-0.19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566784" comment="libvirt-client-32bit-1.0.5.9-0.19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566785" comment="libvirt-doc-1.0.5.9-0.19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566786" comment="libvirt-python-1.0.5.9-0.19.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3660</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3660" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3660" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3660" ref_url="https://www.suse.com/security/cve/CVE-2014-3660" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001142.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1330-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-10/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2372-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html" source="SUSE-SU"/>
    <description>
    parser.c in libxml2 before 2.9.2 does not properly prevent entity expansion even when entity substitution has been disabled, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted XML document containing a large number of nested entity references, a variant of the "billion laughs" attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3660/">CVE-2014-3660</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901546">SUSE bug 901546</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566936" comment="libxml2-2.7.6-0.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566937" comment="libxml2-32bit-2.7.6-0.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566938" comment="libxml2-python-2.7.6-0.31.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3673</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3673" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3673" ref_url="https://www.suse.com/security/cve/CVE-2014-3673" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0529-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    The SCTP implementation in the Linux kernel through 3.17.2 allows remote attackers to cause a denial of service (system crash) via a malformed ASCONF chunk, related to net/sctp/sm_make_chunk.c and net/sctp/sm_statefuns.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3673/">CVE-2014-3673</cve>
	<bugzilla href="https://bugzilla.suse.com/902346">SUSE bug 902346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902349">SUSE bug 902349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904899">SUSE bug 904899</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590044" comment="kernel-bigsmp-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590045" comment="kernel-default-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590046" comment="kernel-default-base-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590047" comment="kernel-default-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590048" comment="kernel-default-extra-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590049" comment="kernel-pae-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590050" comment="kernel-pae-base-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590051" comment="kernel-pae-devel-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590052" comment="kernel-pae-extra-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590053" comment="kernel-source-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590054" comment="kernel-syms-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590055" comment="kernel-trace-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590056" comment="kernel-xen-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590057" comment="kernel-xen-base-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590058" comment="kernel-xen-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590059" comment="kernel-xen-extra-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590060" comment="xen-kmp-default-4.2.5_02_3.0.101_0.46-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590061" comment="xen-kmp-pae-4.2.5_02_3.0.101_0.42-0.7.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3675</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3675" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3675" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3675" ref_url="https://www.suse.com/security/cve/CVE-2014-3675" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00011.html" source="SUSE-SU"/>
    <description>
    Shim allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted DHCPv6 packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3675/">CVE-2014-3675</cve>
	<bugzilla href="https://bugzilla.suse.com/889332">SUSE bug 889332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567145" comment="shim-0.7.318.81ee561d-0.9.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3676</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3676" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3676" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3676" ref_url="https://www.suse.com/security/cve/CVE-2014-3676" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00011.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Shim allows remote attackers to execute arbitrary code via a crafted IPv6 address, related to the "tftp:// DHCPv6 boot option."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3676/">CVE-2014-3676</cve>
	<bugzilla href="https://bugzilla.suse.com/889332">SUSE bug 889332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567145" comment="shim-0.7.318.81ee561d-0.9.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3677</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3677" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3677" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3677" ref_url="https://www.suse.com/security/cve/CVE-2014-3677" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00011.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Shim might allow attackers to execute arbitrary code via a crafted MOK list, which triggers memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3677/">CVE-2014-3677</cve>
	<bugzilla href="https://bugzilla.suse.com/889332">SUSE bug 889332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567145" comment="shim-0.7.318.81ee561d-0.9.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3686</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3686" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3686" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3686" ref_url="https://www.suse.com/security/cve/CVE-2014-3686" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1356-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001423.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1313-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-10/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1314-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-10/msg00028.html" source="SUSE-SU"/>
    <description>
    wpa_supplicant and hostapd 0.7.2 through 2.2, when running with certain configurations and using wpa_cli or hostapd_cli with action scripts, allows remote attackers to execute arbitrary commands via a crafted frame.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3686/">CVE-2014-3686</cve>
	<bugzilla href="https://bugzilla.suse.com/1063667">SUSE bug 1063667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900611">SUSE bug 900611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915323">SUSE bug 915323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567158" comment="wpa_supplicant-0.7.1-6.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567159" comment="wpa_supplicant-gui-0.7.1-6.15.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3687</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3687" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3687" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3687" ref_url="https://www.suse.com/security/cve/CVE-2014-3687" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0178-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0529-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1489-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    The sctp_assoc_lookup_asconf_ack function in net/sctp/associola.c in the SCTP implementation in the Linux kernel through 3.17.2 allows remote attackers to cause a denial of service (panic) via duplicate ASCONF chunks that trigger an incorrect uncork within the side-effect interpreter.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3687/">CVE-2014-3687</cve>
	<bugzilla href="https://bugzilla.suse.com/902349">SUSE bug 902349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904899">SUSE bug 904899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909208">SUSE bug 909208</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592521" comment="kernel-bigsmp-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592285" comment="kernel-default-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592286" comment="kernel-default-base-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592287" comment="kernel-default-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592288" comment="kernel-default-extra-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592289" comment="kernel-pae-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592290" comment="kernel-pae-base-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592291" comment="kernel-pae-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592292" comment="kernel-pae-extra-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592293" comment="kernel-source-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592294" comment="kernel-syms-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592295" comment="kernel-trace-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592296" comment="kernel-xen-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592297" comment="kernel-xen-base-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592298" comment="kernel-xen-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592299" comment="kernel-xen-extra-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592300" comment="xen-kmp-default-4.2.5_04_3.0.101_0.47.50-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592301" comment="xen-kmp-pae-4.2.5_04_3.0.101_0.47.50-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3688</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3688" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3688" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3688" ref_url="https://www.suse.com/security/cve/CVE-2014-3688" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2177-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20182177-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    The SCTP implementation in the Linux kernel before 3.17.4 allows remote attackers to cause a denial of service (memory consumption) by triggering a large number of chunks in an association's output queue, as demonstrated by ASCONF probes, related to net/sctp/inqueue.c and net/sctp/sm_statefuns.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3688/">CVE-2014-3688</cve>
	<bugzilla href="https://bugzilla.suse.com/902351">SUSE bug 902351</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592521" comment="kernel-bigsmp-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592285" comment="kernel-default-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592286" comment="kernel-default-base-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592287" comment="kernel-default-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592288" comment="kernel-default-extra-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592289" comment="kernel-pae-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592290" comment="kernel-pae-base-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592291" comment="kernel-pae-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592292" comment="kernel-pae-extra-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592293" comment="kernel-source-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592294" comment="kernel-syms-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592295" comment="kernel-trace-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592296" comment="kernel-xen-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592297" comment="kernel-xen-base-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592298" comment="kernel-xen-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592299" comment="kernel-xen-extra-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592300" comment="xen-kmp-default-4.2.5_04_3.0.101_0.47.50-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592301" comment="xen-kmp-pae-4.2.5_04_3.0.101_0.47.50-0.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3689</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3689" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3689" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3689" ref_url="https://www.suse.com/security/cve/CVE-2014-3689" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
    <description>
    The vmware-vga driver (hw/display/vmware_vga.c) in QEMU allows local guest users to write to qemu memory locations and gain privileges via unspecified parameters related to rectangle handling.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-17"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3689/">CVE-2014-3689</cve>
	<bugzilla href="https://bugzilla.suse.com/1189862">SUSE bug 1189862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901508">SUSE bug 901508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962611">SUSE bug 962611</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567467" comment="xen-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567468" comment="xen-doc-html-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567469" comment="xen-kmp-default-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567470" comment="xen-kmp-pae-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567471" comment="xen-libs-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567472" comment="xen-libs-32bit-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567473" comment="xen-tools-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567474" comment="xen-tools-domU-4.4.4_02-32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3690</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3690" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3690" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3690" ref_url="https://www.suse.com/security/cve/CVE-2014-3690" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0178-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel before 3.17.2 on Intel processors does not ensure that the value in the CR4 control register remains the same after a VM entry, which allows host OS users to kill arbitrary processes or cause a denial of service (system disruption) by leveraging /dev/kvm access, as demonstrated by PR_SET_TSC prctl calls within a modified copy of QEMU.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3690/">CVE-2014-3690</cve>
	<bugzilla href="https://bugzilla.suse.com/902232">SUSE bug 902232</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592521" comment="kernel-bigsmp-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592285" comment="kernel-default-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592286" comment="kernel-default-base-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592287" comment="kernel-default-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592288" comment="kernel-default-extra-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592289" comment="kernel-pae-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592290" comment="kernel-pae-base-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592291" comment="kernel-pae-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592292" comment="kernel-pae-extra-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592293" comment="kernel-source-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592294" comment="kernel-syms-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592295" comment="kernel-trace-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592296" comment="kernel-xen-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592297" comment="kernel-xen-base-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592298" comment="kernel-xen-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592299" comment="kernel-xen-extra-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592300" comment="xen-kmp-default-4.2.5_04_3.0.101_0.47.50-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592301" comment="xen-kmp-pae-4.2.5_04_3.0.101_0.47.50-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3693</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3693" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3693" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3693" ref_url="https://www.suse.com/security/cve/CVE-2014-3693" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1412-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1443-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0588-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00156.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the socket manager of Impress Remote in LibreOffice 4.x before 4.2.7 and 4.3.x before 4.3.3 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted request to TCP port 1599.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3693/">CVE-2014-3693</cve>
	<bugzilla href="https://bugzilla.suse.com/900214">SUSE bug 900214</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009563504" comment="libreoffice-4.0.3.3.26-0.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563505" comment="libreoffice-base-4.0.3.3.26-0.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563506" comment="libreoffice-base-drivers-postgresql-4.0.3.3.26-0.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563507" comment="libreoffice-base-extensions-4.0.3.3.26-0.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563509" comment="libreoffice-calc-4.0.3.3.26-0.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563510" comment="libreoffice-calc-extensions-4.0.3.3.26-0.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563511" comment="libreoffice-draw-4.0.3.3.26-0.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563512" comment="libreoffice-draw-extensions-4.0.3.3.26-0.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563513" comment="libreoffice-filters-optional-4.0.3.3.26-0.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563514" comment="libreoffice-gnome-4.0.3.3.26-0.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563515" comment="libreoffice-help-cs-4.0.3.3.26-0.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563516" comment="libreoffice-help-da-4.0.3.3.26-0.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563517" comment="libreoffice-help-de-4.0.3.3.26-0.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563518" comment="libreoffice-help-en-GB-4.0.3.3.26-0.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563519" comment="libreoffice-help-en-US-4.0.3.3.26-0.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563520" comment="libreoffice-help-es-4.0.3.3.26-0.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563521" comment="libreoffice-help-fr-4.0.3.3.26-0.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563522" comment="libreoffice-help-gu-IN-4.0.3.3.26-0.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563523" comment="libreoffice-help-hi-IN-4.0.3.3.26-0.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563524" comment="libreoffice-help-hu-4.0.3.3.26-0.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563525" comment="libreoffice-help-it-4.0.3.3.26-0.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563526" comment="libreoffice-help-ja-4.0.3.3.26-0.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563527" comment="libreoffice-help-ko-4.0.3.3.26-0.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563528" comment="libreoffice-help-nl-4.0.3.3.26-0.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563529" comment="libreoffice-help-pl-4.0.3.3.26-0.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563530" comment="libreoffice-help-pt-4.0.3.3.26-0.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563531" comment="libreoffice-help-pt-BR-4.0.3.3.26-0.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563532" comment="libreoffice-help-ru-4.0.3.3.26-0.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563533" comment="libreoffice-help-sv-4.0.3.3.26-0.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563534" comment="libreoffice-help-zh-CN-4.0.3.3.26-0.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563535" comment="libreoffice-help-zh-TW-4.0.3.3.26-0.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563536" comment="libreoffice-icon-themes-4.0.3.3.26-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563537" comment="libreoffice-impress-4.0.3.3.26-0.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563538" comment="libreoffice-impress-extensions-4.0.3.3.26-0.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563539" comment="libreoffice-kde-4.0.3.3.26-0.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563540" comment="libreoffice-kde4-4.0.3.3.26-0.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563541" comment="libreoffice-l10n-af-4.0.3.3.26-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563542" comment="libreoffice-l10n-ar-4.0.3.3.26-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563543" comment="libreoffice-l10n-ca-4.0.3.3.26-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563544" comment="libreoffice-l10n-cs-4.0.3.3.26-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563545" comment="libreoffice-l10n-da-4.0.3.3.26-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563546" comment="libreoffice-l10n-de-4.0.3.3.26-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563548" comment="libreoffice-l10n-en-GB-4.0.3.3.26-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563549" comment="libreoffice-l10n-es-4.0.3.3.26-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563550" comment="libreoffice-l10n-fi-4.0.3.3.26-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563551" comment="libreoffice-l10n-fr-4.0.3.3.26-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563552" comment="libreoffice-l10n-gu-IN-4.0.3.3.26-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563553" comment="libreoffice-l10n-hi-IN-4.0.3.3.26-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563554" comment="libreoffice-l10n-hu-4.0.3.3.26-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563555" comment="libreoffice-l10n-it-4.0.3.3.26-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563556" comment="libreoffice-l10n-ja-4.0.3.3.26-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563557" comment="libreoffice-l10n-ko-4.0.3.3.26-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563558" comment="libreoffice-l10n-nb-4.0.3.3.26-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563559" comment="libreoffice-l10n-nl-4.0.3.3.26-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563560" comment="libreoffice-l10n-nn-4.0.3.3.26-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563561" comment="libreoffice-l10n-pl-4.0.3.3.26-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563563" comment="libreoffice-l10n-pt-4.0.3.3.26-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563564" comment="libreoffice-l10n-pt-BR-4.0.3.3.26-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563565" comment="libreoffice-l10n-ru-4.0.3.3.26-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563566" comment="libreoffice-l10n-sk-4.0.3.3.26-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563567" comment="libreoffice-l10n-sv-4.0.3.3.26-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563568" comment="libreoffice-l10n-xh-4.0.3.3.26-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563569" comment="libreoffice-l10n-zh-CN-4.0.3.3.26-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563570" comment="libreoffice-l10n-zh-TW-4.0.3.3.26-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563571" comment="libreoffice-l10n-zu-4.0.3.3.26-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563572" comment="libreoffice-mailmerge-4.0.3.3.26-0.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563573" comment="libreoffice-math-4.0.3.3.26-0.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563574" comment="libreoffice-mono-4.0.3.3.26-0.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563575" comment="libreoffice-officebean-4.0.3.3.26-0.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563576" comment="libreoffice-pyuno-4.0.3.3.26-0.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563578" comment="libreoffice-writer-4.0.3.3.26-0.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563579" comment="libreoffice-writer-extensions-4.0.3.3.26-0.10.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3695</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3695" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3695" ref_url="https://www.suse.com/security/cve/CVE-2014-3695" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001108.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1376-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1397-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0925-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00013.html" source="SUSE-SU"/>
    <description>
    markup.c in the MXit protocol plugin in libpurple in Pidgin before 2.10.10 allows remote servers to cause a denial of service (application crash) via a large length value in an emoticon response.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3695/">CVE-2014-3695</cve>
	<bugzilla href="https://bugzilla.suse.com/902409">SUSE bug 902409</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593062" comment="finch-2.6.6-0.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593063" comment="libpurple-2.6.6-0.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593064" comment="libpurple-lang-2.6.6-0.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593065" comment="libpurple-meanwhile-2.6.6-0.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593066" comment="libpurple-tcl-2.6.6-0.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593067" comment="pidgin-2.6.6-0.25.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3696</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3696" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3696" ref_url="https://www.suse.com/security/cve/CVE-2014-3696" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001108.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1376-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1397-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0925-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00013.html" source="SUSE-SU"/>
    <description>
    nmevent.c in the Novell GroupWise protocol plugin in libpurple in Pidgin before 2.10.10 allows remote servers to cause a denial of service (application crash) via a crafted server message that triggers a large memory allocation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3696/">CVE-2014-3696</cve>
	<bugzilla href="https://bugzilla.suse.com/902410">SUSE bug 902410</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593062" comment="finch-2.6.6-0.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593063" comment="libpurple-2.6.6-0.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593064" comment="libpurple-lang-2.6.6-0.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593065" comment="libpurple-meanwhile-2.6.6-0.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593066" comment="libpurple-tcl-2.6.6-0.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593067" comment="pidgin-2.6.6-0.25.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3698</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3698" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3698" ref_url="https://www.suse.com/security/cve/CVE-2014-3698" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001108.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1376-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1397-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0925-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00013.html" source="SUSE-SU"/>
    <description>
    The jabber_idn_validate function in jutil.c in the Jabber protocol plugin in libpurple in Pidgin before 2.10.10 allows remote attackers to obtain sensitive information from process memory via a crafted XMPP message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3698/">CVE-2014-3698</cve>
	<bugzilla href="https://bugzilla.suse.com/902408">SUSE bug 902408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593062" comment="finch-2.6.6-0.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593063" comment="libpurple-2.6.6-0.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593064" comment="libpurple-lang-2.6.6-0.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593065" comment="libpurple-meanwhile-2.6.6-0.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593066" comment="libpurple-tcl-2.6.6-0.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593067" comment="pidgin-2.6.6-0.25.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3707</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3707" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3707" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3707" ref_url="https://www.suse.com/security/cve/CVE-2014-3707" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001199.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0248-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00040.html" source="SUSE-SU"/>
    <description>
    The curl_easy_duphandle function in libcurl 7.17.1 through 7.38.0, when running with the CURLOPT_COPYPOSTFIELDS option, does not properly copy HTTP POST data for an easy handle, which triggers an out-of-bounds read that allows remote web servers to read sensitive memory information.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3707/">CVE-2014-3707</cve>
	<bugzilla href="https://bugzilla.suse.com/901924">SUSE bug 901924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566390" comment="curl-7.19.7-1.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566391" comment="libcurl4-7.19.7-1.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566392" comment="libcurl4-32bit-7.19.7-1.40.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3710</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3710" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3710" ref_url="https://www.suse.com/security/cve/CVE-2014-3710" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1516-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00113.html" source="SUSE-SU"/>
    <description>
    The donote function in readelf.c in file through 5.20, as used in the Fileinfo component in PHP 5.4.34, does not ensure that sufficient note headers are present, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3710/">CVE-2014-3710</cve>
	<bugzilla href="https://bugzilla.suse.com/902367">SUSE bug 902367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910252">SUSE bug 910252</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566422" comment="file-4.24-43.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566423" comment="file-32bit-4.24-43.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143917" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3917</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3917" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3917" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3917" ref_url="https://www.suse.com/security/cve/CVE-2014-3917" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0957-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1246-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00056.html" source="SUSE-SU"/>
    <description>
    kernel/auditsc.c in the Linux kernel through 3.14.5, when CONFIG_AUDITSYSCALL is enabled with certain syscall rules, allows local users to obtain potentially sensitive single-bit values from kernel memory or cause a denial of service (OOPS) via a large value of a syscall number.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3917/">CVE-2014-3917</cve>
	<bugzilla href="https://bugzilla.suse.com/880484">SUSE bug 880484</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589697" comment="kernel-default-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589698" comment="kernel-default-base-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589699" comment="kernel-default-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589700" comment="kernel-default-extra-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589701" comment="kernel-source-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589702" comment="kernel-syms-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589703" comment="kernel-trace-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589704" comment="kernel-xen-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589705" comment="kernel-xen-base-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589706" comment="kernel-xen-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589707" comment="kernel-xen-extra-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589708" comment="xen-kmp-default-4.2.4_02_3.0.101_0.35-0.7.45 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3967</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3967" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3967" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3967" ref_url="https://www.suse.com/security/cve/CVE-2014-3967" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00003.html" source="SUSE-SU"/>
    <description>
    The HVMOP_inject_msi function in Xen 4.2.x, 4.3.x, and 4.4.x does not properly check the return value from the IRQ setup check, which allows local HVM guest administrators to cause a denial of service (NULL pointer dereference and crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3967/">CVE-2014-3967</cve>
	<bugzilla href="https://bugzilla.suse.com/878841">SUSE bug 878841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880751">SUSE bug 880751</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567234" comment="xen-4.2.4_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567235" comment="xen-doc-html-4.2.4_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567236" comment="xen-doc-pdf-4.2.4_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567237" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567238" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567239" comment="xen-libs-4.2.4_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567240" comment="xen-libs-32bit-4.2.4_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567241" comment="xen-tools-4.2.4_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567242" comment="xen-tools-domU-4.2.4_04-0.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143968" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3968</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3968" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3968" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3968" ref_url="https://www.suse.com/security/cve/CVE-2014-3968" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00003.html" source="SUSE-SU"/>
    <description>
    The HVMOP_inject_msi function in Xen 4.2.x, 4.3.x, and 4.4.x allows local guest HVM administrators to cause a denial of service (host crash) via a large number of crafted requests, which trigger an error messages to be logged.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3968/">CVE-2014-3968</cve>
	<bugzilla href="https://bugzilla.suse.com/878841">SUSE bug 878841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880751">SUSE bug 880751</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567234" comment="xen-4.2.4_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567235" comment="xen-doc-html-4.2.4_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567236" comment="xen-doc-pdf-4.2.4_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567237" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567238" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567239" comment="xen-libs-4.2.4_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567240" comment="xen-libs-32bit-4.2.4_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567241" comment="xen-tools-4.2.4_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567242" comment="xen-tools-domU-4.2.4_04-0.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3970</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3970" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3970" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3970" ref_url="https://www.suse.com/security/cve/CVE-2014-3970" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000959.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0946-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00036.html" source="SUSE-SU"/>
    <description>
    The pa_rtp_recv function in modules/rtp/rtp.c in the module-rtp-recv module in PulseAudio 5.0 and earlier allows remote attackers to cause a denial of service (assertion failure and abort) via an empty UDP packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3970/">CVE-2014-3970</cve>
	<bugzilla href="https://bugzilla.suse.com/881524">SUSE bug 881524</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566858" comment="libpulse-browse0-0.9.23-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566859" comment="libpulse-mainloop-glib0-0.9.23-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566860" comment="libpulse0-0.9.23-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566861" comment="libpulse0-32bit-0.9.23-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566862" comment="pulseaudio-0.9.23-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566863" comment="pulseaudio-esound-compat-0.9.23-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566864" comment="pulseaudio-gdm-hooks-0.9.23-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566865" comment="pulseaudio-lang-0.9.23-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566866" comment="pulseaudio-module-bluetooth-0.9.23-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566867" comment="pulseaudio-module-gconf-0.9.23-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566868" comment="pulseaudio-module-jack-0.9.23-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566869" comment="pulseaudio-module-lirc-0.9.23-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566870" comment="pulseaudio-module-x11-0.9.23-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566871" comment="pulseaudio-module-zeroconf-0.9.23-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566872" comment="pulseaudio-utils-0.9.23-0.15.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4021</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4021" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4021" ref_url="https://www.suse.com/security/cve/CVE-2014-4021" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001141.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00003.html" source="SUSE-SU"/>
    <description>
    Xen 3.2.x through 4.4.x does not properly clean memory pages recovered from guests, which allows local guest OS users to obtain sensitive information via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4021/">CVE-2014-4021</cve>
	<bugzilla href="https://bugzilla.suse.com/880751">SUSE bug 880751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903970">SUSE bug 903970</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567234" comment="xen-4.2.4_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567235" comment="xen-doc-html-4.2.4_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567236" comment="xen-doc-pdf-4.2.4_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567237" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567238" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567239" comment="xen-libs-4.2.4_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567240" comment="xen-libs-32bit-4.2.4_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567241" comment="xen-tools-4.2.4_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567242" comment="xen-tools-domU-4.2.4_04-0.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144027" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4027</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4027" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4027" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4027" ref_url="https://www.suse.com/security/cve/CVE-2014-4027" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1316-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html" source="SUSE-SU"/>
    <description>
    The rd_build_device_space function in drivers/target/target_core_rd.c in the Linux kernel before 3.14 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from ramdisk_mcp memory by leveraging access to a SCSI initiator.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4027/">CVE-2014-4027</cve>
	<bugzilla href="https://bugzilla.suse.com/882639">SUSE bug 882639</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566710" comment="kernel-default-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566711" comment="kernel-default-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566712" comment="kernel-default-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566713" comment="kernel-default-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566718" comment="kernel-source-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566719" comment="kernel-syms-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566720" comment="kernel-trace-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566721" comment="kernel-xen-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566722" comment="kernel-xen-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566723" comment="kernel-xen-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566724" comment="kernel-xen-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566725" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144043" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4043</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4043" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4043" ref_url="https://www.suse.com/security/cve/CVE-2014-4043" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1122-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1128-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00012.html" source="SUSE-SU"/>
    <description>
    The posix_spawn_file_actions_addopen function in glibc before 2.20 does not copy its path argument in accordance with the POSIX specification, which allows context-dependent attackers to trigger use-after-free vulnerabilities.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4043/">CVE-2014-4043</cve>
	<bugzilla href="https://bugzilla.suse.com/882600">SUSE bug 882600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939797">SUSE bug 939797</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593075" comment="glibc-2.11.3-17.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593076" comment="glibc-32bit-2.11.3-17.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593077" comment="glibc-devel-2.11.3-17.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593078" comment="glibc-devel-32bit-2.11.3-17.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593079" comment="glibc-i18ndata-2.11.3-17.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593080" comment="glibc-locale-2.11.3-17.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593081" comment="glibc-locale-32bit-2.11.3-17.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593082" comment="nscd-2.11.3-17.66.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4171</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4171" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4171" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4171" ref_url="https://www.suse.com/security/cve/CVE-2014-4171" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1316-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0957-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
    <description>
    mm/shmem.c in the Linux kernel through 3.15.1 does not properly implement the interaction between range notification and hole punching, which allows local users to cause a denial of service (i_mutex hold) by using the mmap system call to access a hole, as demonstrated by interfering with intended shmem activity by blocking completion of (1) an MADV_REMOVE madvise call or (2) an FALLOC_FL_PUNCH_HOLE fallocate call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4171/">CVE-2014-4171</cve>
	<bugzilla href="https://bugzilla.suse.com/883518">SUSE bug 883518</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566710" comment="kernel-default-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566711" comment="kernel-default-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566712" comment="kernel-default-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566713" comment="kernel-default-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566718" comment="kernel-source-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566719" comment="kernel-syms-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566720" comment="kernel-trace-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566721" comment="kernel-xen-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566722" comment="kernel-xen-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566723" comment="kernel-xen-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566724" comment="kernel-xen-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566725" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4207</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4207" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4207" ref_url="https://www.suse.com/security/cve/CVE-2014-4207" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1072-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.37 and earlier allows remote authenticated users to affect availability via vectors related to SROPTZR.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4207/">CVE-2014-4207</cve>
	<bugzilla href="https://bugzilla.suse.com/887580">SUSE bug 887580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915914">SUSE bug 915914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566834" comment="libmysql55client18-5.5.39-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566835" comment="libmysql55client18-32bit-5.5.39-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566836" comment="libmysql55client_r18-5.5.39-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566837" comment="libmysql55client_r18-32bit-5.5.39-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566838" comment="libmysqlclient15-5.0.96-0.6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566839" comment="libmysqlclient15-32bit-5.0.96-0.6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566840" comment="libmysqlclient_r15-5.0.96-0.6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566841" comment="libmysqlclient_r15-32bit-5.0.96-0.6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566842" comment="mysql-5.5.39-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566843" comment="mysql-client-5.5.39-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4208</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4208" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4208" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4208" ref_url="https://www.suse.com/security/cve/CVE-2014-4208" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000969.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java SE component in Oracle Java SE 7u60 and 8u5 allows remote attackers to affect integrity via unknown vectors related to Deployment, a different vulnerability than CVE-2014-4220.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4208/">CVE-2014-4208</cve>
	<bugzilla href="https://bugzilla.suse.com/887530">SUSE bug 887530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891701">SUSE bug 891701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592869" comment="java-1_7_0-openjdk-1.7.0.65-0.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592870" comment="java-1_7_0-openjdk-demo-1.7.0.65-0.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592871" comment="java-1_7_0-openjdk-devel-1.7.0.65-0.7.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4209</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4209" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4209" ref_url="https://www.suse.com/security/cve/CVE-2014-4209" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1055-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000972.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5 allows remote attackers to affect confidentiality and integrity via vectors related to JMX.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4209/">CVE-2014-4209</cve>
	<bugzilla href="https://bugzilla.suse.com/887530">SUSE bug 887530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891699">SUSE bug 891699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891700">SUSE bug 891700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891701">SUSE bug 891701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592869" comment="java-1_7_0-openjdk-1.7.0.65-0.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592870" comment="java-1_7_0-openjdk-demo-1.7.0.65-0.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592871" comment="java-1_7_0-openjdk-devel-1.7.0.65-0.7.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4214</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4214" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4214" ref_url="https://www.suse.com/security/cve/CVE-2014-4214" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1072-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.6.17 and earlier allows remote authenticated users to affect availability via vectors related to SRSP.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4214/">CVE-2014-4214</cve>
	<bugzilla href="https://bugzilla.suse.com/887580">SUSE bug 887580</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566834" comment="libmysql55client18-5.5.39-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566835" comment="libmysql55client18-32bit-5.5.39-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566836" comment="libmysql55client_r18-5.5.39-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566837" comment="libmysql55client_r18-32bit-5.5.39-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566838" comment="libmysqlclient15-5.0.96-0.6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566839" comment="libmysqlclient15-32bit-5.0.96-0.6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566840" comment="libmysqlclient_r15-5.0.96-0.6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566841" comment="libmysqlclient_r15-32bit-5.0.96-0.6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566842" comment="mysql-5.5.39-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566843" comment="mysql-client-5.5.39-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4216</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4216" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4216" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4216" ref_url="https://www.suse.com/security/cve/CVE-2014-4216" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4216/">CVE-2014-4216</cve>
	<bugzilla href="https://bugzilla.suse.com/887530">SUSE bug 887530</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592869" comment="java-1_7_0-openjdk-1.7.0.65-0.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592870" comment="java-1_7_0-openjdk-demo-1.7.0.65-0.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592871" comment="java-1_7_0-openjdk-devel-1.7.0.65-0.7.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4218</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4218" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4218" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4218" ref_url="https://www.suse.com/security/cve/CVE-2014-4218" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1055-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000972.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5 allows remote attackers to affect integrity via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4218/">CVE-2014-4218</cve>
	<bugzilla href="https://bugzilla.suse.com/887530">SUSE bug 887530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891699">SUSE bug 891699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891700">SUSE bug 891700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891701">SUSE bug 891701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592869" comment="java-1_7_0-openjdk-1.7.0.65-0.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592870" comment="java-1_7_0-openjdk-demo-1.7.0.65-0.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592871" comment="java-1_7_0-openjdk-devel-1.7.0.65-0.7.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4219</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4219" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4219" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4219" ref_url="https://www.suse.com/security/cve/CVE-2014-4219" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1055-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000972.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u75, 7u60, and 8u5 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4219/">CVE-2014-4219</cve>
	<bugzilla href="https://bugzilla.suse.com/887530">SUSE bug 887530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891699">SUSE bug 891699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891700">SUSE bug 891700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891701">SUSE bug 891701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592869" comment="java-1_7_0-openjdk-1.7.0.65-0.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592870" comment="java-1_7_0-openjdk-demo-1.7.0.65-0.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592871" comment="java-1_7_0-openjdk-devel-1.7.0.65-0.7.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144220" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4220</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4220" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4220" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4220" ref_url="https://www.suse.com/security/cve/CVE-2014-4220" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000969.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u60 and 8u5 allows remote attackers to affect integrity via unknown vectors related to Deployment, a different vulnerability than CVE-2014-4208.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4220/">CVE-2014-4220</cve>
	<bugzilla href="https://bugzilla.suse.com/887530">SUSE bug 887530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891701">SUSE bug 891701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592869" comment="java-1_7_0-openjdk-1.7.0.65-0.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592870" comment="java-1_7_0-openjdk-demo-1.7.0.65-0.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592871" comment="java-1_7_0-openjdk-devel-1.7.0.65-0.7.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4221</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4221" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4221" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4221" ref_url="https://www.suse.com/security/cve/CVE-2014-4221" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000969.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u60 and 8u5 allows remote attackers to affect confidentiality via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4221/">CVE-2014-4221</cve>
	<bugzilla href="https://bugzilla.suse.com/887530">SUSE bug 887530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891701">SUSE bug 891701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592869" comment="java-1_7_0-openjdk-1.7.0.65-0.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592870" comment="java-1_7_0-openjdk-demo-1.7.0.65-0.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592871" comment="java-1_7_0-openjdk-devel-1.7.0.65-0.7.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4223</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4223" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4223" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4223" ref_url="https://www.suse.com/security/cve/CVE-2014-4223" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u60 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2014-2483.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4223/">CVE-2014-4223</cve>
	<bugzilla href="https://bugzilla.suse.com/887530">SUSE bug 887530</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592869" comment="java-1_7_0-openjdk-1.7.0.65-0.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592870" comment="java-1_7_0-openjdk-demo-1.7.0.65-0.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592871" comment="java-1_7_0-openjdk-devel-1.7.0.65-0.7.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144227" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4227</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4227" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4227" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4227" ref_url="https://www.suse.com/security/cve/CVE-2014-4227" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1055-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000972.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u75, 7u60, and 8u5 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4227/">CVE-2014-4227</cve>
	<bugzilla href="https://bugzilla.suse.com/887530">SUSE bug 887530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891700">SUSE bug 891700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891701">SUSE bug 891701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592869" comment="java-1_7_0-openjdk-1.7.0.65-0.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592870" comment="java-1_7_0-openjdk-demo-1.7.0.65-0.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592871" comment="java-1_7_0-openjdk-devel-1.7.0.65-0.7.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4233</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4233" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4233" ref_url="https://www.suse.com/security/cve/CVE-2014-4233" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1072-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.6.17 and earlier allows remote authenticated users to affect availability via vectors related to SRREP.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4233/">CVE-2014-4233</cve>
	<bugzilla href="https://bugzilla.suse.com/887580">SUSE bug 887580</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566834" comment="libmysql55client18-5.5.39-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566835" comment="libmysql55client18-32bit-5.5.39-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566836" comment="libmysql55client_r18-5.5.39-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566837" comment="libmysql55client_r18-32bit-5.5.39-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566838" comment="libmysqlclient15-5.0.96-0.6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566839" comment="libmysqlclient15-32bit-5.0.96-0.6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566840" comment="libmysqlclient_r15-5.0.96-0.6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566841" comment="libmysqlclient_r15-32bit-5.0.96-0.6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566842" comment="mysql-5.5.39-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566843" comment="mysql-client-5.5.39-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4238</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4238" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4238" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4238" ref_url="https://www.suse.com/security/cve/CVE-2014-4238" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1072-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.6.17 and earlier allows remote authenticated users to affect availability via vectors related to SROPTZR.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4238/">CVE-2014-4238</cve>
	<bugzilla href="https://bugzilla.suse.com/887580">SUSE bug 887580</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566834" comment="libmysql55client18-5.5.39-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566835" comment="libmysql55client18-32bit-5.5.39-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566836" comment="libmysql55client_r18-5.5.39-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566837" comment="libmysql55client_r18-32bit-5.5.39-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566838" comment="libmysqlclient15-5.0.96-0.6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566839" comment="libmysqlclient15-32bit-5.0.96-0.6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566840" comment="libmysqlclient_r15-5.0.96-0.6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566841" comment="libmysqlclient_r15-32bit-5.0.96-0.6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566842" comment="mysql-5.5.39-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566843" comment="mysql-client-5.5.39-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4240</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4240" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4240" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4240" ref_url="https://www.suse.com/security/cve/CVE-2014-4240" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1072-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.6.17 and earlier allows local users to affect confidentiality and integrity via vectors related to SRREP.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4240/">CVE-2014-4240</cve>
	<bugzilla href="https://bugzilla.suse.com/887580">SUSE bug 887580</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566834" comment="libmysql55client18-5.5.39-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566835" comment="libmysql55client18-32bit-5.5.39-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566836" comment="libmysql55client_r18-5.5.39-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566837" comment="libmysql55client_r18-32bit-5.5.39-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566838" comment="libmysqlclient15-5.0.96-0.6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566839" comment="libmysqlclient15-32bit-5.0.96-0.6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566840" comment="libmysqlclient_r15-5.0.96-0.6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566841" comment="libmysqlclient_r15-32bit-5.0.96-0.6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566842" comment="mysql-5.5.39-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566843" comment="mysql-client-5.5.39-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4243</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4243" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4243" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4243" ref_url="https://www.suse.com/security/cve/CVE-2014-4243" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1072-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.35 and earlier and 5.6.15 and earlier allows remote authenticated users to affect availability via vectors related to ENFED.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4243/">CVE-2014-4243</cve>
	<bugzilla href="https://bugzilla.suse.com/887580">SUSE bug 887580</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566834" comment="libmysql55client18-5.5.39-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566835" comment="libmysql55client18-32bit-5.5.39-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566836" comment="libmysql55client_r18-5.5.39-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566837" comment="libmysql55client_r18-32bit-5.5.39-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566838" comment="libmysqlclient15-5.0.96-0.6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566839" comment="libmysqlclient15-32bit-5.0.96-0.6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566840" comment="libmysqlclient_r15-5.0.96-0.6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566841" comment="libmysqlclient_r15-32bit-5.0.96-0.6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566842" comment="mysql-5.5.39-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566843" comment="mysql-client-5.5.39-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4244</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4244" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4244" ref_url="https://www.suse.com/security/cve/CVE-2014-4244" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1055-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000972.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5, and JRockit R27.8.2 and JRockit R28.3.2, allows remote attackers to affect confidentiality and integrity via unknown vectors related to Security.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4244/">CVE-2014-4244</cve>
	<bugzilla href="https://bugzilla.suse.com/887530">SUSE bug 887530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891699">SUSE bug 891699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891700">SUSE bug 891700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891701">SUSE bug 891701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592869" comment="java-1_7_0-openjdk-1.7.0.65-0.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592870" comment="java-1_7_0-openjdk-demo-1.7.0.65-0.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592871" comment="java-1_7_0-openjdk-devel-1.7.0.65-0.7.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4247</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4247" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4247" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4247" ref_url="https://www.suse.com/security/cve/CVE-2014-4247" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00002.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 8u5 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to JavaFX.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4247/">CVE-2014-4247</cve>
	<bugzilla href="https://bugzilla.suse.com/887530">SUSE bug 887530</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592869" comment="java-1_7_0-openjdk-1.7.0.65-0.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592870" comment="java-1_7_0-openjdk-demo-1.7.0.65-0.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592871" comment="java-1_7_0-openjdk-devel-1.7.0.65-0.7.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4252</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4252" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4252" ref_url="https://www.suse.com/security/cve/CVE-2014-4252" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1055-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000972.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5 allows remote attackers to affect confidentiality via unknown vectors related to Security.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4252/">CVE-2014-4252</cve>
	<bugzilla href="https://bugzilla.suse.com/887530">SUSE bug 887530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891699">SUSE bug 891699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891700">SUSE bug 891700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891701">SUSE bug 891701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592869" comment="java-1_7_0-openjdk-1.7.0.65-0.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592870" comment="java-1_7_0-openjdk-demo-1.7.0.65-0.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592871" comment="java-1_7_0-openjdk-devel-1.7.0.65-0.7.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144258" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4258</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4258" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4258" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4258" ref_url="https://www.suse.com/security/cve/CVE-2014-4258" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1072-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.37 and earlier and 5.6.17 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to SRINFOSC.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4258/">CVE-2014-4258</cve>
	<bugzilla href="https://bugzilla.suse.com/887580">SUSE bug 887580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915914">SUSE bug 915914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566834" comment="libmysql55client18-5.5.39-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566835" comment="libmysql55client18-32bit-5.5.39-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566836" comment="libmysql55client_r18-5.5.39-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566837" comment="libmysql55client_r18-32bit-5.5.39-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566838" comment="libmysqlclient15-5.0.96-0.6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566839" comment="libmysqlclient15-32bit-5.0.96-0.6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566840" comment="libmysqlclient_r15-5.0.96-0.6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566841" comment="libmysqlclient_r15-32bit-5.0.96-0.6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566842" comment="mysql-5.5.39-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566843" comment="mysql-client-5.5.39-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144260" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4260</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4260" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4260" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4260" ref_url="https://www.suse.com/security/cve/CVE-2014-4260" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1072-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.37 and earlier, and 5.6.17 and earlier, allows remote authenticated users to affect integrity and availability via vectors related to SRCHAR.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4260/">CVE-2014-4260</cve>
	<bugzilla href="https://bugzilla.suse.com/887580">SUSE bug 887580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915914">SUSE bug 915914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566834" comment="libmysql55client18-5.5.39-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566835" comment="libmysql55client18-32bit-5.5.39-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566836" comment="libmysql55client_r18-5.5.39-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566837" comment="libmysql55client_r18-32bit-5.5.39-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566838" comment="libmysqlclient15-5.0.96-0.6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566839" comment="libmysqlclient15-32bit-5.0.96-0.6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566840" comment="libmysqlclient_r15-5.0.96-0.6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566841" comment="libmysqlclient_r15-32bit-5.0.96-0.6.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566842" comment="mysql-5.5.39-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566843" comment="mysql-client-5.5.39-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144262" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4262</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4262" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4262" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4262" ref_url="https://www.suse.com/security/cve/CVE-2014-4262" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1055-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000972.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4262/">CVE-2014-4262</cve>
	<bugzilla href="https://bugzilla.suse.com/887530">SUSE bug 887530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891699">SUSE bug 891699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891700">SUSE bug 891700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891701">SUSE bug 891701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592869" comment="java-1_7_0-openjdk-1.7.0.65-0.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592870" comment="java-1_7_0-openjdk-demo-1.7.0.65-0.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592871" comment="java-1_7_0-openjdk-devel-1.7.0.65-0.7.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144263" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4263</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4263" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4263" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4263" ref_url="https://www.suse.com/security/cve/CVE-2014-4263" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1055-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000972.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5, and JRockit R27.8.2 and R28.3.2, allows remote attackers to affect confidentiality and integrity via unknown vectors related to "Diffie-Hellman key agreement."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4263/">CVE-2014-4263</cve>
	<bugzilla href="https://bugzilla.suse.com/887530">SUSE bug 887530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891699">SUSE bug 891699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891700">SUSE bug 891700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891701">SUSE bug 891701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592869" comment="java-1_7_0-openjdk-1.7.0.65-0.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592870" comment="java-1_7_0-openjdk-demo-1.7.0.65-0.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592871" comment="java-1_7_0-openjdk-devel-1.7.0.65-0.7.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144264" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4264</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4264" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4264" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4264" ref_url="https://www.suse.com/security/cve/CVE-2014-4264" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u60 and 8u5 allows remote attackers to affect availability via unknown vectors related to Security.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4264/">CVE-2014-4264</cve>
	<bugzilla href="https://bugzilla.suse.com/887530">SUSE bug 887530</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592869" comment="java-1_7_0-openjdk-1.7.0.65-0.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592870" comment="java-1_7_0-openjdk-demo-1.7.0.65-0.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592871" comment="java-1_7_0-openjdk-devel-1.7.0.65-0.7.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4265</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4265" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4265" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4265" ref_url="https://www.suse.com/security/cve/CVE-2014-4265" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1055-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000972.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u75, 7u60, and 8u5 allows remote attackers to affect integrity via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4265/">CVE-2014-4265</cve>
	<bugzilla href="https://bugzilla.suse.com/887530">SUSE bug 887530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891700">SUSE bug 891700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891701">SUSE bug 891701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592869" comment="java-1_7_0-openjdk-1.7.0.65-0.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592870" comment="java-1_7_0-openjdk-demo-1.7.0.65-0.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592871" comment="java-1_7_0-openjdk-devel-1.7.0.65-0.7.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144266" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4266</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4266" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4266" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4266" ref_url="https://www.suse.com/security/cve/CVE-2014-4266" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000969.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u60 and 8u5 allows remote attackers to affect integrity via unknown vectors related to Serviceability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4266/">CVE-2014-4266</cve>
	<bugzilla href="https://bugzilla.suse.com/887530">SUSE bug 887530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891701">SUSE bug 891701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592869" comment="java-1_7_0-openjdk-1.7.0.65-0.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592870" comment="java-1_7_0-openjdk-demo-1.7.0.65-0.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592871" comment="java-1_7_0-openjdk-devel-1.7.0.65-0.7.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4268</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4268" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4268" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4268" ref_url="https://www.suse.com/security/cve/CVE-2014-4268" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1055-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000972.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5 allows remote attackers to affect confidentiality via unknown vectors related to Swing.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4268/">CVE-2014-4268</cve>
	<bugzilla href="https://bugzilla.suse.com/887530">SUSE bug 887530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891699">SUSE bug 891699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891700">SUSE bug 891700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891701">SUSE bug 891701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592869" comment="java-1_7_0-openjdk-1.7.0.65-0.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592870" comment="java-1_7_0-openjdk-demo-1.7.0.65-0.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592871" comment="java-1_7_0-openjdk-devel-1.7.0.65-0.7.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4274</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4274" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4274" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4274" ref_url="https://www.suse.com/security/cve/CVE-2014-4274" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier and 5.6.19 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to SERVER:MyISAM.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4274/">CVE-2014-4274</cve>
	<bugzilla href="https://bugzilla.suse.com/857678">SUSE bug 857678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/896400">SUSE bug 896400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590293" comment="libmysql55client18-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590294" comment="libmysql55client18-32bit-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590295" comment="libmysql55client_r18-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590296" comment="libmysql55client_r18-32bit-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590297" comment="libmysqlclient15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590298" comment="libmysqlclient15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590299" comment="libmysqlclient_r15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590300" comment="libmysqlclient_r15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590301" comment="mysql-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590302" comment="mysql-client-5.5.42-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4287</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4287" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4287" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4287" ref_url="https://www.suse.com/security/cve/CVE-2014-4287" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier and 5.6.19 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:CHARACTER SETS.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4287/">CVE-2014-4287</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590293" comment="libmysql55client18-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590294" comment="libmysql55client18-32bit-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590295" comment="libmysql55client_r18-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590296" comment="libmysql55client_r18-32bit-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590297" comment="libmysqlclient15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590298" comment="libmysqlclient15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590299" comment="libmysqlclient_r15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590300" comment="libmysqlclient_r15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590301" comment="mysql-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590302" comment="mysql-client-5.5.42-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4288</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4288" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4288" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4288" ref_url="https://www.suse.com/security/cve/CVE-2014-4288" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1549-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2014-6493, CVE-2014-6503, and CVE-2014-6532.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4288/">CVE-2014-4288</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566640" comment="java-1_7_0-openjdk-1.7.0.71-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566641" comment="java-1_7_0-openjdk-demo-1.7.0.71-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566642" comment="java-1_7_0-openjdk-devel-1.7.0.71-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144330" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4330</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4330" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4330" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4330" ref_url="https://www.suse.com/security/cve/CVE-2014-4330" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001041.html" source="SUSE-SU"/>
    <description>
    The Dumper method in Data::Dumper before 2.154, as used in Perl 5.20.1 and earlier, allows context-dependent attackers to cause a denial of service (stack consumption and crash) via an Array-Reference with many nested Array-References, which triggers a large number of recursive calls to the DD_dump function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4330/">CVE-2014-4330</cve>
	<bugzilla href="https://bugzilla.suse.com/896715">SUSE bug 896715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567034" comment="perl-5.10.0-64.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567035" comment="perl-32bit-5.10.0-64.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567036" comment="perl-Module-Build-0.2808.01-0.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567037" comment="perl-Test-Simple-0.72-0.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567038" comment="perl-base-5.10.0-64.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567039" comment="perl-doc-5.10.0-64.70.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4341</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4341" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4341" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4341" ref_url="https://www.suse.com/security/cve/CVE-2014-4341" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000943.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0977-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00008.html" source="SUSE-SU"/>
    <description>
    MIT Kerberos 5 (aka krb5) before 1.12.2 allows remote attackers to cause a denial of service (buffer over-read and application crash) by injecting invalid tokens into a GSSAPI application session.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-11"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4341/">CVE-2014-4341</cve>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/886016">SUSE bug 886016</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593219" comment="krb5-1.6.3-133.49.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593220" comment="krb5-32bit-1.6.3-133.49.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593221" comment="krb5-client-1.6.3-133.49.60.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4342</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4342" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4342" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4342" ref_url="https://www.suse.com/security/cve/CVE-2014-4342" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000943.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0977-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00008.html" source="SUSE-SU"/>
    <description>
    MIT Kerberos 5 (aka krb5) 1.7.x through 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (buffer over-read or NULL pointer dereference, and application crash) by injecting invalid tokens into a GSSAPI application session.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-11"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4342/">CVE-2014-4342</cve>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/886016">SUSE bug 886016</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593219" comment="krb5-1.6.3-133.49.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593220" comment="krb5-32bit-1.6.3-133.49.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593221" comment="krb5-client-1.6.3-133.49.60.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144343" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4343</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4343" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4343" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4343" ref_url="https://www.suse.com/security/cve/CVE-2014-4343" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000943.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0977-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00008.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in the init_ctx_reselect function in the SPNEGO initiator in lib/gssapi/spnego/spnego_mech.c in MIT Kerberos 5 (aka krb5) 1.10.x through 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via network traffic that appears to come from an intended acceptor, but specifies a security mechanism different from the one proposed by the initiator.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-11"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4343/">CVE-2014-4343</cve>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888697">SUSE bug 888697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593219" comment="krb5-1.6.3-133.49.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593220" comment="krb5-32bit-1.6.3-133.49.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593221" comment="krb5-client-1.6.3-133.49.60.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144344" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4344</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4344" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4344" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4344" ref_url="https://www.suse.com/security/cve/CVE-2014-4344" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000943.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0977-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00008.html" source="SUSE-SU"/>
    <description>
    The acc_ctx_cont function in the SPNEGO acceptor in lib/gssapi/spnego/spnego_mech.c in MIT Kerberos 5 (aka krb5) 1.5.x through 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty continuation token at a certain point during a SPNEGO negotiation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-11"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4344/">CVE-2014-4344</cve>
	<bugzilla href="https://bugzilla.suse.com/888697">SUSE bug 888697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593219" comment="krb5-1.6.3-133.49.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593220" comment="krb5-32bit-1.6.3-133.49.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593221" comment="krb5-client-1.6.3-133.49.60.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4345</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4345" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4345" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4345" ref_url="https://www.suse.com/security/cve/CVE-2014-4345" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1028-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1043-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00030.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in the krb5_encode_krbsecretkey function in plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c in the LDAP KDB module in kadmind in MIT Kerberos 5 (aka krb5) 1.6.x through 1.11.x before 1.11.6 and 1.12.x before 1.12.2 allows remote authenticated users to cause a denial of service (buffer overflow) or possibly execute arbitrary code via a series of "cpw -keepold" commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-11"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4345/">CVE-2014-4345</cve>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891082">SUSE bug 891082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566760" comment="krb5-1.6.3-133.49.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566761" comment="krb5-32bit-1.6.3-133.49.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566762" comment="krb5-client-1.6.3-133.49.62.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4508</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4508" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4508" ref_url="https://www.suse.com/security/cve/CVE-2014-4508" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1316-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0957-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1246-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    arch/x86/kernel/entry_32.S in the Linux kernel through 3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the sep CPU feature flag is set, allows local users to cause a denial of service (OOPS and system crash) via an invalid syscall number, as demonstrated by number 1000.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-04"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2014-4508/">CVE-2014-4508</cve>
	<bugzilla href="https://bugzilla.suse.com/883724">SUSE bug 883724</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590045" comment="kernel-default-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590046" comment="kernel-default-base-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590047" comment="kernel-default-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590048" comment="kernel-default-extra-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590049" comment="kernel-pae-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590050" comment="kernel-pae-base-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590051" comment="kernel-pae-devel-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590052" comment="kernel-pae-extra-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590053" comment="kernel-source-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590054" comment="kernel-syms-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590055" comment="kernel-trace-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590056" comment="kernel-xen-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590057" comment="kernel-xen-base-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590058" comment="kernel-xen-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590059" comment="kernel-xen-extra-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590060" comment="xen-kmp-default-4.2.5_02_3.0.101_0.46-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590061" comment="xen-kmp-pae-4.2.5_02_3.0.101_0.42-0.7.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4607</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4607" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4607" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4607" ref_url="https://www.suse.com/security/cve/CVE-2014-4607" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0904-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0932-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00034.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the LZO algorithm variant in Oberhumer liblzo2 and lzo-2 before 2.07 on 32-bit platforms might allow remote attackers to execute arbitrary code via a crafted Literal Run.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4607/">CVE-2014-4607</cve>
	<bugzilla href="https://bugzilla.suse.com/883947">SUSE bug 883947</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566829" comment="liblzo2-2-2.03-12.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566830" comment="liblzo2-2-32bit-2.03-12.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4608</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4608" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4608" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4608" ref_url="https://www.suse.com/security/cve/CVE-2014-4608" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** Multiple integer overflows in the lzo1x_decompress_safe function in lib/lzo/lzo1x_decompress_safe.c in the LZO decompressor in the Linux kernel before 3.15.2 allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Literal Run.  NOTE: the author of the LZO algorithms says "the Linux kernel is *not* affected; media hype."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4608/">CVE-2014-4608</cve>
	<bugzilla href="https://bugzilla.suse.com/883948">SUSE bug 883948</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592521" comment="kernel-bigsmp-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592285" comment="kernel-default-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592286" comment="kernel-default-base-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592287" comment="kernel-default-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592288" comment="kernel-default-extra-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592289" comment="kernel-pae-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592290" comment="kernel-pae-base-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592291" comment="kernel-pae-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592292" comment="kernel-pae-extra-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592293" comment="kernel-source-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592294" comment="kernel-syms-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592295" comment="kernel-trace-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592296" comment="kernel-xen-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592297" comment="kernel-xen-base-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592298" comment="kernel-xen-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592299" comment="kernel-xen-extra-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592300" comment="xen-kmp-default-4.2.5_04_3.0.101_0.47.50-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592301" comment="xen-kmp-pae-4.2.5_04_3.0.101_0.47.50-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4617</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4617" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4617" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4617" ref_url="https://www.suse.com/security/cve/CVE-2014-4617" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000911.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0866-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0952-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00042.html" source="SUSE-SU"/>
    <description>
    The do_uncompress function in g10/compress.c in GnuPG 1.x before 1.4.17 and 2.x before 2.0.24 allows context-dependent attackers to cause a denial of service (infinite loop) via malformed compressed packets, as demonstrated by an a3 01 5b ff byte sequence.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4617/">CVE-2014-4617</cve>
	<bugzilla href="https://bugzilla.suse.com/884130">SUSE bug 884130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962098">SUSE bug 962098</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566610" comment="gpg2-2.0.9-25.33.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566611" comment="gpg2-lang-2.0.9-25.33.39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4650</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4650" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4650" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4650" ref_url="https://www.suse.com/security/cve/CVE-2014-4650" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1041-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1042-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1046-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1070-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1734-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00111.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2120-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    The CGIHTTPServer module in Python 2.7.5 and 3.3.4 does not properly handle URLs in which URL encoding is used for path separators, which allows remote attackers to read script source code or conduct directory traversal attacks and execute unintended code via a crafted character sequence, as demonstrated by a %2f separator.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-17"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-4650/">CVE-2014-4650</cve>
	<bugzilla href="https://bugzilla.suse.com/856835">SUSE bug 856835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/856836">SUSE bug 856836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863741">SUSE bug 863741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885882">SUSE bug 885882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898572">SUSE bug 898572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912739">SUSE bug 912739</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567089" comment="libpython2_6-1_0-2.6.9-0.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567090" comment="libpython2_6-1_0-32bit-2.6.9-0.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567091" comment="python-2.6.9-0.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567092" comment="python-base-2.6.9-0.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567093" comment="python-base-32bit-2.6.9-0.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567094" comment="python-curses-2.6.9-0.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567095" comment="python-devel-2.6.9-0.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563812" comment="python-tk-2.6.9-0.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567096" comment="python-xml-2.6.9-0.31.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4652</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4652" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4652" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4652" ref_url="https://www.suse.com/security/cve/CVE-2014-4652" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0957-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1246-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00056.html" source="SUSE-SU"/>
    <description>
    Race condition in the tlv handler functionality in the snd_ctl_elem_user_tlv function in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 allows local users to obtain sensitive information from kernel memory by leveraging /dev/snd/controlCX access.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4652/">CVE-2014-4652</cve>
	<bugzilla href="https://bugzilla.suse.com/883795">SUSE bug 883795</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589697" comment="kernel-default-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589698" comment="kernel-default-base-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589699" comment="kernel-default-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589700" comment="kernel-default-extra-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589701" comment="kernel-source-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589702" comment="kernel-syms-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589703" comment="kernel-trace-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589704" comment="kernel-xen-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589705" comment="kernel-xen-base-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589706" comment="kernel-xen-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589707" comment="kernel-xen-extra-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589708" comment="xen-kmp-default-4.2.4_02_3.0.101_0.35-0.7.45 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4653</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4653" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4653" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4653" ref_url="https://www.suse.com/security/cve/CVE-2014-4653" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0957-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1246-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00056.html" source="SUSE-SU"/>
    <description>
    sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not ensure possession of a read/write lock, which allows local users to cause a denial of service (use-after-free) and obtain sensitive information from kernel memory by leveraging /dev/snd/controlCX access.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4653/">CVE-2014-4653</cve>
	<bugzilla href="https://bugzilla.suse.com/883795">SUSE bug 883795</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589697" comment="kernel-default-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589698" comment="kernel-default-base-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589699" comment="kernel-default-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589700" comment="kernel-default-extra-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589701" comment="kernel-source-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589702" comment="kernel-syms-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589703" comment="kernel-trace-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589704" comment="kernel-xen-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589705" comment="kernel-xen-base-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589706" comment="kernel-xen-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589707" comment="kernel-xen-extra-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589708" comment="xen-kmp-default-4.2.4_02_3.0.101_0.35-0.7.45 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4654</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4654" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4654" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4654" ref_url="https://www.suse.com/security/cve/CVE-2014-4654" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0957-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1246-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00056.html" source="SUSE-SU"/>
    <description>
    The snd_ctl_elem_add function in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not check authorization for SNDRV_CTL_IOCTL_ELEM_REPLACE commands, which allows local users to remove kernel controls and cause a denial of service (use-after-free and system crash) by leveraging /dev/snd/controlCX access for an ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4654/">CVE-2014-4654</cve>
	<bugzilla href="https://bugzilla.suse.com/883795">SUSE bug 883795</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589697" comment="kernel-default-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589698" comment="kernel-default-base-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589699" comment="kernel-default-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589700" comment="kernel-default-extra-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589701" comment="kernel-source-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589702" comment="kernel-syms-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589703" comment="kernel-trace-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589704" comment="kernel-xen-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589705" comment="kernel-xen-base-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589706" comment="kernel-xen-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589707" comment="kernel-xen-extra-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589708" comment="xen-kmp-default-4.2.4_02_3.0.101_0.35-0.7.45 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4655</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4655" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4655" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4655" ref_url="https://www.suse.com/security/cve/CVE-2014-4655" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0957-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1246-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00056.html" source="SUSE-SU"/>
    <description>
    The snd_ctl_elem_add function in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not properly maintain the user_ctl_count value, which allows local users to cause a denial of service (integer overflow and limit bypass) by leveraging /dev/snd/controlCX access for a large number of SNDRV_CTL_IOCTL_ELEM_REPLACE ioctl calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4655/">CVE-2014-4655</cve>
	<bugzilla href="https://bugzilla.suse.com/883795">SUSE bug 883795</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589697" comment="kernel-default-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589698" comment="kernel-default-base-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589699" comment="kernel-default-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589700" comment="kernel-default-extra-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589701" comment="kernel-source-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589702" comment="kernel-syms-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589703" comment="kernel-trace-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589704" comment="kernel-xen-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589705" comment="kernel-xen-base-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589706" comment="kernel-xen-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589707" comment="kernel-xen-extra-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589708" comment="xen-kmp-default-4.2.4_02_3.0.101_0.35-0.7.45 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4656</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4656" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4656" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4656" ref_url="https://www.suse.com/security/cve/CVE-2014-4656" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0957-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1246-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00056.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 allow local users to cause a denial of service by leveraging /dev/snd/controlCX access, related to (1) index values in the snd_ctl_add function and (2) numid values in the snd_ctl_remove_numid_conflict function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4656/">CVE-2014-4656</cve>
	<bugzilla href="https://bugzilla.suse.com/883795">SUSE bug 883795</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589697" comment="kernel-default-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589698" comment="kernel-default-base-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589699" comment="kernel-default-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589700" comment="kernel-default-extra-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589701" comment="kernel-source-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589702" comment="kernel-syms-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589703" comment="kernel-trace-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589704" comment="kernel-xen-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589705" comment="kernel-xen-base-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589706" comment="kernel-xen-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589707" comment="kernel-xen-extra-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589708" comment="xen-kmp-default-4.2.4_02_3.0.101_0.35-0.7.45 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4667</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4667" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4667" ref_url="https://www.suse.com/security/cve/CVE-2014-4667" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1316-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0957-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1246-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00056.html" source="SUSE-SU"/>
    <description>
    The sctp_association_free function in net/sctp/associola.c in the Linux kernel before 3.15.2 does not properly manage a certain backlog value, which allows remote attackers to cause a denial of service (socket outage) via a crafted SCTP packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4667/">CVE-2014-4667</cve>
	<bugzilla href="https://bugzilla.suse.com/885422">SUSE bug 885422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566710" comment="kernel-default-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566711" comment="kernel-default-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566712" comment="kernel-default-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566713" comment="kernel-default-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566718" comment="kernel-source-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566719" comment="kernel-syms-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566720" comment="kernel-trace-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566721" comment="kernel-xen-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566722" comment="kernel-xen-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566723" comment="kernel-xen-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566724" comment="kernel-xen-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566725" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4671</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4671" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4671" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4671" ref_url="https://www.suse.com/security/cve/CVE-2014-4671" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0897-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0903-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0913-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00017.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.231 and 14.x before 14.0.0.145 on Windows and OS X and before 11.2.202.394 on Linux, Adobe AIR before 14.0.0.137 on Android, Adobe AIR SDK before 14.0.0.137, and Adobe AIR SDK &amp; Compiler before 14.0.0.137 do not properly restrict the SWF file format, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks against JSONP endpoints, and obtain sensitive information, via a crafted OBJECT element with SWF content satisfying the character-set requirements of a callback API.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-4671/">CVE-2014-4671</cve>
	<bugzilla href="https://bugzilla.suse.com/886454">SUSE bug 886454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891688">SUSE bug 891688</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592797" comment="flash-player-11.2.202.394-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592798" comment="flash-player-gnome-11.2.202.394-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592799" comment="flash-player-kde4-11.2.202.394-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4699</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4699" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4699" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4699" ref_url="https://www.suse.com/security/cve/CVE-2014-4699" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0957-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1246-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00056.html" source="SUSE-SU"/>
    <description>
    The Linux kernel before 3.15.4 on Intel processors does not properly restrict use of a non-canonical value for the saved RIP address in the case of a system call that does not use IRET, which allows local users to leverage a race condition and gain privileges, or cause a denial of service (double fault), via a crafted application that makes ptrace and fork system calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4699/">CVE-2014-4699</cve>
	<bugzilla href="https://bugzilla.suse.com/885725">SUSE bug 885725</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589697" comment="kernel-default-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589698" comment="kernel-default-base-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589699" comment="kernel-default-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589700" comment="kernel-default-extra-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589701" comment="kernel-source-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589702" comment="kernel-syms-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589703" comment="kernel-trace-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589704" comment="kernel-xen-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589705" comment="kernel-xen-base-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589706" comment="kernel-xen-devel-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589707" comment="kernel-xen-extra-3.0.101-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009589708" comment="xen-kmp-default-4.2.4_02_3.0.101_0.35-0.7.45 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144877" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4877</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4877" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4877" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4877" ref_url="https://www.suse.com/security/cve/CVE-2014-4877" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1366-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1366-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1380-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00026.html" source="SUSE-SU"/>
    <description>
    Absolute path traversal vulnerability in GNU Wget before 1.16, when recursion is enabled, allows remote FTP servers to write to arbitrary files, and consequently execute arbitrary code, via a LIST response that references the same filename within two entries, one of which indicates that the filename is for a symlink.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-04"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-4877/">CVE-2014-4877</cve>
	<bugzilla href="https://bugzilla.suse.com/902709">SUSE bug 902709</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567157" comment="wget-1.11.4-1.19.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144943" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4943</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4943" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4943" ref_url="https://www.suse.com/security/cve/CVE-2014-4943" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1316-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux kernel through 3.15.6 allows local users to gain privileges by leveraging data-structure differences between an l2tp socket and an inet socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-4943/">CVE-2014-4943</cve>
	<bugzilla href="https://bugzilla.suse.com/887082">SUSE bug 887082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566710" comment="kernel-default-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566711" comment="kernel-default-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566712" comment="kernel-default-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566713" comment="kernel-default-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566718" comment="kernel-source-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566719" comment="kernel-syms-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566720" comment="kernel-trace-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566721" comment="kernel-xen-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566722" comment="kernel-xen-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566723" comment="kernel-xen-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566724" comment="kernel-xen-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566725" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5029</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5029" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5029" ref_url="https://www.suse.com/security/cve/CVE-2014-5029" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000962.html" source="SUSE-SU"/>
    <description>
    The web interface in CUPS 1.7.4 allows local users in the lp group to read arbitrary files via a symlink attack on a file in /var/cache/cups/rss/ and language[0] set to null.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-3537.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5029/">CVE-2014-5029</cve>
	<bugzilla href="https://bugzilla.suse.com/887240">SUSE bug 887240</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566380" comment="cups-1.3.9-8.46.52.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566381" comment="cups-client-1.3.9-8.46.52.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566382" comment="cups-libs-1.3.9-8.46.52.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566383" comment="cups-libs-32bit-1.3.9-8.46.52.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5030</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5030" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5030" ref_url="https://www.suse.com/security/cve/CVE-2014-5030" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000962.html" source="SUSE-SU"/>
    <description>
    CUPS before 2.0 allows local users to read arbitrary files via a symlink attack on (1) index.html, (2) index.class, (3) index.pl, (4) index.php, (5) index.pyc, or (6) index.py.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5030/">CVE-2014-5030</cve>
	<bugzilla href="https://bugzilla.suse.com/887240">SUSE bug 887240</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566380" comment="cups-1.3.9-8.46.52.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566381" comment="cups-client-1.3.9-8.46.52.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566382" comment="cups-libs-1.3.9-8.46.52.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566383" comment="cups-libs-32bit-1.3.9-8.46.52.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5031</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5031" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5031" ref_url="https://www.suse.com/security/cve/CVE-2014-5031" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000962.html" source="SUSE-SU"/>
    <description>
    The web interface in CUPS before 2.0 does not check that files have world-readable permissions, which allows remote attackers to obtains sensitive information via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5031/">CVE-2014-5031</cve>
	<bugzilla href="https://bugzilla.suse.com/887240">SUSE bug 887240</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566380" comment="cups-1.3.9-8.46.52.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566381" comment="cups-client-1.3.9-8.46.52.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566382" comment="cups-libs-1.3.9-8.46.52.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566383" comment="cups-libs-32bit-1.3.9-8.46.52.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5077</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5077" ref_url="https://www.suse.com/security/cve/CVE-2014-5077" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1316-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1246-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
    <description>
    The sctp_assoc_update function in net/sctp/associola.c in the Linux kernel through 3.15.8, when SCTP authentication is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) by starting to establish an association between two endpoints immediately after an exchange of INIT and INIT ACK chunks to establish an earlier association between these endpoints in the opposite direction.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-5077/">CVE-2014-5077</cve>
	<bugzilla href="https://bugzilla.suse.com/889173">SUSE bug 889173</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566710" comment="kernel-default-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566711" comment="kernel-default-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566712" comment="kernel-default-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566713" comment="kernel-default-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566718" comment="kernel-source-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566719" comment="kernel-syms-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566720" comment="kernel-trace-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566721" comment="kernel-xen-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566722" comment="kernel-xen-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566723" comment="kernel-xen-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566724" comment="kernel-xen-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566725" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5119</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5119" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5119" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5119" ref_url="https://www.suse.com/security/cve/CVE-2014-5119" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1122-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1125-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1128-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1129-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1115-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00009.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in the __gconv_translit_find function in gconv_trans.c in GNU C Library (aka glibc) allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via vectors related to the CHARSET environment variable and gconv transliteration modules.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5119/">CVE-2014-5119</cve>
	<bugzilla href="https://bugzilla.suse.com/892073">SUSE bug 892073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903057">SUSE bug 903057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916222">SUSE bug 916222</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566577" comment="glibc-2.11.3-17.72.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566578" comment="glibc-32bit-2.11.3-17.72.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566579" comment="glibc-devel-2.11.3-17.72.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566580" comment="glibc-devel-32bit-2.11.3-17.72.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566581" comment="glibc-i18ndata-2.11.3-17.72.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566582" comment="glibc-locale-2.11.3-17.72.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566583" comment="glibc-locale-32bit-2.11.3-17.72.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566584" comment="nscd-2.11.3-17.72.14 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145220" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5220</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5220" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5220" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5220" ref_url="https://www.suse.com/security/cve/CVE-2014-5220" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:0308-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00069.html" source="SUSE-SU"/>
    <description>
    The mdcheck script of the mdadm package for openSUSE 13.2 prior to version 3.3.1-5.14.1 does not properly sanitize device names, which allows local attackers to execute arbitrary commands as root.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5220/">CVE-2014-5220</cve>
	<bugzilla href="https://bugzilla.suse.com/910500">SUSE bug 910500</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338872" comment="mdadm is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145270" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5270</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5270" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5270" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5270" ref_url="https://www.suse.com/security/cve/CVE-2014-5270" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000979.html" source="SUSE-SU"/>
    <description>
    Libgcrypt before 1.5.4, as used in GnuPG and other products, does not properly perform ciphertext normalization and ciphertext randomization, which makes it easier for physically proximate attackers to conduct key-extraction attacks by leveraging the ability to collect voltage data from exposed metal, a different vector than CVE-2013-4576.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5270/">CVE-2014-5270</cve>
	<bugzilla href="https://bugzilla.suse.com/892464">SUSE bug 892464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920057">SUSE bug 920057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566823" comment="libgcrypt11-1.5.0-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566824" comment="libgcrypt11-32bit-1.5.0-0.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5351</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5351" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5351" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5351" ref_url="https://www.suse.com/security/cve/CVE-2014-5351" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0290-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0255-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00044.html" source="SUSE-SU"/>
    <description>
    The kadm5_randkey_principal_3 function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) before 1.13 sends old keys in a response to a -randkey -keepold request, which allows remote authenticated users to forge tickets by leveraging administrative access.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5351/">CVE-2014-5351</cve>
	<bugzilla href="https://bugzilla.suse.com/897874">SUSE bug 897874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566769" comment="krb5-1.6.3-133.49.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566770" comment="krb5-32bit-1.6.3-133.49.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566771" comment="krb5-client-1.6.3-133.49.64.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5352</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5352" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5352" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5352" ref_url="https://www.suse.com/security/cve/CVE-2014-5352" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0290-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0255-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00044.html" source="SUSE-SU"/>
    <description>
    The krb5_gss_process_context_token function in lib/gssapi/krb5/process_context_token.c in the libgssapi_krb5 library in MIT Kerberos 5 (aka krb5) through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 does not properly maintain security-context handles, which allows remote authenticated users to cause a denial of service (use-after-free and double free, and daemon crash) or possibly execute arbitrary code via crafted GSSAPI traffic, as demonstrated by traffic to kadmind.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5352/">CVE-2014-5352</cve>
	<bugzilla href="https://bugzilla.suse.com/1005509">SUSE bug 1005509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912002">SUSE bug 912002</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566772" comment="krb5-1.6.3-133.49.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566773" comment="krb5-32bit-1.6.3-133.49.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566774" comment="krb5-client-1.6.3-133.49.66.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5353</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5353" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5353" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5353" ref_url="https://www.suse.com/security/cve/CVE-2014-5353" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001507.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0542-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00061.html" source="SUSE-SU"/>
    <description>
    The krb5_ldap_get_password_policy_from_dn function in plugins/kdb/ldap/libkdb_ldap/ldap_pwd_policy.c in MIT Kerberos 5 (aka krb5) before 1.13.1, when the KDC uses LDAP, allows remote authenticated users to cause a denial of service (daemon crash) via a successful LDAP query with no results, as demonstrated by using an incorrect object type for a password policy.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-5353/">CVE-2014-5353</cve>
	<bugzilla href="https://bugzilla.suse.com/910457">SUSE bug 910457</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566775" comment="krb5-1.6.3-133.49.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566776" comment="krb5-32bit-1.6.3-133.49.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566777" comment="krb5-client-1.6.3-133.49.68.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5354</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5354" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5354" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5354" ref_url="https://www.suse.com/security/cve/CVE-2014-5354" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001507.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0542-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00061.html" source="SUSE-SU"/>
    <description>
    plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c in MIT Kerberos 5 (aka krb5) 1.12.x and 1.13.x before 1.13.1, when the KDC uses LDAP, allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by creating a database entry for a keyless principal, as demonstrated by a kadmin "add_principal -nokey" or "purgekeys -all" command.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-5354/">CVE-2014-5354</cve>
	<bugzilla href="https://bugzilla.suse.com/910458">SUSE bug 910458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566775" comment="krb5-1.6.3-133.49.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566776" comment="krb5-32bit-1.6.3-133.49.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566777" comment="krb5-client-1.6.3-133.49.68.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5355</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5355" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5355" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5355" ref_url="https://www.suse.com/security/cve/CVE-2014-5355" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001507.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0542-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00061.html" source="SUSE-SU"/>
    <description>
    MIT Kerberos 5 (aka krb5) through 1.13.1 incorrectly expects that a krb5_read_message data field is represented as a string ending with a '\0' character, which allows remote attackers to (1) cause a denial of service (NULL pointer dereference) via a zero-byte version string or (2) cause a denial of service (out-of-bounds read) by omitting the '\0' character, related to appl/user_user/server.c and lib/krb5/krb/recvauth.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5355/">CVE-2014-5355</cve>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918595">SUSE bug 918595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566775" comment="krb5-1.6.3-133.49.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566776" comment="krb5-32bit-1.6.3-133.49.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566777" comment="krb5-client-1.6.3-133.49.68.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5471</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5471" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5471" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5471" ref_url="https://www.suse.com/security/cve/CVE-2014-5471" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1316-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    Stack consumption vulnerability in the parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to cause a denial of service (uncontrolled recursion, and system crash or reboot) via a crafted iso9660 image with a CL entry referring to a directory entry that has a CL entry.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5471/">CVE-2014-5471</cve>
	<bugzilla href="https://bugzilla.suse.com/892490">SUSE bug 892490</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566710" comment="kernel-default-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566711" comment="kernel-default-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566712" comment="kernel-default-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566713" comment="kernel-default-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566718" comment="kernel-source-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566719" comment="kernel-syms-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566720" comment="kernel-trace-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566721" comment="kernel-xen-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566722" comment="kernel-xen-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566723" comment="kernel-xen-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566724" comment="kernel-xen-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566725" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5472</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5472" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5472" ref_url="https://www.suse.com/security/cve/CVE-2014-5472" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1316-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    The parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to cause a denial of service (unkillable mount process) via a crafted iso9660 image with a self-referential CL entry.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5472/">CVE-2014-5472</cve>
	<bugzilla href="https://bugzilla.suse.com/892490">SUSE bug 892490</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566710" comment="kernel-default-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566711" comment="kernel-default-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566712" comment="kernel-default-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566713" comment="kernel-default-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566718" comment="kernel-source-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566719" comment="kernel-syms-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566720" comment="kernel-trace-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566721" comment="kernel-xen-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566722" comment="kernel-xen-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566723" comment="kernel-xen-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566724" comment="kernel-xen-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566725" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6040</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6040" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6040" ref_url="https://www.suse.com/security/cve/CVE-2014-6040" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1129-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001214.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1115-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00009.html" source="SUSE-SU"/>
    <description>
    GNU C Library (aka glibc) before 2.20 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via a multibyte character value of "0xffff" to the iconv function when converting (1) IBM933, (2) IBM935, (3) IBM937, (4) IBM939, or (5) IBM1364 encoded data to UTF-8.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6040/">CVE-2014-6040</cve>
	<bugzilla href="https://bugzilla.suse.com/894553">SUSE bug 894553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903057">SUSE bug 903057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916222">SUSE bug 916222</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590449" comment="glibc-2.11.3-17.80.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590450" comment="glibc-32bit-2.11.3-17.80.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590451" comment="glibc-devel-2.11.3-17.80.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590452" comment="glibc-devel-32bit-2.11.3-17.80.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590453" comment="glibc-i18ndata-2.11.3-17.80.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590454" comment="glibc-locale-2.11.3-17.80.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590455" comment="glibc-locale-32bit-2.11.3-17.80.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590456" comment="nscd-2.11.3-17.80.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146051" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6051</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6051" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6051" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6051" ref_url="https://www.suse.com/security/cve/CVE-2014-6051" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2088-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001701.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2207-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00022.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the MallocFrameBuffer function in vncviewer.c in LibVNCServer 0.9.9 and earlier allows remote VNC servers to cause a denial of service (crash) and possibly execute arbitrary code via an advertisement for a large screen size, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6051/">CVE-2014-6051</cve>
	<bugzilla href="https://bugzilla.suse.com/897031">SUSE bug 897031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900896">SUSE bug 900896</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566931" comment="LibVNCServer-0.9.1-156.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6052</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6052" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6052" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6052" ref_url="https://www.suse.com/security/cve/CVE-2014-6052" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2088-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001701.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2207-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00022.html" source="SUSE-SU"/>
    <description>
    The HandleRFBServerMessage function in libvncclient/rfbproto.c in LibVNCServer 0.9.9 and earlier does not check certain malloc return values, which allows remote VNC servers to cause a denial of service (application crash) or possibly execute arbitrary code by specifying a large screen size in a (1) FramebufferUpdate, (2) ResizeFrameBuffer, or (3) PalmVNCReSizeFrameBuffer message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6052/">CVE-2014-6052</cve>
	<bugzilla href="https://bugzilla.suse.com/897031">SUSE bug 897031</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566931" comment="LibVNCServer-0.9.1-156.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6053</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6053" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6053" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6053" ref_url="https://www.suse.com/security/cve/CVE-2014-6053" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2088-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001701.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2207-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00022.html" source="SUSE-SU"/>
    <description>
    The rfbProcessClientNormalMessage function in libvncserver/rfbserver.c in LibVNCServer 0.9.9 and earlier does not properly handle attempts to send a large amount of ClientCutText data, which allows remote attackers to cause a denial of service (memory consumption or daemon crash) via a crafted message that is processed by using a single unchecked malloc.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6053/">CVE-2014-6053</cve>
	<bugzilla href="https://bugzilla.suse.com/897031">SUSE bug 897031</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566931" comment="LibVNCServer-0.9.1-156.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6054</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6054" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6054" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6054" ref_url="https://www.suse.com/security/cve/CVE-2014-6054" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2088-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001701.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2207-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00022.html" source="SUSE-SU"/>
    <description>
    The rfbProcessClientNormalMessage function in libvncserver/rfbserver.c in LibVNCServer 0.9.9 and earlier allows remote attackers to cause a denial of service (divide-by-zero error and server crash) via a zero value in the scaling factor in a (1) PalmVNCSetScaleFactor or (2) SetScale message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6054/">CVE-2014-6054</cve>
	<bugzilla href="https://bugzilla.suse.com/897031">SUSE bug 897031</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566931" comment="LibVNCServer-0.9.1-156.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6055</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6055" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6055" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6055" ref_url="https://www.suse.com/security/cve/CVE-2014-6055" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2088-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001701.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2207-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00022.html" source="SUSE-SU"/>
    <description>
    Multiple stack-based buffer overflows in the File Transfer feature in rfbserver.c in LibVNCServer 0.9.9 and earlier allow remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via a (1) long file or (2) directory name or the (3) FileTime attribute in a rfbFileTransferOffer message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6055/">CVE-2014-6055</cve>
	<bugzilla href="https://bugzilla.suse.com/897031">SUSE bug 897031</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566931" comment="LibVNCServer-0.9.1-156.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6271</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6271" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6271" ref_url="https://www.suse.com/security/cve/CVE-2014-6271" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1212-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1287-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="TID7015693" ref_url="https://www.suse.com/support/kb/doc/?id=7015693" source="SUSE-SU"/>
		<reference ref_id="TID7015701" ref_url="https://www.suse.com/support/kb/doc/?id=7015701" source="SUSE-SU"/>
		<reference ref_id="TID7015702" ref_url="https://www.suse.com/support/kb/doc?id=7015702" source="SUSE-SU"/>
		<reference ref_id="TID7015705" ref_url="https://www.suse.com/support/kb/doc/?id=7015705" source="SUSE-SU"/>
		<reference ref_id="TID7015713" ref_url="https://www.suse.com/support/kb/doc/?id=7015713" source="SUSE-SU"/>
		<reference ref_id="TID7015715" ref_url="https://www.suse.com/support/kb/doc/?id=7015715" source="SUSE-SU"/>
		<reference ref_id="TID7015717" ref_url="https://www.suse.com/support/kb/doc/?id=7015717" source="SUSE-SU"/>
		<reference ref_id="TID7015718" ref_url="https://www.suse.com/support/kb/doc/?id=7015718" source="SUSE-SU"/>
		<reference ref_id="TID7015719" ref_url="https://www.suse.com/support/kb/doc/?id=7015719" source="SUSE-SU"/>
		<reference ref_id="TID7015720" ref_url="https://www.suse.com/support/kb/doc/?id=7015720" source="SUSE-SU"/>
		<reference ref_id="TID7015721" ref_url="https://www.suse.com/support/kb/doc/?id=7015721" source="SUSE-SU"/>
		<reference ref_id="TID7015731" ref_url="https://www.suse.com/support/kb/doc?id=7015731" source="SUSE-SU"/>
		<reference ref_id="TID7015741" ref_url="https://www.suse.com/support/kb/doc/?id=7015741" source="SUSE-SU"/>
		<reference ref_id="TID7016147" ref_url="https://www.suse.com/support/kb/doc/?id=7016147" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1308-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1310-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html" source="SUSE-SU"/>
    <description>
    GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock."  NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-04"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-6271/">CVE-2014-6271</cve>
	<bugzilla href="https://bugzilla.suse.com/1024628">SUSE bug 1024628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130324">SUSE bug 1130324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870618">SUSE bug 870618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/896776">SUSE bug 896776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898346">SUSE bug 898346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898604">SUSE bug 898604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898812">SUSE bug 898812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898884">SUSE bug 898884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900127">SUSE bug 900127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900454">SUSE bug 900454</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593235" comment="bash-3.2-147.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593236" comment="bash-doc-3.2-147.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593237" comment="libreadline5-5.2-147.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593238" comment="libreadline5-32bit-5.2-147.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593239" comment="readline-doc-5.2-147.20.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6272</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6272" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6272" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6272" ref_url="https://www.suse.com/security/cve/CVE-2014-6272" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0132-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00070.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the evbuffer API in Libevent 1.4.x before 1.4.15, 2.0.x before 2.0.22, and 2.1.x before 2.1.5-beta allow context-dependent attackers to cause a denial of service or possibly have other unspecified impact via "insanely large inputs" to the (1) evbuffer_add, (2) evbuffer_expand, or (3) bufferevent_write function, which triggers a heap-based buffer overflow or an infinite loop.  NOTE: this identifier has been SPLIT per ADT3 due to different affected versions. See CVE-2015-6525 for the functions that are only affected in 2.0 and later.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6272/">CVE-2014-6272</cve>
	<bugzilla href="https://bugzilla.suse.com/897243">SUSE bug 897243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943011">SUSE bug 943011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947373">SUSE bug 947373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566812" comment="libevent-1_4-2-1.4.5-24.24.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6410</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6410" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6410" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6410" ref_url="https://www.suse.com/security/cve/CVE-2014-6410" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
    <description>
    The __udf_read_inode function in fs/udf/inode.c in the Linux kernel through 3.16.3 does not restrict the amount of ICB indirection, which allows physically proximate attackers to cause a denial of service (infinite loop or stack consumption) via a UDF filesystem with a crafted inode.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6410/">CVE-2014-6410</cve>
	<bugzilla href="https://bugzilla.suse.com/896689">SUSE bug 896689</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566710" comment="kernel-default-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566711" comment="kernel-default-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566712" comment="kernel-default-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566713" comment="kernel-default-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566718" comment="kernel-source-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566719" comment="kernel-syms-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566720" comment="kernel-trace-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566721" comment="kernel-xen-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566722" comment="kernel-xen-base-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566723" comment="kernel-xen-devel-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566724" comment="kernel-xen-extra-3.0.101-0.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566725" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6421</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6421" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6421" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6421" ref_url="https://www.suse.com/security/cve/CVE-2014-6421" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1221-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1249-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00058.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the SDP dissector in Wireshark 1.10.x before 1.10.10 allows remote attackers to cause a denial of service (application crash) via a crafted packet that leverages split memory ownership between the SDP and RTP dissectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6421/">CVE-2014-6421</cve>
	<bugzilla href="https://bugzilla.suse.com/897055">SUSE bug 897055</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593247" comment="wireshark-1.10.10-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6422</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6422" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6422" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6422" ref_url="https://www.suse.com/security/cve/CVE-2014-6422" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1221-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1249-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00058.html" source="SUSE-SU"/>
    <description>
    The SDP dissector in Wireshark 1.10.x before 1.10.10 creates duplicate hashtables for a media channel, which allows remote attackers to cause a denial of service (application crash) via a crafted packet to the RTP dissector.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6422/">CVE-2014-6422</cve>
	<bugzilla href="https://bugzilla.suse.com/897055">SUSE bug 897055</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593247" comment="wireshark-1.10.10-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6423</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6423" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6423" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6423" ref_url="https://www.suse.com/security/cve/CVE-2014-6423" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1221-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1249-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00058.html" source="SUSE-SU"/>
    <description>
    The tvb_raw_text_add function in epan/dissectors/packet-megaco.c in the MEGACO dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 allows remote attackers to cause a denial of service (infinite loop) via an empty line.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6423/">CVE-2014-6423</cve>
	<bugzilla href="https://bugzilla.suse.com/897055">SUSE bug 897055</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593247" comment="wireshark-1.10.10-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6424</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6424" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6424" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6424" ref_url="https://www.suse.com/security/cve/CVE-2014-6424" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1221-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1249-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00058.html" source="SUSE-SU"/>
    <description>
    The dissect_v9_v10_pdu_data function in epan/dissectors/packet-netflow.c in the Netflow dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 refers to incorrect offset and start variables, which allows remote attackers to cause a denial of service (uninitialized memory read and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6424/">CVE-2014-6424</cve>
	<bugzilla href="https://bugzilla.suse.com/897055">SUSE bug 897055</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593247" comment="wireshark-1.10.10-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6427</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6427" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6427" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6427" ref_url="https://www.suse.com/security/cve/CVE-2014-6427" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1221-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1249-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00058.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in the is_rtsp_request_or_reply function in epan/dissectors/packet-rtsp.c in the RTSP dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet that triggers parsing of a token located one position beyond the current position.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6427/">CVE-2014-6427</cve>
	<bugzilla href="https://bugzilla.suse.com/897055">SUSE bug 897055</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593247" comment="wireshark-1.10.10-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6428</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6428" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6428" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6428" ref_url="https://www.suse.com/security/cve/CVE-2014-6428" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1221-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1249-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00058.html" source="SUSE-SU"/>
    <description>
    The dissect_spdu function in epan/dissectors/packet-ses.c in the SES dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not initialize a certain ID value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6428/">CVE-2014-6428</cve>
	<bugzilla href="https://bugzilla.suse.com/897055">SUSE bug 897055</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593247" comment="wireshark-1.10.10-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6429</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6429" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6429" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6429" ref_url="https://www.suse.com/security/cve/CVE-2014-6429" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1221-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1249-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00058.html" source="SUSE-SU"/>
    <description>
    The SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not properly handle empty input data, which allows remote attackers to cause a denial of service (application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6429/">CVE-2014-6429</cve>
	<bugzilla href="https://bugzilla.suse.com/897055">SUSE bug 897055</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593247" comment="wireshark-1.10.10-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6430</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6430" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6430" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6430" ref_url="https://www.suse.com/security/cve/CVE-2014-6430" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1221-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1249-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00058.html" source="SUSE-SU"/>
    <description>
    The SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not validate bitmask data, which allows remote attackers to cause a denial of service (application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6430/">CVE-2014-6430</cve>
	<bugzilla href="https://bugzilla.suse.com/897055">SUSE bug 897055</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593247" comment="wireshark-1.10.10-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6431</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6431" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6431" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6431" ref_url="https://www.suse.com/security/cve/CVE-2014-6431" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1221-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1249-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00058.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 allows remote attackers to cause a denial of service (application crash) via a crafted file that triggers writes of uncompressed bytes beyond the end of the output buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6431/">CVE-2014-6431</cve>
	<bugzilla href="https://bugzilla.suse.com/897055">SUSE bug 897055</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593247" comment="wireshark-1.10.10-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6432</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6432" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6432" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6432" ref_url="https://www.suse.com/security/cve/CVE-2014-6432" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1221-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1249-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00058.html" source="SUSE-SU"/>
    <description>
    The SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not prevent data overwrites during copy operations, which allows remote attackers to cause a denial of service (application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6432/">CVE-2014-6432</cve>
	<bugzilla href="https://bugzilla.suse.com/897055">SUSE bug 897055</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593247" comment="wireshark-1.10.10-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6438</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6438" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6438" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6438" ref_url="https://www.suse.com/security/cve/CVE-2014-6438" source="SUSE CVE"/>
    <description>
    The URI.decode_www_form_component method in Ruby before 1.9.2-p330 allows remote attackers to cause a denial of service (catastrophic regular expression backtracking, resource consumption, or application crash) via a crafted string.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-6438/">CVE-2014-6438</cve>
	<bugzilla href="https://bugzilla.suse.com/937962">SUSE bug 937962</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334050" comment="ruby is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6456</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6456" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6456" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6456" ref_url="https://www.suse.com/security/cve/CVE-2014-6456" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1549-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u67 and 8u20 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6456/">CVE-2014-6456</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566640" comment="java-1_7_0-openjdk-1.7.0.71-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566641" comment="java-1_7_0-openjdk-demo-1.7.0.71-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566642" comment="java-1_7_0-openjdk-devel-1.7.0.71-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6457</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6457" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6457" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6457" ref_url="https://www.suse.com/security/cve/CVE-2014-6457" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1422-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1549-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and 8u20; Java SE Embedded 7u60; and JRockit R27.8.3, and R28.3.3 allows remote attackers to affect confidentiality and integrity via vectors related to JSSE.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6457/">CVE-2014-6457</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566640" comment="java-1_7_0-openjdk-1.7.0.71-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566641" comment="java-1_7_0-openjdk-demo-1.7.0.71-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566642" comment="java-1_7_0-openjdk-devel-1.7.0.71-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6458</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6458" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6458" ref_url="https://www.suse.com/security/cve/CVE-2014-6458" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1549-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6458/">CVE-2014-6458</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566640" comment="java-1_7_0-openjdk-1.7.0.71-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566641" comment="java-1_7_0-openjdk-demo-1.7.0.71-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566642" comment="java-1_7_0-openjdk-devel-1.7.0.71-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6463</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6463" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6463" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6463" ref_url="https://www.suse.com/security/cve/CVE-2014-6463" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier and 5.6.19 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:REPLICATION ROW FORMAT BINARY LOG DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6463/">CVE-2014-6463</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590293" comment="libmysql55client18-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590294" comment="libmysql55client18-32bit-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590295" comment="libmysql55client_r18-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590296" comment="libmysql55client_r18-32bit-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590297" comment="libmysqlclient15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590298" comment="libmysqlclient15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590299" comment="libmysqlclient_r15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590300" comment="libmysqlclient_r15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590301" comment="mysql-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590302" comment="mysql-client-5.5.42-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6464</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6464" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6464" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6464" ref_url="https://www.suse.com/security/cve/CVE-2014-6464" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier and 5.6.20 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:INNODB DML FOREIGN KEYS.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6464/">CVE-2014-6464</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915912">SUSE bug 915912</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590293" comment="libmysql55client18-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590294" comment="libmysql55client18-32bit-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590295" comment="libmysql55client_r18-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590296" comment="libmysql55client_r18-32bit-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590297" comment="libmysqlclient15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590298" comment="libmysqlclient15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590299" comment="libmysqlclient_r15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590300" comment="libmysqlclient_r15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590301" comment="mysql-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590302" comment="mysql-client-5.5.42-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6466</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6466" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6466" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6466" ref_url="https://www.suse.com/security/cve/CVE-2014-6466" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1549-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20, when running on Internet Explorer, allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6466/">CVE-2014-6466</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566640" comment="java-1_7_0-openjdk-1.7.0.71-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566641" comment="java-1_7_0-openjdk-demo-1.7.0.71-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566642" comment="java-1_7_0-openjdk-devel-1.7.0.71-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6468</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6468" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6468" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6468" ref_url="https://www.suse.com/security/cve/CVE-2014-6468" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 8u20 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6468/">CVE-2014-6468</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566640" comment="java-1_7_0-openjdk-1.7.0.71-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566641" comment="java-1_7_0-openjdk-demo-1.7.0.71-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566642" comment="java-1_7_0-openjdk-devel-1.7.0.71-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6469</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6469" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6469" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6469" ref_url="https://www.suse.com/security/cve/CVE-2014-6469" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier and 5.6.20 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:OPTIMIZER.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6469/">CVE-2014-6469</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915912">SUSE bug 915912</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590293" comment="libmysql55client18-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590294" comment="libmysql55client18-32bit-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590295" comment="libmysql55client_r18-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590296" comment="libmysql55client_r18-32bit-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590297" comment="libmysqlclient15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590298" comment="libmysqlclient15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590299" comment="libmysqlclient_r15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590300" comment="libmysqlclient_r15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590301" comment="mysql-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590302" comment="mysql-client-5.5.42-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146474" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6474</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6474" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6474" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6474" ref_url="https://www.suse.com/security/cve/CVE-2014-6474" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.19 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:MEMCACHED.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6474/">CVE-2014-6474</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590293" comment="libmysql55client18-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590294" comment="libmysql55client18-32bit-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590295" comment="libmysql55client_r18-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590296" comment="libmysql55client_r18-32bit-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590297" comment="libmysqlclient15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590298" comment="libmysqlclient15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590299" comment="libmysqlclient_r15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590300" comment="libmysqlclient_r15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590301" comment="mysql-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590302" comment="mysql-client-5.5.42-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6476</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6476" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6476" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6476" ref_url="https://www.suse.com/security/cve/CVE-2014-6476" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1549-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u67 and 8u20 allows remote attackers to affect integrity via unknown vectors related to Deployment, a different vulnerability than CVE-2014-6527.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6476/">CVE-2014-6476</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566640" comment="java-1_7_0-openjdk-1.7.0.71-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566641" comment="java-1_7_0-openjdk-demo-1.7.0.71-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566642" comment="java-1_7_0-openjdk-devel-1.7.0.71-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6478</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6478" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6478" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6478" ref_url="https://www.suse.com/security/cve/CVE-2014-6478" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote attackers to affect integrity via vectors related to SERVER:SSL:yaSSL.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6478/">CVE-2014-6478</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590293" comment="libmysql55client18-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590294" comment="libmysql55client18-32bit-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590295" comment="libmysql55client_r18-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590296" comment="libmysql55client_r18-32bit-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590297" comment="libmysqlclient15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590298" comment="libmysqlclient15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590299" comment="libmysqlclient_r15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590300" comment="libmysqlclient_r15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590301" comment="mysql-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590302" comment="mysql-client-5.5.42-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6484</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6484" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6484" ref_url="https://www.suse.com/security/cve/CVE-2014-6484" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote authenticated users to affect availability via vectors related to SERVER:DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6484/">CVE-2014-6484</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590293" comment="libmysql55client18-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590294" comment="libmysql55client18-32bit-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590295" comment="libmysql55client_r18-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590296" comment="libmysql55client_r18-32bit-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590297" comment="libmysqlclient15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590298" comment="libmysqlclient15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590299" comment="libmysqlclient_r15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590300" comment="libmysqlclient_r15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590301" comment="mysql-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590302" comment="mysql-client-5.5.42-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6485</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6485" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6485" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6485" ref_url="https://www.suse.com/security/cve/CVE-2014-6485" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 8u20 and JavaFX 2.2.65 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6485/">CVE-2014-6485</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566640" comment="java-1_7_0-openjdk-1.7.0.71-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566641" comment="java-1_7_0-openjdk-demo-1.7.0.71-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566642" comment="java-1_7_0-openjdk-devel-1.7.0.71-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6489</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6489" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6489" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6489" ref_url="https://www.suse.com/security/cve/CVE-2014-6489" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.19 and earlier allows remote authenticated users to affect integrity and availability via vectors related to SERVER:SP.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6489/">CVE-2014-6489</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590293" comment="libmysql55client18-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590294" comment="libmysql55client18-32bit-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590295" comment="libmysql55client_r18-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590296" comment="libmysql55client_r18-32bit-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590297" comment="libmysqlclient15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590298" comment="libmysqlclient15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590299" comment="libmysqlclient_r15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590300" comment="libmysqlclient_r15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590301" comment="mysql-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590302" comment="mysql-client-5.5.42-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6491</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6491" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6491" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6491" ref_url="https://www.suse.com/security/cve/CVE-2014-6491" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier and 5.6.20 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to SERVER:SSL:yaSSL, a different vulnerability than CVE-2014-6500.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6491/">CVE-2014-6491</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915912">SUSE bug 915912</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590293" comment="libmysql55client18-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590294" comment="libmysql55client18-32bit-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590295" comment="libmysql55client_r18-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590296" comment="libmysql55client_r18-32bit-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590297" comment="libmysqlclient15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590298" comment="libmysqlclient15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590299" comment="libmysqlclient_r15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590300" comment="libmysqlclient_r15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590301" comment="mysql-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590302" comment="mysql-client-5.5.42-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6492</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6492" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6492" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6492" ref_url="https://www.suse.com/security/cve/CVE-2014-6492" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1549-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20, when running on Firefox, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6492/">CVE-2014-6492</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566640" comment="java-1_7_0-openjdk-1.7.0.71-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566641" comment="java-1_7_0-openjdk-demo-1.7.0.71-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566642" comment="java-1_7_0-openjdk-devel-1.7.0.71-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6493</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6493" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6493" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6493" ref_url="https://www.suse.com/security/cve/CVE-2014-6493" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1549-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2014-4288, CVE-2014-6503, and CVE-2014-6532.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6493/">CVE-2014-6493</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566640" comment="java-1_7_0-openjdk-1.7.0.71-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566641" comment="java-1_7_0-openjdk-demo-1.7.0.71-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566642" comment="java-1_7_0-openjdk-devel-1.7.0.71-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6494</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6494" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6494" ref_url="https://www.suse.com/security/cve/CVE-2014-6494" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote attackers to affect availability via vectors related to CLIENT:SSL:yaSSL, a different vulnerability than CVE-2014-6496.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6494/">CVE-2014-6494</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915912">SUSE bug 915912</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590293" comment="libmysql55client18-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590294" comment="libmysql55client18-32bit-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590295" comment="libmysql55client_r18-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590296" comment="libmysql55client_r18-32bit-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590297" comment="libmysqlclient15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590298" comment="libmysqlclient15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590299" comment="libmysqlclient_r15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590300" comment="libmysqlclient_r15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590301" comment="mysql-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590302" comment="mysql-client-5.5.42-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6495</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6495" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6495" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6495" ref_url="https://www.suse.com/security/cve/CVE-2014-6495" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote attackers to affect availability via vectors related to SERVER:SSL:yaSSL.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6495/">CVE-2014-6495</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590293" comment="libmysql55client18-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590294" comment="libmysql55client18-32bit-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590295" comment="libmysql55client_r18-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590296" comment="libmysql55client_r18-32bit-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590297" comment="libmysqlclient15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590298" comment="libmysqlclient15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590299" comment="libmysqlclient_r15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590300" comment="libmysqlclient_r15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590301" comment="mysql-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590302" comment="mysql-client-5.5.42-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146496" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6496</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6496" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6496" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6496" ref_url="https://www.suse.com/security/cve/CVE-2014-6496" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote attackers to affect availability via vectors related to CLIENT:SSL:yaSSL, a different vulnerability than CVE-2014-6494.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6496/">CVE-2014-6496</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915912">SUSE bug 915912</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590293" comment="libmysql55client18-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590294" comment="libmysql55client18-32bit-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590295" comment="libmysql55client_r18-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590296" comment="libmysql55client_r18-32bit-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590297" comment="libmysqlclient15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590298" comment="libmysqlclient15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590299" comment="libmysqlclient_r15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590300" comment="libmysqlclient_r15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590301" comment="mysql-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590302" comment="mysql-client-5.5.42-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6500</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6500" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6500" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6500" ref_url="https://www.suse.com/security/cve/CVE-2014-6500" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to SERVER:SSL:yaSSL, a different vulnerability than CVE-2014-6491.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6500/">CVE-2014-6500</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915912">SUSE bug 915912</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590293" comment="libmysql55client18-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590294" comment="libmysql55client18-32bit-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590295" comment="libmysql55client_r18-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590296" comment="libmysql55client_r18-32bit-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590297" comment="libmysqlclient15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590298" comment="libmysqlclient15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590299" comment="libmysqlclient_r15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590300" comment="libmysqlclient_r15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590301" comment="mysql-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590302" comment="mysql-client-5.5.42-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6502</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6502" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6502" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6502" ref_url="https://www.suse.com/security/cve/CVE-2014-6502" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1422-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1549-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and 8u20, and Java SE Embedded 7u60, allows remote attackers to affect integrity via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6502/">CVE-2014-6502</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566640" comment="java-1_7_0-openjdk-1.7.0.71-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566641" comment="java-1_7_0-openjdk-demo-1.7.0.71-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566642" comment="java-1_7_0-openjdk-devel-1.7.0.71-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6503</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6503" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6503" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6503" ref_url="https://www.suse.com/security/cve/CVE-2014-6503" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1549-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2014-4288, CVE-2014-6493, and CVE-2014-6532.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6503/">CVE-2014-6503</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566640" comment="java-1_7_0-openjdk-1.7.0.71-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566641" comment="java-1_7_0-openjdk-demo-1.7.0.71-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566642" comment="java-1_7_0-openjdk-devel-1.7.0.71-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6504</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6504" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6504" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6504" ref_url="https://www.suse.com/security/cve/CVE-2014-6504" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1422-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00013.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, and 7u67, and Java SE Embedded 7u60, allows remote attackers to affect confidentiality via unknown vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6504/">CVE-2014-6504</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566640" comment="java-1_7_0-openjdk-1.7.0.71-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566641" comment="java-1_7_0-openjdk-demo-1.7.0.71-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566642" comment="java-1_7_0-openjdk-devel-1.7.0.71-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6505</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6505" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6505" ref_url="https://www.suse.com/security/cve/CVE-2014-6505" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote authenticated users to affect availability via vectors related to SERVER:MEMORY STORAGE ENGINE.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6505/">CVE-2014-6505</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590293" comment="libmysql55client18-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590294" comment="libmysql55client18-32bit-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590295" comment="libmysql55client_r18-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590296" comment="libmysql55client_r18-32bit-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590297" comment="libmysqlclient15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590298" comment="libmysqlclient15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590299" comment="libmysqlclient_r15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590300" comment="libmysqlclient_r15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590301" comment="mysql-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590302" comment="mysql-client-5.5.42-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6506</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6506" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6506" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6506" ref_url="https://www.suse.com/security/cve/CVE-2014-6506" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1422-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1549-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and 8u20, and Java SE Embedded 7u60, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6506/">CVE-2014-6506</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566640" comment="java-1_7_0-openjdk-1.7.0.71-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566641" comment="java-1_7_0-openjdk-demo-1.7.0.71-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566642" comment="java-1_7_0-openjdk-devel-1.7.0.71-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6507</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6507" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6507" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6507" ref_url="https://www.suse.com/security/cve/CVE-2014-6507" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to SERVER:DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6507/">CVE-2014-6507</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915912">SUSE bug 915912</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590293" comment="libmysql55client18-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590294" comment="libmysql55client18-32bit-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590295" comment="libmysql55client_r18-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590296" comment="libmysql55client_r18-32bit-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590297" comment="libmysqlclient15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590298" comment="libmysqlclient15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590299" comment="libmysqlclient_r15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590300" comment="libmysqlclient_r15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590301" comment="mysql-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590302" comment="mysql-client-5.5.42-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6511</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6511" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6511" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6511" ref_url="https://www.suse.com/security/cve/CVE-2014-6511" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1422-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1549-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and 8u20 allows remote attackers to affect confidentiality via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6511/">CVE-2014-6511</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566640" comment="java-1_7_0-openjdk-1.7.0.71-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566641" comment="java-1_7_0-openjdk-demo-1.7.0.71-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566642" comment="java-1_7_0-openjdk-devel-1.7.0.71-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6512</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6512" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6512" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6512" ref_url="https://www.suse.com/security/cve/CVE-2014-6512" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1422-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1549-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and 8u20; Java SE Embedded 7u60; and JRockit R27.8.3 and R28.3.3 allows remote attackers to affect integrity via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6512/">CVE-2014-6512</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566640" comment="java-1_7_0-openjdk-1.7.0.71-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566641" comment="java-1_7_0-openjdk-demo-1.7.0.71-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566642" comment="java-1_7_0-openjdk-devel-1.7.0.71-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6513</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6513" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6513" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6513" ref_url="https://www.suse.com/security/cve/CVE-2014-6513" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1422-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1549-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20, and Java SE Embedded 7u60, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6513/">CVE-2014-6513</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566640" comment="java-1_7_0-openjdk-1.7.0.71-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566641" comment="java-1_7_0-openjdk-demo-1.7.0.71-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566642" comment="java-1_7_0-openjdk-devel-1.7.0.71-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6515</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6515" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6515" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6515" ref_url="https://www.suse.com/security/cve/CVE-2014-6515" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1549-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20 allows remote attackers to affect integrity via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6515/">CVE-2014-6515</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566640" comment="java-1_7_0-openjdk-1.7.0.71-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566641" comment="java-1_7_0-openjdk-demo-1.7.0.71-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566642" comment="java-1_7_0-openjdk-devel-1.7.0.71-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6517</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6517" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6517" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6517" ref_url="https://www.suse.com/security/cve/CVE-2014-6517" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1422-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00013.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20; Java SE Embedded 7u60; and Jrockit R27.8.3 and R28.3.3 allows remote attackers to affect confidentiality via vectors related to JAXP.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6517/">CVE-2014-6517</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566640" comment="java-1_7_0-openjdk-1.7.0.71-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566641" comment="java-1_7_0-openjdk-demo-1.7.0.71-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566642" comment="java-1_7_0-openjdk-devel-1.7.0.71-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6519</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6519" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6519" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6519" ref_url="https://www.suse.com/security/cve/CVE-2014-6519" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1422-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00013.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u67 and 8u20, and Java SE Embedded 7u60, allows remote attackers to affect integrity via unknown vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6519/">CVE-2014-6519</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566640" comment="java-1_7_0-openjdk-1.7.0.71-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566641" comment="java-1_7_0-openjdk-demo-1.7.0.71-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566642" comment="java-1_7_0-openjdk-devel-1.7.0.71-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6520</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6520" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6520" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6520" ref_url="https://www.suse.com/security/cve/CVE-2014-6520" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:DDL.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6520/">CVE-2014-6520</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590293" comment="libmysql55client18-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590294" comment="libmysql55client18-32bit-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590295" comment="libmysql55client_r18-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590296" comment="libmysql55client_r18-32bit-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590297" comment="libmysqlclient15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590298" comment="libmysqlclient15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590299" comment="libmysqlclient_r15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590300" comment="libmysqlclient_r15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590301" comment="mysql-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590302" comment="mysql-client-5.5.42-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6527</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6527" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6527" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6527" ref_url="https://www.suse.com/security/cve/CVE-2014-6527" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1549-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u67 and 8u20 allows remote attackers to affect integrity via unknown vectors related to Deployment, a different vulnerability than CVE-2014-6476.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6527/">CVE-2014-6527</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566640" comment="java-1_7_0-openjdk-1.7.0.71-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566641" comment="java-1_7_0-openjdk-demo-1.7.0.71-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566642" comment="java-1_7_0-openjdk-devel-1.7.0.71-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6530</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6530" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6530" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6530" ref_url="https://www.suse.com/security/cve/CVE-2014-6530" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to CLIENT:MYSQLDUMP.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6530/">CVE-2014-6530</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590293" comment="libmysql55client18-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590294" comment="libmysql55client18-32bit-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590295" comment="libmysql55client_r18-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590296" comment="libmysql55client_r18-32bit-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590297" comment="libmysqlclient15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590298" comment="libmysqlclient15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590299" comment="libmysqlclient_r15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590300" comment="libmysqlclient_r15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590301" comment="mysql-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590302" comment="mysql-client-5.5.42-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6531</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6531" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6531" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6531" ref_url="https://www.suse.com/security/cve/CVE-2014-6531" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1422-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1549-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and 8u20, and Java SE Embedded 7u60, allows remote attackers to affect confidentiality via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6531/">CVE-2014-6531</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566640" comment="java-1_7_0-openjdk-1.7.0.71-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566641" comment="java-1_7_0-openjdk-demo-1.7.0.71-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566642" comment="java-1_7_0-openjdk-devel-1.7.0.71-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6532</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6532" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6532" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6532" ref_url="https://www.suse.com/security/cve/CVE-2014-6532" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1549-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2014-4288, CVE-2014-6493, and CVE-2014-6503.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6532/">CVE-2014-6532</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566640" comment="java-1_7_0-openjdk-1.7.0.71-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566641" comment="java-1_7_0-openjdk-demo-1.7.0.71-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566642" comment="java-1_7_0-openjdk-devel-1.7.0.71-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6549</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6549" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6549" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6549" ref_url="https://www.suse.com/security/cve/CVE-2014-6549" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 8u25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6549/">CVE-2014-6549</cve>
	<bugzilla href="https://bugzilla.suse.com/914041">SUSE bug 914041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592957" comment="java-1_7_0-openjdk-1.7.0.75-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592958" comment="java-1_7_0-openjdk-demo-1.7.0.75-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592959" comment="java-1_7_0-openjdk-devel-1.7.0.75-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6551</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6551" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6551" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6551" ref_url="https://www.suse.com/security/cve/CVE-2014-6551" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier and 5.6.19 and earlier allows local users to affect confidentiality via vectors related to CLIENT:MYSQLADMIN.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6551/">CVE-2014-6551</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590293" comment="libmysql55client18-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590294" comment="libmysql55client18-32bit-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590295" comment="libmysql55client_r18-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590296" comment="libmysql55client_r18-32bit-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590297" comment="libmysqlclient15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590298" comment="libmysqlclient15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590299" comment="libmysqlclient_r15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590300" comment="libmysqlclient_r15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590301" comment="mysql-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590302" comment="mysql-client-5.5.42-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6555</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6555" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6555" ref_url="https://www.suse.com/security/cve/CVE-2014-6555" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier and 5.6.20 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to SERVER:DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6555/">CVE-2014-6555</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915912">SUSE bug 915912</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590293" comment="libmysql55client18-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590294" comment="libmysql55client18-32bit-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590295" comment="libmysql55client_r18-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590296" comment="libmysql55client_r18-32bit-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590297" comment="libmysqlclient15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590298" comment="libmysqlclient15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590299" comment="libmysqlclient_r15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590300" comment="libmysqlclient_r15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590301" comment="mysql-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590302" comment="mysql-client-5.5.42-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6558</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6558" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6558" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6558" ref_url="https://www.suse.com/security/cve/CVE-2014-6558" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1422-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1549-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and 8u20; Java SE Embedded 7u60; and JRockit R27.8.3 and JRockit R28.3.3 allows remote attackers to affect integrity via unknown vectors related to Security.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6558/">CVE-2014-6558</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566640" comment="java-1_7_0-openjdk-1.7.0.71-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566641" comment="java-1_7_0-openjdk-demo-1.7.0.71-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566642" comment="java-1_7_0-openjdk-devel-1.7.0.71-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6559</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6559" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6559" ref_url="https://www.suse.com/security/cve/CVE-2014-6559" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote attackers to affect confidentiality via vectors related to C API SSL CERTIFICATE HANDLING.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6559/">CVE-2014-6559</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915912">SUSE bug 915912</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590293" comment="libmysql55client18-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590294" comment="libmysql55client18-32bit-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590295" comment="libmysql55client_r18-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590296" comment="libmysql55client_r18-32bit-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590297" comment="libmysqlclient15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590298" comment="libmysqlclient15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590299" comment="libmysqlclient_r15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590300" comment="libmysqlclient_r15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590301" comment="mysql-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590302" comment="mysql-client-5.5.42-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6562</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6562" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6562" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6562" ref_url="https://www.suse.com/security/cve/CVE-2014-6562" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 8u20 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6562/">CVE-2014-6562</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566640" comment="java-1_7_0-openjdk-1.7.0.71-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566641" comment="java-1_7_0-openjdk-demo-1.7.0.71-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566642" comment="java-1_7_0-openjdk-devel-1.7.0.71-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6564</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6564" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6564" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6564" ref_url="https://www.suse.com/security/cve/CVE-2014-6564" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.19 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:INNODB FULLTEXT SEARCH DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6564/">CVE-2014-6564</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590293" comment="libmysql55client18-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590294" comment="libmysql55client18-32bit-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590295" comment="libmysql55client_r18-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590296" comment="libmysql55client_r18-32bit-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590297" comment="libmysqlclient15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590298" comment="libmysqlclient15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590299" comment="libmysqlclient_r15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590300" comment="libmysqlclient_r15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590301" comment="mysql-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590302" comment="mysql-client-5.5.42-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6568</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6568" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6568" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6568" ref_url="https://www.suse.com/security/cve/CVE-2014-6568" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier, and 5.6.21 and earlier, allows remote authenticated users to affect availability via vectors related to Server : InnoDB : DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6568/">CVE-2014-6568</cve>
	<bugzilla href="https://bugzilla.suse.com/914058">SUSE bug 914058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915911">SUSE bug 915911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590293" comment="libmysql55client18-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590294" comment="libmysql55client18-32bit-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590295" comment="libmysql55client_r18-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590296" comment="libmysql55client_r18-32bit-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590297" comment="libmysqlclient15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590298" comment="libmysqlclient15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590299" comment="libmysqlclient_r15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590300" comment="libmysqlclient_r15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590301" comment="mysql-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590302" comment="mysql-client-5.5.42-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6585</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6585" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6585" ref_url="https://www.suse.com/security/cve/CVE-2014-6585" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0190-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25 allows remote attackers to affect confidentiality via unknown vectors related to 2D, a different vulnerability than CVE-2014-6591.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6585/">CVE-2014-6585</cve>
	<bugzilla href="https://bugzilla.suse.com/914041">SUSE bug 914041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592957" comment="java-1_7_0-openjdk-1.7.0.75-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592958" comment="java-1_7_0-openjdk-demo-1.7.0.75-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592959" comment="java-1_7_0-openjdk-devel-1.7.0.75-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6587</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6587" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6587" ref_url="https://www.suse.com/security/cve/CVE-2014-6587" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0190-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u85, 7u72, and 8u25 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6587/">CVE-2014-6587</cve>
	<bugzilla href="https://bugzilla.suse.com/914041">SUSE bug 914041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592957" comment="java-1_7_0-openjdk-1.7.0.75-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592958" comment="java-1_7_0-openjdk-demo-1.7.0.75-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592959" comment="java-1_7_0-openjdk-devel-1.7.0.75-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6591</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6591" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6591" ref_url="https://www.suse.com/security/cve/CVE-2014-6591" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0190-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java SE component in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25 allows remote attackers to affect confidentiality via unknown vectors related to 2D, a different vulnerability than CVE-2014-6585.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6591/">CVE-2014-6591</cve>
	<bugzilla href="https://bugzilla.suse.com/914041">SUSE bug 914041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592957" comment="java-1_7_0-openjdk-1.7.0.75-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592958" comment="java-1_7_0-openjdk-demo-1.7.0.75-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592959" comment="java-1_7_0-openjdk-devel-1.7.0.75-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6593</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6593" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6593" ref_url="https://www.suse.com/security/cve/CVE-2014-6593" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0190-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25; Java SE Embedded 7u71 and 8u6; and JRockit 27.8.4 and 28.3.4 allows remote attackers to affect confidentiality and integrity via vectors related to JSSE.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6593/">CVE-2014-6593</cve>
	<bugzilla href="https://bugzilla.suse.com/914041">SUSE bug 914041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592957" comment="java-1_7_0-openjdk-1.7.0.75-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592958" comment="java-1_7_0-openjdk-demo-1.7.0.75-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592959" comment="java-1_7_0-openjdk-devel-1.7.0.75-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6601</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6601" ref_url="https://www.suse.com/security/cve/CVE-2014-6601" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0190-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u85, 7u72, and 8u25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6601/">CVE-2014-6601</cve>
	<bugzilla href="https://bugzilla.suse.com/914041">SUSE bug 914041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592957" comment="java-1_7_0-openjdk-1.7.0.75-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592958" comment="java-1_7_0-openjdk-demo-1.7.0.75-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592959" comment="java-1_7_0-openjdk-devel-1.7.0.75-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7154</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7154" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7154" ref_url="https://www.suse.com/security/cve/CVE-2014-7154" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001141.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00003.html" source="SUSE-SU"/>
    <description>
    Race condition in HVMOP_track_dirty_vram in Xen 4.0.0 through 4.4.x does not ensure possession of the guarding lock for dirty video RAM tracking, which allows certain local guest domains to cause a denial of service via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7154/">CVE-2014-7154</cve>
	<bugzilla href="https://bugzilla.suse.com/880751">SUSE bug 880751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895798">SUSE bug 895798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567234" comment="xen-4.2.4_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567235" comment="xen-doc-html-4.2.4_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567236" comment="xen-doc-pdf-4.2.4_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567237" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567238" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567239" comment="xen-libs-4.2.4_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567240" comment="xen-libs-32bit-4.2.4_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567241" comment="xen-tools-4.2.4_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567242" comment="xen-tools-domU-4.2.4_04-0.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7155</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7155" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7155" ref_url="https://www.suse.com/security/cve/CVE-2014-7155" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001141.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00003.html" source="SUSE-SU"/>
    <description>
    The x86_emulate function in arch/x86/x86_emulate/x86_emulate.c in Xen 4.4.x and earlier does not properly check supervisor mode permissions, which allows local HVM users to cause a denial of service (guest crash) or gain guest kernel mode privileges via vectors involving an (1) HLT, (2) LGDT, (3) LIDT, or (4) LMSW instruction.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7155/">CVE-2014-7155</cve>
	<bugzilla href="https://bugzilla.suse.com/880751">SUSE bug 880751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895799">SUSE bug 895799</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567234" comment="xen-4.2.4_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567235" comment="xen-doc-html-4.2.4_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567236" comment="xen-doc-pdf-4.2.4_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567237" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567238" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567239" comment="xen-libs-4.2.4_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567240" comment="xen-libs-32bit-4.2.4_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567241" comment="xen-tools-4.2.4_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567242" comment="xen-tools-domU-4.2.4_04-0.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7156</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7156" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7156" ref_url="https://www.suse.com/security/cve/CVE-2014-7156" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001141.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00003.html" source="SUSE-SU"/>
    <description>
    The x86_emulate function in arch/x86/x86_emulate/x86_emulate.c in Xen 3.3.x through 4.4.x does not check the supervisor mode permissions for instructions that generate software interrupts, which allows local HVM guest users to cause a denial of service (guest crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7156/">CVE-2014-7156</cve>
	<bugzilla href="https://bugzilla.suse.com/880751">SUSE bug 880751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895802">SUSE bug 895802</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567234" comment="xen-4.2.4_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567235" comment="xen-doc-html-4.2.4_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567236" comment="xen-doc-pdf-4.2.4_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567237" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567238" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567239" comment="xen-libs-4.2.4_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567240" comment="xen-libs-32bit-4.2.4_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567241" comment="xen-tools-4.2.4_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567242" comment="xen-tools-domU-4.2.4_04-0.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7169</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7169" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7169" ref_url="https://www.suse.com/security/cve/CVE-2014-7169" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1247-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1259-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1287-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="TID7015693" ref_url="https://www.suse.com/support/kb/doc/?id=7015693" source="SUSE-SU"/>
		<reference ref_id="TID7015701" ref_url="https://www.suse.com/support/kb/doc/?id=7015701" source="SUSE-SU"/>
		<reference ref_id="TID7015702" ref_url="https://www.suse.com/support/kb/doc?id=7015702" source="SUSE-SU"/>
		<reference ref_id="TID7015705" ref_url="https://www.suse.com/support/kb/doc/?id=7015705" source="SUSE-SU"/>
		<reference ref_id="TID7015713" ref_url="https://www.suse.com/support/kb/doc/?id=7015713" source="SUSE-SU"/>
		<reference ref_id="TID7015714" ref_url="https://www.suse.com/support/kb/doc?id=7015714" source="SUSE-SU"/>
		<reference ref_id="TID7015715" ref_url="https://www.suse.com/support/kb/doc/?id=7015715" source="SUSE-SU"/>
		<reference ref_id="TID7015717" ref_url="https://www.suse.com/support/kb/doc/?id=7015717" source="SUSE-SU"/>
		<reference ref_id="TID7015718" ref_url="https://www.suse.com/support/kb/doc/?id=7015718" source="SUSE-SU"/>
		<reference ref_id="TID7015719" ref_url="https://www.suse.com/support/kb/doc/?id=7015719" source="SUSE-SU"/>
		<reference ref_id="TID7015720" ref_url="https://www.suse.com/support/kb/doc/?id=7015720" source="SUSE-SU"/>
		<reference ref_id="TID7015721" ref_url="https://www.suse.com/support/kb/doc/?id=7015721" source="SUSE-SU"/>
		<reference ref_id="TID7015731" ref_url="https://www.suse.com/support/kb/doc?id=7015731" source="SUSE-SU"/>
		<reference ref_id="TID7015741" ref_url="https://www.suse.com/support/kb/doc/?id=7015741" source="SUSE-SU"/>
		<reference ref_id="TID7016147" ref_url="https://www.suse.com/support/kb/doc/?id=7016147" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1242-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1308-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1310-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html" source="SUSE-SU"/>
    <description>
    GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-02"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-7169/">CVE-2014-7169</cve>
	<bugzilla href="https://bugzilla.suse.com/1024628">SUSE bug 1024628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130324">SUSE bug 1130324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870618">SUSE bug 870618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/896776">SUSE bug 896776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898346">SUSE bug 898346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898812">SUSE bug 898812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898884">SUSE bug 898884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899266">SUSE bug 899266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900127">SUSE bug 900127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900454">SUSE bug 900454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902237">SUSE bug 902237</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566352" comment="bash-3.2-147.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566353" comment="bash-doc-3.2-147.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563235" comment="libreadline5-5.2-147.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566354" comment="libreadline5-32bit-5.2-147.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566355" comment="readline-doc-5.2-147.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7185</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7185" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7185" ref_url="https://www.suse.com/security/cve/CVE-2014-7185" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1292-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1734-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00111.html" source="SUSE-SU"/>
    <description>
    Integer overflow in bufferobject.c in Python before 2.7.8 allows context-dependent attackers to obtain sensitive information from process memory via a large size and offset in a "buffer" function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-10"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7185/">CVE-2014-7185</cve>
	<bugzilla href="https://bugzilla.suse.com/898572">SUSE bug 898572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912739">SUSE bug 912739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913479">SUSE bug 913479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955182">SUSE bug 955182</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567065" comment="libpython2_6-1_0-2.6.9-0.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567066" comment="libpython2_6-1_0-32bit-2.6.9-0.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567067" comment="python-2.6.9-0.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567068" comment="python-base-2.6.9-0.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567069" comment="python-base-32bit-2.6.9-0.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567070" comment="python-curses-2.6.9-0.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567071" comment="python-devel-2.6.9-0.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563788" comment="python-tk-2.6.9-0.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567072" comment="python-xml-2.6.9-0.33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7186</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7186" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7186" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7186" ref_url="https://www.suse.com/security/cve/CVE-2014-7186" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1247-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1259-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="TID7015701" ref_url="https://www.suse.com/support/kb/doc/?id=7015701" source="SUSE-SU"/>
		<reference ref_id="TID7015702" ref_url="https://www.suse.com/support/kb/doc?id=7015702" source="SUSE-SU"/>
		<reference ref_id="TID7015705" ref_url="https://www.suse.com/support/kb/doc/?id=7015705" source="SUSE-SU"/>
		<reference ref_id="TID7015715" ref_url="https://www.suse.com/support/kb/doc/?id=7015715" source="SUSE-SU"/>
		<reference ref_id="TID7015717" ref_url="https://www.suse.com/support/kb/doc/?id=7015717" source="SUSE-SU"/>
		<reference ref_id="TID7015718" ref_url="https://www.suse.com/support/kb/doc/?id=7015718" source="SUSE-SU"/>
		<reference ref_id="TID7015719" ref_url="https://www.suse.com/support/kb/doc/?id=7015719" source="SUSE-SU"/>
		<reference ref_id="TID7015720" ref_url="https://www.suse.com/support/kb/doc/?id=7015720" source="SUSE-SU"/>
		<reference ref_id="TID7015721" ref_url="https://www.suse.com/support/kb/doc/?id=7015721" source="SUSE-SU"/>
		<reference ref_id="TID7015741" ref_url="https://www.suse.com/support/kb/doc/?id=7015741" source="SUSE-SU"/>
		<reference ref_id="TID7016147" ref_url="https://www.suse.com/support/kb/doc/?id=7016147" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1242-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html" source="SUSE-SU"/>
    <description>
    The redirection implementation in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via crafted use of here documents, aka the "redir_stack" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7186/">CVE-2014-7186</cve>
	<bugzilla href="https://bugzilla.suse.com/1024628">SUSE bug 1024628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898603">SUSE bug 898603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898812">SUSE bug 898812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898884">SUSE bug 898884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899039">SUSE bug 899039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566352" comment="bash-3.2-147.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566353" comment="bash-doc-3.2-147.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563235" comment="libreadline5-5.2-147.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566354" comment="libreadline5-32bit-5.2-147.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566355" comment="readline-doc-5.2-147.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7187</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7187" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7187" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7187" ref_url="https://www.suse.com/security/cve/CVE-2014-7187" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1247-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1259-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="TID7015701" ref_url="https://www.suse.com/support/kb/doc/?id=7015701" source="SUSE-SU"/>
		<reference ref_id="TID7015702" ref_url="https://www.suse.com/support/kb/doc?id=7015702" source="SUSE-SU"/>
		<reference ref_id="TID7015705" ref_url="https://www.suse.com/support/kb/doc/?id=7015705" source="SUSE-SU"/>
		<reference ref_id="TID7015715" ref_url="https://www.suse.com/support/kb/doc/?id=7015715" source="SUSE-SU"/>
		<reference ref_id="TID7015717" ref_url="https://www.suse.com/support/kb/doc/?id=7015717" source="SUSE-SU"/>
		<reference ref_id="TID7015718" ref_url="https://www.suse.com/support/kb/doc/?id=7015718" source="SUSE-SU"/>
		<reference ref_id="TID7015719" ref_url="https://www.suse.com/support/kb/doc/?id=7015719" source="SUSE-SU"/>
		<reference ref_id="TID7015720" ref_url="https://www.suse.com/support/kb/doc/?id=7015720" source="SUSE-SU"/>
		<reference ref_id="TID7015721" ref_url="https://www.suse.com/support/kb/doc/?id=7015721" source="SUSE-SU"/>
		<reference ref_id="TID7015741" ref_url="https://www.suse.com/support/kb/doc/?id=7015741" source="SUSE-SU"/>
		<reference ref_id="TID7016147" ref_url="https://www.suse.com/support/kb/doc/?id=7016147" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1242-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1308-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1310-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the "word_lineno" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-04"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-7187/">CVE-2014-7187</cve>
	<bugzilla href="https://bugzilla.suse.com/1024628">SUSE bug 1024628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898603">SUSE bug 898603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898812">SUSE bug 898812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898884">SUSE bug 898884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899039">SUSE bug 899039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566352" comment="bash-3.2-147.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566353" comment="bash-doc-3.2-147.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563235" comment="libreadline5-5.2-147.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566354" comment="libreadline5-32bit-5.2-147.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566355" comment="readline-doc-5.2-147.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7188</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7188" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7188" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7188" ref_url="https://www.suse.com/security/cve/CVE-2014-7188" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001135.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00003.html" source="SUSE-SU"/>
    <description>
    The hvm_msr_read_intercept function in arch/x86/hvm/hvm.c in Xen 4.1 through 4.4.x uses an improper MSR range for x2APIC emulation, which allows local HVM guests to cause a denial of service (host crash) or read data from the hypervisor or other guests via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-7188/">CVE-2014-7188</cve>
	<bugzilla href="https://bugzilla.suse.com/880751">SUSE bug 880751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897657">SUSE bug 897657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903970">SUSE bug 903970</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567234" comment="xen-4.2.4_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567235" comment="xen-doc-html-4.2.4_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567236" comment="xen-doc-pdf-4.2.4_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567237" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567238" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567239" comment="xen-libs-4.2.4_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567240" comment="xen-libs-32bit-4.2.4_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567241" comment="xen-tools-4.2.4_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567242" comment="xen-tools-domU-4.2.4_04-0.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7815</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7815" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7815" ref_url="https://www.suse.com/security/cve/CVE-2014-7815" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1445-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
    <description>
    The set_pixel_format function in ui/vnc.c in QEMU allows remote attackers to cause a denial of service (crash) via a small bytes_per_pixel value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7815/">CVE-2014-7815</cve>
	<bugzilla href="https://bugzilla.suse.com/902737">SUSE bug 902737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962627">SUSE bug 962627</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567467" comment="xen-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567468" comment="xen-doc-html-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567469" comment="xen-kmp-default-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567470" comment="xen-kmp-pae-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567471" comment="xen-libs-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567472" comment="xen-libs-32bit-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567473" comment="xen-tools-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567474" comment="xen-tools-domU-4.4.4_02-32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7817</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7817" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7817" ref_url="https://www.suse.com/security/cve/CVE-2014-7817" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001305.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0351-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00089.html" source="SUSE-SU"/>
    <description>
    The wordexp function in GNU C Library (aka glibc) 2.21 does not enforce the WRDE_NOCMD flag, which allows context-dependent attackers to execute arbitrary commands, as demonstrated by input containing "$((`...`))".
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7817/">CVE-2014-7817</cve>
	<bugzilla href="https://bugzilla.suse.com/906371">SUSE bug 906371</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592352" comment="glibc-2.11.3-17.82.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592353" comment="glibc-32bit-2.11.3-17.82.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592354" comment="glibc-devel-2.11.3-17.82.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592355" comment="glibc-devel-32bit-2.11.3-17.82.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592356" comment="glibc-i18ndata-2.11.3-17.82.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592357" comment="glibc-locale-2.11.3-17.82.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592358" comment="glibc-locale-32bit-2.11.3-17.82.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592359" comment="nscd-2.11.3-17.82.11 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7822</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7822" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7822" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7822" ref_url="https://www.suse.com/security/cve/CVE-2014-7822" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0529-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1488-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1489-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.html" source="SUSE-SU"/>
    <description>
    The implementation of certain splice_write file operations in the Linux kernel before 3.16 does not enforce a restriction on the maximum size of a single file, which allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted splice system call, as demonstrated by use of a file descriptor associated with an ext4 filesystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-10"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7822/">CVE-2014-7822</cve>
	<bugzilla href="https://bugzilla.suse.com/915322">SUSE bug 915322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915517">SUSE bug 915517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939240">SUSE bug 939240</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592521" comment="kernel-bigsmp-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592285" comment="kernel-default-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592286" comment="kernel-default-base-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592287" comment="kernel-default-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592288" comment="kernel-default-extra-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592289" comment="kernel-pae-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592290" comment="kernel-pae-base-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592291" comment="kernel-pae-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592292" comment="kernel-pae-extra-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592293" comment="kernel-source-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592294" comment="kernel-syms-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592295" comment="kernel-trace-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592296" comment="kernel-xen-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592297" comment="kernel-xen-base-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592298" comment="kernel-xen-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592299" comment="kernel-xen-extra-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592300" comment="xen-kmp-default-4.2.5_04_3.0.101_0.47.50-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592301" comment="xen-kmp-pae-4.2.5_04_3.0.101_0.47.50-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7823</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7823" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7823" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7823" ref_url="https://www.suse.com/security/cve/CVE-2014-7823" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001247.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1471-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00083.html" source="SUSE-SU"/>
    <description>
    The virDomainGetXMLDesc API in Libvirt before 1.2.11 allows remote read-only users to obtain the VNC password by using the VIR_DOMAIN_XML_MIGRATABLE flag, which triggers the use of the VIR_DOMAIN_XML_SECURE flag.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-7823/">CVE-2014-7823</cve>
	<bugzilla href="https://bugzilla.suse.com/904176">SUSE bug 904176</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566781" comment="kvm-1.4.2-0.21.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566782" comment="libvirt-1.0.5.9-0.19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566783" comment="libvirt-client-1.0.5.9-0.19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566784" comment="libvirt-client-32bit-1.0.5.9-0.19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566785" comment="libvirt-doc-1.0.5.9-0.19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566786" comment="libvirt-python-1.0.5.9-0.19.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7826</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7826" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7826" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7826" ref_url="https://www.suse.com/security/cve/CVE-2014-7826" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    kernel/trace/trace_syscalls.c in the Linux kernel through 3.17.2 does not properly handle private syscall numbers during use of the ftrace subsystem, which allows local users to gain privileges or cause a denial of service (invalid pointer dereference) via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-22"/>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7826/">CVE-2014-7826</cve>
	<bugzilla href="https://bugzilla.suse.com/904012">SUSE bug 904012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904013">SUSE bug 904013</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590044" comment="kernel-bigsmp-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590045" comment="kernel-default-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590046" comment="kernel-default-base-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590047" comment="kernel-default-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590048" comment="kernel-default-extra-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590049" comment="kernel-pae-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590050" comment="kernel-pae-base-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590051" comment="kernel-pae-devel-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590052" comment="kernel-pae-extra-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590053" comment="kernel-source-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590054" comment="kernel-syms-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590055" comment="kernel-trace-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590056" comment="kernel-xen-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590057" comment="kernel-xen-base-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590058" comment="kernel-xen-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590059" comment="kernel-xen-extra-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590060" comment="xen-kmp-default-4.2.5_02_3.0.101_0.46-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590061" comment="xen-kmp-pae-4.2.5_02_3.0.101_0.42-0.7.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7840</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7840" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7840" ref_url="https://www.suse.com/security/cve/CVE-2014-7840" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001247.html" source="SUSE-SU"/>
    <description>
    The host_from_stream_offset function in arch_init.c in QEMU, when loading RAM during migration, allows remote attackers to execute arbitrary code via a crafted (1) offset or (2) length value in savevm data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7840/">CVE-2014-7840</cve>
	<bugzilla href="https://bugzilla.suse.com/905097">SUSE bug 905097</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566781" comment="kvm-1.4.2-0.21.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566782" comment="libvirt-1.0.5.9-0.19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566783" comment="libvirt-client-1.0.5.9-0.19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566784" comment="libvirt-client-32bit-1.0.5.9-0.19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566785" comment="libvirt-doc-1.0.5.9-0.19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566786" comment="libvirt-python-1.0.5.9-0.19.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7841</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7841" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7841" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7841" ref_url="https://www.suse.com/security/cve/CVE-2014-7841" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0529-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009784.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    The sctp_process_param function in net/sctp/sm_make_chunk.c in the SCTP implementation in the Linux kernel before 3.17.4, when ASCONF is used, allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via a malformed INIT chunk.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-02"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-7841/">CVE-2014-7841</cve>
	<bugzilla href="https://bugzilla.suse.com/904899">SUSE bug 904899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905100">SUSE bug 905100</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590044" comment="kernel-bigsmp-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590045" comment="kernel-default-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590046" comment="kernel-default-base-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590047" comment="kernel-default-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590048" comment="kernel-default-extra-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590049" comment="kernel-pae-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590050" comment="kernel-pae-base-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590051" comment="kernel-pae-devel-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590052" comment="kernel-pae-extra-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590053" comment="kernel-source-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590054" comment="kernel-syms-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590055" comment="kernel-trace-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590056" comment="kernel-xen-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590057" comment="kernel-xen-base-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590058" comment="kernel-xen-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590059" comment="kernel-xen-extra-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590060" comment="xen-kmp-default-4.2.5_02_3.0.101_0.46-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590061" comment="xen-kmp-pae-4.2.5_02_3.0.101_0.42-0.7.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7842</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7842" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7842" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7842" ref_url="https://www.suse.com/security/cve/CVE-2014-7842" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    Race condition in arch/x86/kvm/x86.c in the Linux kernel before 3.17.4 allows guest OS users to cause a denial of service (guest OS crash) via a crafted application that performs an MMIO transaction or a PIO transaction to trigger a guest userspace emulation error report, a similar issue to CVE-2010-5313.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7842/">CVE-2014-7842</cve>
	<bugzilla href="https://bugzilla.suse.com/905312">SUSE bug 905312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907822">SUSE bug 907822</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592521" comment="kernel-bigsmp-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592285" comment="kernel-default-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592286" comment="kernel-default-base-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592287" comment="kernel-default-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592288" comment="kernel-default-extra-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592289" comment="kernel-pae-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592290" comment="kernel-pae-base-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592291" comment="kernel-pae-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592292" comment="kernel-pae-extra-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592293" comment="kernel-source-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592294" comment="kernel-syms-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592295" comment="kernel-trace-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592296" comment="kernel-xen-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592297" comment="kernel-xen-base-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592298" comment="kernel-xen-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592299" comment="kernel-xen-extra-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592300" comment="xen-kmp-default-4.2.5_04_3.0.101_0.47.50-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592301" comment="xen-kmp-pae-4.2.5_04_3.0.101_0.47.50-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7844</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7844" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7844" ref_url="https://www.suse.com/security/cve/CVE-2014-7844" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001127.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1713-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00097.html" source="SUSE-SU"/>
    <description>
    BSD mailx 8.1.2 and earlier allows remote attackers to execute arbitrary commands via a crafted email address.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-7844/">CVE-2014-7844</cve>
	<bugzilla href="https://bugzilla.suse.com/909208">SUSE bug 909208</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009586750" comment="mailx-12.5-1.7.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7970</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7970" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7970" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7970" ref_url="https://www.suse.com/security/cve/CVE-2014-7970" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html" source="SUSE-SU"/>
    <description>
    The pivot_root implementation in fs/namespace.c in the Linux kernel through 3.17 does not properly interact with certain locations of a chroot directory, which allows local users to cause a denial of service (mount-tree loop) via . (dot) values in both arguments to the pivot_root system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7970/">CVE-2014-7970</cve>
	<bugzilla href="https://bugzilla.suse.com/900644">SUSE bug 900644</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592521" comment="kernel-bigsmp-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592285" comment="kernel-default-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592286" comment="kernel-default-base-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592287" comment="kernel-default-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592288" comment="kernel-default-extra-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592289" comment="kernel-pae-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592290" comment="kernel-pae-base-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592291" comment="kernel-pae-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592292" comment="kernel-pae-extra-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592293" comment="kernel-source-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592294" comment="kernel-syms-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592295" comment="kernel-trace-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592296" comment="kernel-xen-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592297" comment="kernel-xen-base-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592298" comment="kernel-xen-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592299" comment="kernel-xen-extra-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592300" comment="xen-kmp-default-4.2.5_04_3.0.101_0.47.50-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592301" comment="xen-kmp-pae-4.2.5_04_3.0.101_0.47.50-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7975</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7975" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7975" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7975" ref_url="https://www.suse.com/security/cve/CVE-2014-7975" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
    <description>
    The do_umount function in fs/namespace.c in the Linux kernel through 3.17 does not require the CAP_SYS_ADMIN capability for do_remount_sb calls that change the root filesystem to read-only, which allows local users to cause a denial of service (loss of writability) by making certain unshare system calls, clearing the / MNT_LOCKED flag, and making an MNT_FORCE umount system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7975/">CVE-2014-7975</cve>
	<bugzilla href="https://bugzilla.suse.com/900392">SUSE bug 900392</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8080</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8080" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8080" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8080" ref_url="https://www.suse.com/security/cve/CVE-2014-8080" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001185.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1589-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0002-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0007-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00004.html" source="SUSE-SU"/>
    <description>
    The REXML parser in Ruby 1.9.x before 1.9.3-p550, 2.0.x before 2.0.0-p594, and 2.1.x before 2.1.4 allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document, aka an XML Entity Expansion (XEE) attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8080/">CVE-2014-8080</cve>
	<bugzilla href="https://bugzilla.suse.com/902851">SUSE bug 902851</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593254" comment="ruby-1.8.7.p357-0.9.17.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8086</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8086" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8086" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8086" ref_url="https://www.suse.com/security/cve/CVE-2014-8086" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1478-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Race condition in the ext4_file_write_iter function in fs/ext4/file.c in the Linux kernel through 3.17 allows local users to cause a denial of service (file unavailability) via a combination of a write action and an F_SETFL fcntl operation for the O_DIRECT flag.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8086/">CVE-2014-8086</cve>
	<bugzilla href="https://bugzilla.suse.com/900881">SUSE bug 900881</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593262" comment="kernel-default-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593263" comment="kernel-default-base-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593264" comment="kernel-default-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593265" comment="kernel-default-extra-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593266" comment="kernel-pae-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593267" comment="kernel-pae-base-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593268" comment="kernel-pae-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593269" comment="kernel-pae-extra-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593270" comment="kernel-source-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593271" comment="kernel-syms-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593272" comment="kernel-trace-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593273" comment="kernel-xen-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593274" comment="kernel-xen-base-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593275" comment="kernel-xen-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593276" comment="kernel-xen-extra-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590534" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590535" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8090</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8090" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8090" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8090" ref_url="https://www.suse.com/security/cve/CVE-2014-8090" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001185.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1589-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0002-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0007-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00004.html" source="SUSE-SU"/>
    <description>
    The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nested entity references, aka an XML Entity Expansion (XEE) attack.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1821 and CVE-2014-8080.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8090/">CVE-2014-8090</cve>
	<bugzilla href="https://bugzilla.suse.com/905326">SUSE bug 905326</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593254" comment="ruby-1.8.7.p357-0.9.17.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8091</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8091" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8091" ref_url="https://www.suse.com/security/cve/CVE-2014-8091" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001157.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1719-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00103.html" source="SUSE-SU"/>
    <description>
    X.Org X Window System (aka X11 and X) X11R5 and X.Org Server (aka xserver and xorg-server) before 1.16.3, when using SUN-DES-1 (Secure RPC) authentication credentials, does not check the return value of a malloc call, which allows remote attackers to cause a denial of service (NULL pointer dereference and server crash) via a crafted connection request.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8091/">CVE-2014-8091</cve>
	<bugzilla href="https://bugzilla.suse.com/882226">SUSE bug 882226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907268">SUSE bug 907268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593327" comment="xorg-x11-Xvnc-7.4-27.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593328" comment="xorg-x11-server-7.4-27.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593329" comment="xorg-x11-server-extra-7.4-27.101.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8092</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8092" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8092" ref_url="https://www.suse.com/security/cve/CVE-2014-8092" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001456.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1719-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00103.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in X.Org X Window System (aka X11 or X) X11R1 and X.Org Server (aka xserver and xorg-server) before 1.16.3 allow remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a crafted request to the (1) ProcPutImage, (2) GetHosts, (3) RegionSizeof, or (4) REQUEST_FIXED_SIZE function, which triggers an out-of-bounds read or write.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2014-8092/">CVE-2014-8092</cve>
	<bugzilla href="https://bugzilla.suse.com/1146596">SUSE bug 1146596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907268">SUSE bug 907268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928520">SUSE bug 928520</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593327" comment="xorg-x11-Xvnc-7.4-27.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593328" comment="xorg-x11-server-7.4-27.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593329" comment="xorg-x11-server-extra-7.4-27.101.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8093</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8093" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8093" ref_url="https://www.suse.com/security/cve/CVE-2014-8093" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001157.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1719-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00103.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the GLX extension in XFree86 4.0, X.Org X Window System (aka X11 or X) X11R6.7, and X.Org Server (aka xserver and xorg-server) before 1.16.3 allow remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a crafted request to the (1) __glXDisp_ReadPixels, (2) __glXDispSwap_ReadPixels, (3) __glXDisp_GetTexImage, (4) __glXDispSwap_GetTexImage, (5) GetSeparableFilter, (6) GetConvolutionFilter, (7) GetHistogram, (8) GetMinmax, (9) GetColorTable, (10) __glXGetAnswerBuffer, (11) __GLX_GET_ANSWER_BUFFER, (12) __glXMap1dReqSize, (13) __glXMap1fReqSize, (14) Map2Size, (15) __glXMap2dReqSize, (16) __glXMap2fReqSize, (17) __glXImageSize, or (18) __glXSeparableFilter2DReqSize function, which triggers an out-of-bounds read or write.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-28"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8093/">CVE-2014-8093</cve>
	<bugzilla href="https://bugzilla.suse.com/907268">SUSE bug 907268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593327" comment="xorg-x11-Xvnc-7.4-27.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593328" comment="xorg-x11-server-7.4-27.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593329" comment="xorg-x11-server-extra-7.4-27.101.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8094</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8094" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8094" ref_url="https://www.suse.com/security/cve/CVE-2014-8094" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001157.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1719-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00103.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the ProcDRI2GetBuffers function in the DRI2 extension in X.Org Server (aka xserver and xorg-server) 1.7.0 through 1.16.x before 1.16.3 allows remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a crafted request, which triggers an out-of-bounds read or write.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8094/">CVE-2014-8094</cve>
	<bugzilla href="https://bugzilla.suse.com/907268">SUSE bug 907268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593327" comment="xorg-x11-Xvnc-7.4-27.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593328" comment="xorg-x11-server-7.4-27.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593329" comment="xorg-x11-server-extra-7.4-27.101.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8095</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8095" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8095" ref_url="https://www.suse.com/security/cve/CVE-2014-8095" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001157.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1719-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00103.html" source="SUSE-SU"/>
    <description>
    The XInput extension in X.Org X Window System (aka X11 or X) X11R4 and X.Org Server (aka xserver and xorg-server) before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length or index value to the (1) SProcXChangeDeviceControl, (2) ProcXChangeDeviceControl, (3) ProcXChangeFeedbackControl, (4) ProcXSendExtensionEvent, (5) SProcXIAllowEvents, (6) SProcXIChangeCursor, (7) ProcXIChangeHierarchy, (8) SProcXIGetClientPointer, (9) SProcXIGrabDevice, (10) SProcXIUngrabDevice, (11) ProcXIUngrabDevice, (12) SProcXIPassiveGrabDevice, (13) ProcXIPassiveGrabDevice, (14) SProcXIPassiveUngrabDevice, (15) ProcXIPassiveUngrabDevice, (16) SProcXListDeviceProperties, (17) SProcXDeleteDeviceProperty, (18) SProcXIListProperties, (19) SProcXIDeleteProperty, (20) SProcXIGetProperty, (21) SProcXIQueryDevice, (22) SProcXIQueryPointer, (23) SProcXISelectEvents, (24) SProcXISetClientPointer, (25) SProcXISetFocus, (26) SProcXIGetFocus, or (27) SProcXIWarpPointer function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8095/">CVE-2014-8095</cve>
	<bugzilla href="https://bugzilla.suse.com/907268">SUSE bug 907268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593327" comment="xorg-x11-Xvnc-7.4-27.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593328" comment="xorg-x11-server-7.4-27.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593329" comment="xorg-x11-server-extra-7.4-27.101.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8096</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8096" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8096" ref_url="https://www.suse.com/security/cve/CVE-2014-8096" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001157.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1719-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00103.html" source="SUSE-SU"/>
    <description>
    The SProcXCMiscGetXIDList function in the XC-MISC extension in X.Org X Window System (aka X11 or X) X11R6.0 and X.Org Server (aka xserver and xorg-server) before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length or index value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8096/">CVE-2014-8096</cve>
	<bugzilla href="https://bugzilla.suse.com/907268">SUSE bug 907268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593327" comment="xorg-x11-Xvnc-7.4-27.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593328" comment="xorg-x11-server-7.4-27.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593329" comment="xorg-x11-server-extra-7.4-27.101.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8097</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8097" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8097" ref_url="https://www.suse.com/security/cve/CVE-2014-8097" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001157.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1719-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00103.html" source="SUSE-SU"/>
    <description>
    The DBE extension in X.Org X Window System (aka X11 or X) X11R6.1 and X.Org Server (aka xserver and xorg-server) before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length or index value to the (1) ProcDbeSwapBuffers or (2) SProcDbeSwapBuffers function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8097/">CVE-2014-8097</cve>
	<bugzilla href="https://bugzilla.suse.com/907268">SUSE bug 907268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593327" comment="xorg-x11-Xvnc-7.4-27.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593328" comment="xorg-x11-server-7.4-27.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593329" comment="xorg-x11-server-extra-7.4-27.101.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8098</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8098" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8098" ref_url="https://www.suse.com/security/cve/CVE-2014-8098" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001157.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1719-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00103.html" source="SUSE-SU"/>
    <description>
    The GLX extension in XFree86 4.0, X.Org X Window System (aka X11 or X) X11R6.7, and X.Org Server (aka xserver and xorg-server) before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length or index value to the (1) __glXDisp_Render, (2) __glXDisp_RenderLarge, (3) __glXDispSwap_VendorPrivate, (4) __glXDispSwap_VendorPrivateWithReply, (5) set_client_info, (6) __glXDispSwap_SetClientInfoARB, (7) DoSwapInterval, (8) DoGetProgramString, (9) DoGetString, (10) __glXDispSwap_RenderMode, (11) __glXDisp_GetCompressedTexImage, (12) __glXDispSwap_GetCompressedTexImage, (13) __glXDisp_FeedbackBuffer, (14) __glXDispSwap_FeedbackBuffer, (15) __glXDisp_SelectBuffer, (16) __glXDispSwap_SelectBuffer, (17) __glXDisp_Flush, (18) __glXDispSwap_Flush, (19) __glXDisp_Finish, (20) __glXDispSwap_Finish, (21) __glXDisp_ReadPixels, (22) __glXDispSwap_ReadPixels, (23) __glXDisp_GetTexImage, (24) __glXDispSwap_GetTexImage, (25) __glXDisp_GetPolygonStipple, (26) __glXDispSwap_GetPolygonStipple, (27) __glXDisp_GetSeparableFilter, (28) __glXDisp_GetSeparableFilterEXT, (29) __glXDisp_GetConvolutionFilter, (30) __glXDisp_GetConvolutionFilterEXT, (31) __glXDisp_GetHistogram, (32) __glXDisp_GetHistogramEXT, (33) __glXDisp_GetMinmax, (34) __glXDisp_GetMinmaxEXT, (35) __glXDisp_GetColorTable, (36) __glXDisp_GetColorTableSGI, (37) GetSeparableFilter, (38) GetConvolutionFilter, (39) GetHistogram, (40) GetMinmax, or (41) GetColorTable function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-28"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8098/">CVE-2014-8098</cve>
	<bugzilla href="https://bugzilla.suse.com/907268">SUSE bug 907268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593327" comment="xorg-x11-Xvnc-7.4-27.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593328" comment="xorg-x11-server-7.4-27.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593329" comment="xorg-x11-server-extra-7.4-27.101.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8099</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8099" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8099" ref_url="https://www.suse.com/security/cve/CVE-2014-8099" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001157.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1719-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00103.html" source="SUSE-SU"/>
    <description>
    The XVideo extension in XFree86 4.0.0, X.Org X Window System (aka X11 or X) X11R6.7, and X.Org Server (aka xserver and xorg-server) before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length or index value to the (1) SProcXvQueryExtension, (2) SProcXvQueryAdaptors, (3) SProcXvQueryEncodings, (4) SProcXvGrabPort, (5) SProcXvUngrabPort, (6) SProcXvPutVideo, (7) SProcXvPutStill, (8) SProcXvGetVideo, (9) SProcXvGetStill, (10) SProcXvPutImage, (11) SProcXvShmPutImage, (12) SProcXvSelectVideoNotify, (13) SProcXvSelectPortNotify, (14) SProcXvStopVideo, (15) SProcXvSetPortAttribute, (16) SProcXvGetPortAttribute, (17) SProcXvQueryBestSize, (18) SProcXvQueryPortAttributes, (19) SProcXvQueryImageAttributes, or (20) SProcXvListImageFormats function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8099/">CVE-2014-8099</cve>
	<bugzilla href="https://bugzilla.suse.com/907268">SUSE bug 907268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593327" comment="xorg-x11-Xvnc-7.4-27.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593328" comment="xorg-x11-server-7.4-27.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593329" comment="xorg-x11-server-extra-7.4-27.101.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8100</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8100" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8100" ref_url="https://www.suse.com/security/cve/CVE-2014-8100" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001157.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1719-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00103.html" source="SUSE-SU"/>
    <description>
    The Render extension in XFree86 4.0.1, X.Org X Window System (aka X11 or X) X11R6.7, and X.Org Server (aka xserver and xorg-server) before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length or index value to the (1) ProcRenderQueryVersion, (2) SProcRenderQueryVersion, (3) SProcRenderQueryPictFormats, (4) SProcRenderQueryPictIndexValues, (5) SProcRenderCreatePicture, (6) SProcRenderChangePicture, (7) SProcRenderSetPictureClipRectangles, (8) SProcRenderFreePicture, (9) SProcRenderComposite, (10) SProcRenderScale, (11) SProcRenderCreateGlyphSet, (12) SProcRenderReferenceGlyphSet, (13) SProcRenderFreeGlyphSet, (14) SProcRenderFreeGlyphs, or (15) SProcRenderCompositeGlyphs function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8100/">CVE-2014-8100</cve>
	<bugzilla href="https://bugzilla.suse.com/907268">SUSE bug 907268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593327" comment="xorg-x11-Xvnc-7.4-27.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593328" comment="xorg-x11-server-7.4-27.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593329" comment="xorg-x11-server-extra-7.4-27.101.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8101</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8101" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8101" ref_url="https://www.suse.com/security/cve/CVE-2014-8101" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001157.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1719-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00103.html" source="SUSE-SU"/>
    <description>
    The RandR extension in XFree86 4.2.0, X.Org X Window System (aka X11 or X) X11R6.7, and X.Org Server (aka xserver and xorg-server) before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length or index value to the (1) SProcRRQueryVersion, (2) SProcRRGetScreenInfo, (3) SProcRRSelectInput, or (4) SProcRRConfigureOutputProperty function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8101/">CVE-2014-8101</cve>
	<bugzilla href="https://bugzilla.suse.com/907268">SUSE bug 907268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593327" comment="xorg-x11-Xvnc-7.4-27.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593328" comment="xorg-x11-server-7.4-27.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593329" comment="xorg-x11-server-extra-7.4-27.101.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8102</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8102" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8102" ref_url="https://www.suse.com/security/cve/CVE-2014-8102" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001157.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1719-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00103.html" source="SUSE-SU"/>
    <description>
    The SProcXFixesSelectSelectionInput function in the XFixes extension in X.Org X Window System (aka X11 or X) X11R6.8.0 and X.Org Server (aka xserver and xorg-server) before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8102/">CVE-2014-8102</cve>
	<bugzilla href="https://bugzilla.suse.com/907268">SUSE bug 907268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593327" comment="xorg-x11-Xvnc-7.4-27.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593328" comment="xorg-x11-server-7.4-27.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593329" comment="xorg-x11-server-extra-7.4-27.101.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8104</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8104" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8104" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8104" ref_url="https://www.suse.com/security/cve/CVE-2014-8104" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1605-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1594-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00008.html" source="SUSE-SU"/>
    <description>
    OpenVPN 2.x before 2.0.11, 2.1.x, 2.2.x before 2.2.3, and 2.3.x before 2.3.6 allows remote authenticated users to cause a denial of service (server crash) via a small control channel packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8104/">CVE-2014-8104</cve>
	<bugzilla href="https://bugzilla.suse.com/907764">SUSE bug 907764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593337" comment="openvpn-2.0.9-143.44.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8106</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8106" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8106" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8106" ref_url="https://www.suse.com/security/cve/CVE-2014-8106" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0582-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0647-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00013.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the Cirrus VGA emulator (hw/display/cirrus_vga.c) in QEMU before 2.2.0 allows local guest users to execute arbitrary code via vectors related to blit regions. NOTE: this vulnerability exists because an incomplete fix for CVE-2007-1320.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8106/">CVE-2014-8106</cve>
	<bugzilla href="https://bugzilla.suse.com/1023004">SUSE bug 1023004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907805">SUSE bug 907805</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566781" comment="kvm-1.4.2-0.21.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566782" comment="libvirt-1.0.5.9-0.19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566783" comment="libvirt-client-1.0.5.9-0.19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566784" comment="libvirt-client-32bit-1.0.5.9-0.19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566785" comment="libvirt-doc-1.0.5.9-0.19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566786" comment="libvirt-python-1.0.5.9-0.19.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8116</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8116" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8116" ref_url="https://www.suse.com/security/cve/CVE-2014-8116" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1721-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3067-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00071.html" source="SUSE-SU"/>
    <description>
    The ELF parser (readelf.c) in file before 5.21 allows remote attackers to cause a denial of service (CPU consumption or crash) via a large number of (1) program or (2) section headers or (3) invalid capabilities.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8116/">CVE-2014-8116</cve>
	<bugzilla href="https://bugzilla.suse.com/910252">SUSE bug 910252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910253">SUSE bug 910253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917152">SUSE bug 917152</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334026" comment="file is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8117</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8117" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8117" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8117" ref_url="https://www.suse.com/security/cve/CVE-2014-8117" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1721-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3067-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00071.html" source="SUSE-SU"/>
    <description>
    softmagic.c in file before 5.21 does not properly limit recursion, which allows remote attackers to cause a denial of service (CPU consumption or crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8117/">CVE-2014-8117</cve>
	<bugzilla href="https://bugzilla.suse.com/910252">SUSE bug 910252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910253">SUSE bug 910253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917152">SUSE bug 917152</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334026" comment="file is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8118</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8118" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8118" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8118" ref_url="https://www.suse.com/security/cve/CVE-2014-8118" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1697-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1716-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00100.html" source="SUSE-SU"/>
    <description>
    Integer overflow in RPM 4.12 and earlier allows remote attackers to execute arbitrary code via a crafted CPIO header in the payload section of an RPM file, which triggers a stack-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8118/">CVE-2014-8118</cve>
	<bugzilla href="https://bugzilla.suse.com/1101137">SUSE bug 1101137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906803">SUSE bug 906803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908128">SUSE bug 908128</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567040" comment="popt-1.7-37.60.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567041" comment="popt-32bit-1.7-37.60.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567042" comment="rpm-4.4.2.3-37.60.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567043" comment="rpm-32bit-4.4.2.3-37.60.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8119</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8119" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8119" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8119" ref_url="https://www.suse.com/security/cve/CVE-2014-8119" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003801.html" source="SUSE-SU"/>
    <description>
    The find_ifcfg_path function in netcf before 0.2.7 might allow attackers to cause a denial of service (application crash) via vectors involving augeas path expressions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8119/">CVE-2014-8119</cve>
	<bugzilla href="https://bugzilla.suse.com/925225">SUSE bug 925225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566351" comment="libaugeas0-0.9.0-3.17.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8121</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8121" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8121" ref_url="https://www.suse.com/security/cve/CVE-2014-8121" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0955-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00084.html" source="SUSE-SU"/>
    <description>
    DB_LOOKUP in nss_files/files-XXX.c in the Name Service Switch (NSS) in GNU C Library (aka glibc or libc6) 2.21 and earlier does not properly check if a file is open, which allows remote attackers to cause a denial of service (infinite loop) by performing a look-up on a database while iterating over it, which triggers the file pointer to be reset.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-11"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8121/">CVE-2014-8121</cve>
	<bugzilla href="https://bugzilla.suse.com/918187">SUSE bug 918187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945779">SUSE bug 945779</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566585" comment="glibc-2.11.3-17.87.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566586" comment="glibc-32bit-2.11.3-17.87.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566587" comment="glibc-devel-2.11.3-17.87.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566588" comment="glibc-devel-32bit-2.11.3-17.87.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566589" comment="glibc-i18ndata-2.11.3-17.87.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566590" comment="glibc-locale-2.11.3-17.87.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566591" comment="glibc-locale-32bit-2.11.3-17.87.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566592" comment="nscd-2.11.3-17.87.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8127</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8127" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8127" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8127" ref_url="https://www.suse.com/security/cve/CVE-2014-8127" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002537.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0450-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1213-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0074-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00047.html" source="SUSE-SU"/>
    <description>
    LibTIFF 4.0.3 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted TIFF image to the (1) checkInkNamesString function in tif_dir.c in the thumbnail tool, (2) compresscontig function in tiff2bw.c in the tiff2bw tool, (3) putcontig8bitCIELab function in tif_getimage.c in the tiff2rgba tool, LZWPreDecode function in tif_lzw.c in the (4) tiff2ps or (5) tiffdither tool, (6) NeXTDecode function in tif_next.c in the tiffmedian tool, or (7) TIFFWriteDirectoryTagLongLong8Array function in tif_dirwrite.c in the tiffset tool.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8127/">CVE-2014-8127</cve>
	<bugzilla href="https://bugzilla.suse.com/914890">SUSE bug 914890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916925">SUSE bug 916925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942690">SUSE bug 942690</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567153" comment="libtiff3-3.8.2-141.160.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567154" comment="libtiff3-32bit-3.8.2-141.160.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8128</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8128" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8128" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8128" ref_url="https://www.suse.com/security/cve/CVE-2014-8128" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0073-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004228.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0450-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1213-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0097-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00041.html" source="SUSE-SU"/>
    <description>
    LibTIFF prior to 4.0.4, as used in Apple iOS before 8.4 and OS X before 10.10.4 and other products, allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted TIFF image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8128/">CVE-2014-8128</cve>
	<bugzilla href="https://bugzilla.suse.com/1007276">SUSE bug 1007276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017690">SUSE bug 1017690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040322">SUSE bug 1040322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914890">SUSE bug 914890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916925">SUSE bug 916925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942690">SUSE bug 942690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960341">SUSE bug 960341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974621">SUSE bug 974621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983436">SUSE bug 983436</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567153" comment="libtiff3-3.8.2-141.160.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567154" comment="libtiff3-32bit-3.8.2-141.160.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8129</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8129" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8129" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8129" ref_url="https://www.suse.com/security/cve/CVE-2014-8129" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001561.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0450-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1213-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00019.html" source="SUSE-SU"/>
    <description>
    LibTIFF 4.0.3 allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a crafted TIFF image, as demonstrated by failure of tif_next.c to verify that the BitsPerSample value is 2, and the t2p_sample_lab_signed_to_unsigned function in tiff2pdf.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8129/">CVE-2014-8129</cve>
	<bugzilla href="https://bugzilla.suse.com/914890">SUSE bug 914890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916925">SUSE bug 916925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942690">SUSE bug 942690</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567153" comment="libtiff3-3.8.2-141.160.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567154" comment="libtiff3-32bit-3.8.2-141.160.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8130</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8130" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8130" ref_url="https://www.suse.com/security/cve/CVE-2014-8130" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001561.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0450-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1213-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00019.html" source="SUSE-SU"/>
    <description>
    The _TIFFmalloc function in tif_unix.c in LibTIFF 4.0.3 does not reject a zero size, which allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted TIFF image that is mishandled by the TIFFWriteScanline function in tif_write.c, as demonstrated by tiffdither.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8130/">CVE-2014-8130</cve>
	<bugzilla href="https://bugzilla.suse.com/914890">SUSE bug 914890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916925">SUSE bug 916925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942690">SUSE bug 942690</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567153" comment="libtiff3-3.8.2-141.160.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567154" comment="libtiff3-32bit-3.8.2-141.160.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8131</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8131" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8131" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8131" ref_url="https://www.suse.com/security/cve/CVE-2014-8131" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:0008-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00005.html" source="SUSE-SU"/>
    <description>
    The qemu implementation of virConnectGetAllDomainStats in libvirt before 1.2.11 does not properly handle locks when a domain is skipped due to ACL restrictions, which allows a remote authenticated users to cause a denial of service (deadlock or segmentation fault and crash) via a request to access the users does not have privileges to access.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8131/">CVE-2014-8131</cve>
	<bugzilla href="https://bugzilla.suse.com/909274">SUSE bug 909274</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333954" comment="libvirt is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8132</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8132" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8132" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8132" ref_url="https://www.suse.com/security/cve/CVE-2014-8132" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001140.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0017-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00007.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in the ssh_packet_kexinit function in kex.c in libssh 0.5.x and 0.6.x before 0.6.4 allows remote attackers to cause a denial of service via a crafted kexinit packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8132/">CVE-2014-8132</cve>
	<bugzilla href="https://bugzilla.suse.com/910790">SUSE bug 910790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928323">SUSE bug 928323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334173" comment="libssh is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8133</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8133" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8133" ref_url="https://www.suse.com/security/cve/CVE-2014-8133" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1735-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
    <description>
    arch/x86/kernel/tls.c in the Thread Local Storage (TLS) implementation in the Linux kernel through 3.18.1 allows local users to bypass the espfix protection mechanism, and consequently makes it easier for local users to bypass the ASLR protection mechanism, via a crafted application that makes a set_thread_area system call and later reads a 16-bit value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8133/">CVE-2014-8133</cve>
	<bugzilla href="https://bugzilla.suse.com/817142">SUSE bug 817142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906545">SUSE bug 906545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907818">SUSE bug 907818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909077">SUSE bug 909077</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592521" comment="kernel-bigsmp-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592285" comment="kernel-default-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592286" comment="kernel-default-base-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592287" comment="kernel-default-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592288" comment="kernel-default-extra-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592289" comment="kernel-pae-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592290" comment="kernel-pae-base-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592291" comment="kernel-pae-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592292" comment="kernel-pae-extra-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592293" comment="kernel-source-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592294" comment="kernel-syms-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592295" comment="kernel-trace-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592296" comment="kernel-xen-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592297" comment="kernel-xen-base-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592298" comment="kernel-xen-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592299" comment="kernel-xen-extra-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592300" comment="xen-kmp-default-4.2.5_04_3.0.101_0.47.50-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592301" comment="xen-kmp-pae-4.2.5_04_3.0.101_0.47.50-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8134</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8134" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8134" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8134" ref_url="https://www.suse.com/security/cve/CVE-2014-8134" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0713-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.html" source="SUSE-SU"/>
    <description>
    The paravirt_ops_setup function in arch/x86/kernel/kvm.c in the Linux kernel through 3.18 uses an improper paravirt_enabled setting for KVM guest kernels, which makes it easier for guest OS users to bypass the ASLR protection mechanism via a crafted application that reads a 16-bit value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8134/">CVE-2014-8134</cve>
	<bugzilla href="https://bugzilla.suse.com/907818">SUSE bug 907818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909077">SUSE bug 909077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909078">SUSE bug 909078</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592521" comment="kernel-bigsmp-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592285" comment="kernel-default-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592286" comment="kernel-default-base-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592287" comment="kernel-default-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592288" comment="kernel-default-extra-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592289" comment="kernel-pae-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592290" comment="kernel-pae-base-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592291" comment="kernel-pae-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592292" comment="kernel-pae-extra-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592293" comment="kernel-source-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592294" comment="kernel-syms-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592295" comment="kernel-trace-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592296" comment="kernel-xen-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592297" comment="kernel-xen-base-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592298" comment="kernel-xen-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592299" comment="kernel-xen-extra-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592300" comment="xen-kmp-default-4.2.5_04_3.0.101_0.47.50-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592301" comment="xen-kmp-pae-4.2.5_04_3.0.101_0.47.50-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8135</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8135" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8135" ref_url="https://www.suse.com/security/cve/CVE-2014-8135" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:0008-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00005.html" source="SUSE-SU"/>
    <description>
    The storageVolUpload function in storage/storage_driver.c in libvirt before 1.2.11 does not check a certain return value, which allows local users to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted offset value in a "virsh vol-upload" command.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8135/">CVE-2014-8135</cve>
	<bugzilla href="https://bugzilla.suse.com/910860">SUSE bug 910860</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333954" comment="libvirt is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8136</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8136" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8136" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8136" ref_url="https://www.suse.com/security/cve/CVE-2014-8136" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001213.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0006-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0008-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00005.html" source="SUSE-SU"/>
    <description>
    The (1) qemuDomainMigratePerform and (2) qemuDomainMigrateFinish2 functions in qemu/qemu_driver.c in libvirt do not unlock the domain when an ACL check fails, which allow local users to cause a denial of service via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8136/">CVE-2014-8136</cve>
	<bugzilla href="https://bugzilla.suse.com/910862">SUSE bug 910862</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333954" comment="libvirt is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8137</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8137" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8137" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8137" ref_url="https://www.suse.com/security/cve/CVE-2014-8137" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001216.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0038-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0039-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0042-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2737-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00018.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in the jas_iccattrval_destroy function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted ICC color profile in a JPEG 2000 image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8137/">CVE-2014-8137</cve>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909474">SUSE bug 909474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909475">SUSE bug 909475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911837">SUSE bug 911837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968373">SUSE bug 968373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566638" comment="libjasper-1.900.1-134.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566639" comment="libjasper-32bit-1.900.1-134.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8138</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8138" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8138" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8138" ref_url="https://www.suse.com/security/cve/CVE-2014-8138" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001216.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0217-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2737-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00018.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the jp2_decode function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted JPEG 2000 file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8138/">CVE-2014-8138</cve>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909474">SUSE bug 909474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909475">SUSE bug 909475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911837">SUSE bug 911837</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566638" comment="libjasper-1.900.1-134.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566639" comment="libjasper-32bit-1.900.1-134.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8139</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8139" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8139" ref_url="https://www.suse.com/security/cve/CVE-2014-8139" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001255.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0240-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00036.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the CRC32 verification in Info-ZIP UnZip 6.0 and earlier allows remote attackers to execute arbitrary code via a crafted zip file in the -t command argument to the unzip command.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-12"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8139/">CVE-2014-8139</cve>
	<bugzilla href="https://bugzilla.suse.com/909214">SUSE bug 909214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915880">SUSE bug 915880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567155" comment="unzip-6.00-11.13.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8140</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8140" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8140" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8140" ref_url="https://www.suse.com/security/cve/CVE-2014-8140" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001161.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0240-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00036.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the test_compr_eb function in Info-ZIP UnZip 6.0 and earlier allows remote attackers to execute arbitrary code via a crafted zip file in the -t command argument to the unzip command.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-12"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8140/">CVE-2014-8140</cve>
	<bugzilla href="https://bugzilla.suse.com/909214">SUSE bug 909214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914442">SUSE bug 914442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915880">SUSE bug 915880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593374" comment="unzip-6.00-11.9.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8141</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8141" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8141" ref_url="https://www.suse.com/security/cve/CVE-2014-8141" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001161.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0240-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00036.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the getZip64Data function in Info-ZIP UnZip 6.0 and earlier allows remote attackers to execute arbitrary code via a crafted zip file in the -t command argument to the unzip command.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-12"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8141/">CVE-2014-8141</cve>
	<bugzilla href="https://bugzilla.suse.com/909214">SUSE bug 909214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915880">SUSE bug 915880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593374" comment="unzip-6.00-11.9.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8143</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8143" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8143" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8143" ref_url="https://www.suse.com/security/cve/CVE-2014-8143" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:0375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" source="SUSE-SU"/>
    <description>
    Samba 4.0.x before 4.0.24, 4.1.x before 4.1.16, and 4.2.x before 4.2rc4, when an Active Directory Domain Controller (AD DC) is configured, allows remote authenticated users to set the LDB userAccountControl UF_SERVER_TRUST_ACCOUNT bit, and consequently gain privileges, by leveraging delegation of authority for user-account or computer-account creation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8143/">CVE-2014-8143</cve>
	<bugzilla href="https://bugzilla.suse.com/914279">SUSE bug 914279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333940" comment="samba is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8146</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8146" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8146" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8146" ref_url="https://www.suse.com/security/cve/CVE-2014-8146" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1401-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004696.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2368-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00116.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0588-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00156.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2364-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1422-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00103.html" source="SUSE-SU"/>
    <description>
    The resolveImplicitLevels function in common/ubidi.c in the Unicode Bidirectional Algorithm implementation in ICU4C in International Components for Unicode (ICU) before 55.1 does not properly track directionally isolated pieces of text, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly execute arbitrary code via crafted text.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8146/">CVE-2014-8146</cve>
	<bugzilla href="https://bugzilla.suse.com/1066493">SUSE bug 1066493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910805">SUSE bug 910805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927951">SUSE bug 927951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929629">SUSE bug 929629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959178">SUSE bug 959178</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009564685" comment="google-carlito-fonts-1.1.03.beta1-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564687" comment="libhyphen0-2.8.8-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564688" comment="libmythes-1_2-0-1.2.4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564689" comment="libreoffice-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564690" comment="libreoffice-base-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564691" comment="libreoffice-base-drivers-postgresql-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564693" comment="libreoffice-calc-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564694" comment="libreoffice-calc-extensions-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564695" comment="libreoffice-draw-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564696" comment="libreoffice-filters-optional-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564697" comment="libreoffice-gnome-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564698" comment="libreoffice-icon-theme-galaxy-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564699" comment="libreoffice-icon-theme-tango-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564700" comment="libreoffice-impress-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564701" comment="libreoffice-kde4-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564702" comment="libreoffice-l10n-af-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564703" comment="libreoffice-l10n-ar-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564704" comment="libreoffice-l10n-ca-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564705" comment="libreoffice-l10n-cs-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564706" comment="libreoffice-l10n-da-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564707" comment="libreoffice-l10n-de-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564708" comment="libreoffice-l10n-en-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564709" comment="libreoffice-l10n-es-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564710" comment="libreoffice-l10n-fi-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564711" comment="libreoffice-l10n-fr-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564712" comment="libreoffice-l10n-gu-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564713" comment="libreoffice-l10n-hi-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564714" comment="libreoffice-l10n-hu-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564715" comment="libreoffice-l10n-it-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564716" comment="libreoffice-l10n-ja-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564717" comment="libreoffice-l10n-ko-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564718" comment="libreoffice-l10n-nb-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564719" comment="libreoffice-l10n-nl-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564720" comment="libreoffice-l10n-nn-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564721" comment="libreoffice-l10n-pl-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564722" comment="libreoffice-l10n-pt-BR-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564723" comment="libreoffice-l10n-pt-PT-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564724" comment="libreoffice-l10n-ru-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564725" comment="libreoffice-l10n-sk-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564726" comment="libreoffice-l10n-sv-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564727" comment="libreoffice-l10n-xh-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564728" comment="libreoffice-l10n-zh-Hans-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564729" comment="libreoffice-l10n-zh-Hant-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564730" comment="libreoffice-l10n-zu-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564731" comment="libreoffice-mailmerge-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564732" comment="libreoffice-math-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564733" comment="libreoffice-officebean-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564734" comment="libreoffice-pyuno-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564735" comment="libreoffice-sdk-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515206" comment="libreoffice-share-linker-1-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564736" comment="libreoffice-voikko-4.1-2.26 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564737" comment="libreoffice-writer-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564738" comment="libreoffice-writer-extensions-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564740" comment="libvoikko1-3.7.1-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564741" comment="myspell-af_NA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564742" comment="myspell-af_ZA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564743" comment="myspell-ar-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564744" comment="myspell-ar_AE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564745" comment="myspell-ar_BH-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564746" comment="myspell-ar_DZ-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564747" comment="myspell-ar_EG-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564748" comment="myspell-ar_IQ-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564749" comment="myspell-ar_JO-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564750" comment="myspell-ar_KW-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564751" comment="myspell-ar_LB-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564752" comment="myspell-ar_LY-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564753" comment="myspell-ar_MA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564754" comment="myspell-ar_OM-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564755" comment="myspell-ar_QA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564756" comment="myspell-ar_SA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564757" comment="myspell-ar_SD-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564758" comment="myspell-ar_SY-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564759" comment="myspell-ar_TN-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564760" comment="myspell-ar_YE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564761" comment="myspell-be_BY-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564762" comment="myspell-bg_BG-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564763" comment="myspell-bn_BD-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564764" comment="myspell-bn_IN-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564765" comment="myspell-bs-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564766" comment="myspell-bs_BA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564767" comment="myspell-ca-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564768" comment="myspell-ca_AD-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564769" comment="myspell-ca_ES-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564770" comment="myspell-ca_ES_valencia-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564771" comment="myspell-ca_FR-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564772" comment="myspell-ca_IT-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564773" comment="myspell-cs_CZ-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564774" comment="myspell-da_DK-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564775" comment="myspell-de-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564776" comment="myspell-de_AT-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564777" comment="myspell-de_CH-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564778" comment="myspell-de_DE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564779" comment="myspell-dictionaries-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564780" comment="myspell-el_GR-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564781" comment="myspell-en-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564782" comment="myspell-en_AU-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564783" comment="myspell-en_BS-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564784" comment="myspell-en_BZ-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564785" comment="myspell-en_CA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564786" comment="myspell-en_GB-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564787" comment="myspell-en_GH-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564788" comment="myspell-en_IE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564789" comment="myspell-en_IN-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564790" comment="myspell-en_JM-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564791" comment="myspell-en_MW-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564792" comment="myspell-en_NA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564793" comment="myspell-en_NZ-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564794" comment="myspell-en_PH-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564795" comment="myspell-en_TT-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564796" comment="myspell-en_US-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564797" comment="myspell-en_ZA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564798" comment="myspell-en_ZW-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564799" comment="myspell-es-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564800" comment="myspell-es_AR-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564801" comment="myspell-es_BO-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564802" comment="myspell-es_CL-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564803" comment="myspell-es_CO-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564804" comment="myspell-es_CR-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564805" comment="myspell-es_CU-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564806" comment="myspell-es_DO-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564807" comment="myspell-es_EC-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564808" comment="myspell-es_ES-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564809" comment="myspell-es_GT-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564810" comment="myspell-es_HN-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564811" comment="myspell-es_MX-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564812" comment="myspell-es_NI-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564813" comment="myspell-es_PA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564814" comment="myspell-es_PE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564815" comment="myspell-es_PR-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564816" comment="myspell-es_PY-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564817" comment="myspell-es_SV-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564818" comment="myspell-es_UY-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564819" comment="myspell-es_VE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564820" comment="myspell-et_EE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564821" comment="myspell-fr_BE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564822" comment="myspell-fr_CA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564823" comment="myspell-fr_CH-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564824" comment="myspell-fr_FR-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564825" comment="myspell-fr_LU-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564826" comment="myspell-fr_MC-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564827" comment="myspell-gu_IN-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564828" comment="myspell-he_IL-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564829" comment="myspell-hi_IN-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564830" comment="myspell-hr_HR-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564831" comment="myspell-hu_HU-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564832" comment="myspell-it_IT-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564833" comment="myspell-lightproof-en-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564834" comment="myspell-lightproof-hu_HU-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564835" comment="myspell-lightproof-pt_BR-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564836" comment="myspell-lightproof-ru_RU-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564837" comment="myspell-lo_LA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564838" comment="myspell-lt_LT-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564839" comment="myspell-lv_LV-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564840" comment="myspell-nb_NO-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564841" comment="myspell-nl_BE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564842" comment="myspell-nl_NL-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564843" comment="myspell-nn_NO-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564844" comment="myspell-no-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564845" comment="myspell-pl_PL-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564846" comment="myspell-pt_AO-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564847" comment="myspell-pt_BR-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564848" comment="myspell-pt_PT-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564849" comment="myspell-ro-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564850" comment="myspell-ro_RO-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564851" comment="myspell-ru_RU-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564852" comment="myspell-sk_SK-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564853" comment="myspell-sl_SI-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564854" comment="myspell-sr-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564855" comment="myspell-sr_CS-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564856" comment="myspell-sr_Latn_CS-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564857" comment="myspell-sr_Latn_RS-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564858" comment="myspell-sr_RS-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564859" comment="myspell-sv_FI-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564860" comment="myspell-sv_SE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564861" comment="myspell-te-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564862" comment="myspell-te_IN-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564863" comment="myspell-th_TH-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564864" comment="myspell-vi-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564865" comment="myspell-vi_VN-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564866" comment="myspell-zu_ZA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564868" comment="python-importlib-1.0.2-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8147</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8147" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8147" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8147" ref_url="https://www.suse.com/security/cve/CVE-2014-8147" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1401-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004696.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2368-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00116.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0588-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00156.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2364-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1422-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00103.html" source="SUSE-SU"/>
    <description>
    The resolveImplicitLevels function in common/ubidi.c in the Unicode Bidirectional Algorithm implementation in ICU4C in International Components for Unicode (ICU) before 55.1 uses an integer data type that is inconsistent with a header file, which allows remote attackers to cause a denial of service (incorrect malloc followed by invalid free) or possibly execute arbitrary code via crafted text.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8147/">CVE-2014-8147</cve>
	<bugzilla href="https://bugzilla.suse.com/1066493">SUSE bug 1066493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079317">SUSE bug 1079317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910805">SUSE bug 910805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910806">SUSE bug 910806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927951">SUSE bug 927951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929629">SUSE bug 929629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959178">SUSE bug 959178</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009564685" comment="google-carlito-fonts-1.1.03.beta1-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564687" comment="libhyphen0-2.8.8-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564688" comment="libmythes-1_2-0-1.2.4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564689" comment="libreoffice-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564690" comment="libreoffice-base-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564691" comment="libreoffice-base-drivers-postgresql-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564693" comment="libreoffice-calc-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564694" comment="libreoffice-calc-extensions-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564695" comment="libreoffice-draw-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564696" comment="libreoffice-filters-optional-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564697" comment="libreoffice-gnome-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564698" comment="libreoffice-icon-theme-galaxy-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564699" comment="libreoffice-icon-theme-tango-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564700" comment="libreoffice-impress-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564701" comment="libreoffice-kde4-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564702" comment="libreoffice-l10n-af-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564703" comment="libreoffice-l10n-ar-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564704" comment="libreoffice-l10n-ca-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564705" comment="libreoffice-l10n-cs-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564706" comment="libreoffice-l10n-da-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564707" comment="libreoffice-l10n-de-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564708" comment="libreoffice-l10n-en-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564709" comment="libreoffice-l10n-es-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564710" comment="libreoffice-l10n-fi-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564711" comment="libreoffice-l10n-fr-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564712" comment="libreoffice-l10n-gu-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564713" comment="libreoffice-l10n-hi-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564714" comment="libreoffice-l10n-hu-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564715" comment="libreoffice-l10n-it-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564716" comment="libreoffice-l10n-ja-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564717" comment="libreoffice-l10n-ko-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564718" comment="libreoffice-l10n-nb-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564719" comment="libreoffice-l10n-nl-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564720" comment="libreoffice-l10n-nn-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564721" comment="libreoffice-l10n-pl-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564722" comment="libreoffice-l10n-pt-BR-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564723" comment="libreoffice-l10n-pt-PT-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564724" comment="libreoffice-l10n-ru-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564725" comment="libreoffice-l10n-sk-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564726" comment="libreoffice-l10n-sv-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564727" comment="libreoffice-l10n-xh-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564728" comment="libreoffice-l10n-zh-Hans-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564729" comment="libreoffice-l10n-zh-Hant-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564730" comment="libreoffice-l10n-zu-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564731" comment="libreoffice-mailmerge-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564732" comment="libreoffice-math-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564733" comment="libreoffice-officebean-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564734" comment="libreoffice-pyuno-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564735" comment="libreoffice-sdk-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515206" comment="libreoffice-share-linker-1-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564736" comment="libreoffice-voikko-4.1-2.26 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564737" comment="libreoffice-writer-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564738" comment="libreoffice-writer-extensions-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564740" comment="libvoikko1-3.7.1-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564741" comment="myspell-af_NA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564742" comment="myspell-af_ZA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564743" comment="myspell-ar-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564744" comment="myspell-ar_AE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564745" comment="myspell-ar_BH-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564746" comment="myspell-ar_DZ-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564747" comment="myspell-ar_EG-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564748" comment="myspell-ar_IQ-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564749" comment="myspell-ar_JO-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564750" comment="myspell-ar_KW-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564751" comment="myspell-ar_LB-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564752" comment="myspell-ar_LY-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564753" comment="myspell-ar_MA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564754" comment="myspell-ar_OM-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564755" comment="myspell-ar_QA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564756" comment="myspell-ar_SA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564757" comment="myspell-ar_SD-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564758" comment="myspell-ar_SY-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564759" comment="myspell-ar_TN-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564760" comment="myspell-ar_YE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564761" comment="myspell-be_BY-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564762" comment="myspell-bg_BG-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564763" comment="myspell-bn_BD-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564764" comment="myspell-bn_IN-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564765" comment="myspell-bs-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564766" comment="myspell-bs_BA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564767" comment="myspell-ca-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564768" comment="myspell-ca_AD-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564769" comment="myspell-ca_ES-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564770" comment="myspell-ca_ES_valencia-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564771" comment="myspell-ca_FR-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564772" comment="myspell-ca_IT-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564773" comment="myspell-cs_CZ-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564774" comment="myspell-da_DK-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564775" comment="myspell-de-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564776" comment="myspell-de_AT-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564777" comment="myspell-de_CH-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564778" comment="myspell-de_DE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564779" comment="myspell-dictionaries-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564780" comment="myspell-el_GR-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564781" comment="myspell-en-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564782" comment="myspell-en_AU-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564783" comment="myspell-en_BS-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564784" comment="myspell-en_BZ-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564785" comment="myspell-en_CA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564786" comment="myspell-en_GB-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564787" comment="myspell-en_GH-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564788" comment="myspell-en_IE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564789" comment="myspell-en_IN-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564790" comment="myspell-en_JM-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564791" comment="myspell-en_MW-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564792" comment="myspell-en_NA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564793" comment="myspell-en_NZ-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564794" comment="myspell-en_PH-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564795" comment="myspell-en_TT-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564796" comment="myspell-en_US-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564797" comment="myspell-en_ZA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564798" comment="myspell-en_ZW-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564799" comment="myspell-es-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564800" comment="myspell-es_AR-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564801" comment="myspell-es_BO-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564802" comment="myspell-es_CL-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564803" comment="myspell-es_CO-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564804" comment="myspell-es_CR-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564805" comment="myspell-es_CU-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564806" comment="myspell-es_DO-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564807" comment="myspell-es_EC-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564808" comment="myspell-es_ES-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564809" comment="myspell-es_GT-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564810" comment="myspell-es_HN-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564811" comment="myspell-es_MX-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564812" comment="myspell-es_NI-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564813" comment="myspell-es_PA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564814" comment="myspell-es_PE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564815" comment="myspell-es_PR-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564816" comment="myspell-es_PY-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564817" comment="myspell-es_SV-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564818" comment="myspell-es_UY-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564819" comment="myspell-es_VE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564820" comment="myspell-et_EE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564821" comment="myspell-fr_BE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564822" comment="myspell-fr_CA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564823" comment="myspell-fr_CH-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564824" comment="myspell-fr_FR-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564825" comment="myspell-fr_LU-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564826" comment="myspell-fr_MC-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564827" comment="myspell-gu_IN-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564828" comment="myspell-he_IL-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564829" comment="myspell-hi_IN-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564830" comment="myspell-hr_HR-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564831" comment="myspell-hu_HU-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564832" comment="myspell-it_IT-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564833" comment="myspell-lightproof-en-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564834" comment="myspell-lightproof-hu_HU-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564835" comment="myspell-lightproof-pt_BR-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564836" comment="myspell-lightproof-ru_RU-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564837" comment="myspell-lo_LA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564838" comment="myspell-lt_LT-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564839" comment="myspell-lv_LV-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564840" comment="myspell-nb_NO-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564841" comment="myspell-nl_BE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564842" comment="myspell-nl_NL-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564843" comment="myspell-nn_NO-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564844" comment="myspell-no-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564845" comment="myspell-pl_PL-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564846" comment="myspell-pt_AO-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564847" comment="myspell-pt_BR-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564848" comment="myspell-pt_PT-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564849" comment="myspell-ro-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564850" comment="myspell-ro_RO-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564851" comment="myspell-ru_RU-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564852" comment="myspell-sk_SK-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564853" comment="myspell-sl_SI-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564854" comment="myspell-sr-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564855" comment="myspell-sr_CS-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564856" comment="myspell-sr_Latn_CS-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564857" comment="myspell-sr_Latn_RS-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564858" comment="myspell-sr_RS-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564859" comment="myspell-sv_FI-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564860" comment="myspell-sv_SE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564861" comment="myspell-te-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564862" comment="myspell-te_IN-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564863" comment="myspell-th_TH-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564864" comment="myspell-vi-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564865" comment="myspell-vi_VN-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564866" comment="myspell-zu_ZA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564868" comment="python-importlib-1.0.2-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8150</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8150" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8150" ref_url="https://www.suse.com/security/cve/CVE-2014-8150" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001199.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0248-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00040.html" source="SUSE-SU"/>
    <description>
    CRLF injection vulnerability in libcurl 6.0 through 7.x before 7.40.0, when using an HTTP proxy, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in a URL.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8150/">CVE-2014-8150</cve>
	<bugzilla href="https://bugzilla.suse.com/911363">SUSE bug 911363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566390" comment="curl-7.19.7-1.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566391" comment="libcurl4-7.19.7-1.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566392" comment="libcurl4-32bit-7.19.7-1.40.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8151</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8151" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8151" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8151" ref_url="https://www.suse.com/security/cve/CVE-2014-8151" source="SUSE CVE"/>
    <description>
    The darwinssl_connect_step1 function in lib/vtls/curl_darwinssl.c in libcurl 7.31.0 through 7.39.0, when using the DarwinSSL (aka SecureTransport) back-end for TLS, does not check if a cached TLS session validated the certificate when reusing the session, which allows man-in-the-middle attackers to spoof servers via a crafted certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8151/">CVE-2014-8151</cve>
	<bugzilla href="https://bugzilla.suse.com/911363">SUSE bug 911363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911666">SUSE bug 911666</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333977" comment="curl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8155</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8155" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8155" ref_url="https://www.suse.com/security/cve/CVE-2014-8155" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001333.html" source="SUSE-SU"/>
    <description>
    GnuTLS before 2.9.10 does not verify the activation and expiration dates of CA certificates, which allows man-in-the-middle attackers to spoof servers via a certificate issued by a CA certificate that is (1) not yet valid or (2) no longer valid.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8155/">CVE-2014-8155</cve>
	<bugzilla href="https://bugzilla.suse.com/920366">SUSE bug 920366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593474" comment="gnutls-2.4.1-24.39.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593475" comment="libgnutls26-2.4.1-24.39.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593476" comment="libgnutls26-32bit-2.4.1-24.39.55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8159</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8159" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8159" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8159" ref_url="https://www.suse.com/security/cve/CVE-2014-8159" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1478-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1487-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1488-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1489-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1491-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00011.html" source="SUSE-SU"/>
    <description>
    The InfiniBand (IB) implementation in the Linux kernel package before 2.6.32-504.12.2 on Red Hat Enterprise Linux (RHEL) 6 does not properly restrict use of User Verbs for registration of memory regions, which allows local users to access arbitrary physical memory locations, and consequently cause a denial of service (system crash) or gain privileges, by leveraging permissions on a uverbs device under /dev/infiniband/.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8159/">CVE-2014-8159</cve>
	<bugzilla href="https://bugzilla.suse.com/903967">SUSE bug 903967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914742">SUSE bug 914742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939241">SUSE bug 939241</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593262" comment="kernel-default-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593263" comment="kernel-default-base-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593264" comment="kernel-default-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593265" comment="kernel-default-extra-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593266" comment="kernel-pae-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593267" comment="kernel-pae-base-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593268" comment="kernel-pae-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593269" comment="kernel-pae-extra-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593270" comment="kernel-source-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593271" comment="kernel-syms-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593272" comment="kernel-trace-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593273" comment="kernel-xen-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593274" comment="kernel-xen-base-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593275" comment="kernel-xen-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593276" comment="kernel-xen-extra-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590534" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590535" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8160</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8160" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8160" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8160" ref_url="https://www.suse.com/security/cve/CVE-2014-8160" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0529-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="TID7016668" ref_url="https://www.suse.com/support/kb/doc?id=7016668" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0713-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.html" source="SUSE-SU"/>
    <description>
    net/netfilter/nf_conntrack_proto_generic.c in the Linux kernel before 3.18 generates incorrect conntrack entries during handling of certain iptables rule sets for the SCTP, DCCP, GRE, and UDP-Lite protocols, which allows remote attackers to bypass intended access restrictions via packets with disallowed port numbers.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8160/">CVE-2014-8160</cve>
	<bugzilla href="https://bugzilla.suse.com/857643">SUSE bug 857643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913059">SUSE bug 913059</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592521" comment="kernel-bigsmp-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592285" comment="kernel-default-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592286" comment="kernel-default-base-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592287" comment="kernel-default-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592288" comment="kernel-default-extra-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592289" comment="kernel-pae-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592290" comment="kernel-pae-base-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592291" comment="kernel-pae-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592292" comment="kernel-pae-extra-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592293" comment="kernel-source-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592294" comment="kernel-syms-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592295" comment="kernel-trace-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592296" comment="kernel-xen-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592297" comment="kernel-xen-base-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592298" comment="kernel-xen-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592299" comment="kernel-xen-extra-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592300" comment="xen-kmp-default-4.2.5_04_3.0.101_0.47.50-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592301" comment="xen-kmp-pae-4.2.5_04_3.0.101_0.47.50-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8161</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8161" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8161" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8161" ref_url="https://www.suse.com/security/cve/CVE-2014-8161" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001321.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0414-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0499-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00042.html" source="SUSE-SU"/>
    <description>
    PostgreSQL before 9.0.19, 9.1.x before 9.1.15, 9.2.x before 9.2.10, 9.3.x before 9.3.6, and 9.4.x before 9.4.1 allows remote authenticated users to obtain sensitive column values by triggering constraint violation and then reading the error message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8161/">CVE-2014-8161</cve>
	<bugzilla href="https://bugzilla.suse.com/916953">SUSE bug 916953</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567049" comment="libecpg6-9.1.15-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567050" comment="libpq5-9.1.15-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567051" comment="libpq5-32bit-9.1.15-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567052" comment="postgresql91-9.1.15-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567053" comment="postgresql91-docs-9.1.15-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8182</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8182" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8182" ref_url="https://www.suse.com/security/cve/CVE-2014-8182" source="SUSE CVE"/>
    <description>
    An off-by-one error leading to a crash was discovered in openldap 2.4 when processing DNS SRV messages. If slapd was configured to use the dnssrv backend, an attacker could crash the service with crafted DNS responses.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8182/">CVE-2014-8182</cve>
	<bugzilla href="https://bugzilla.suse.com/998096">SUSE bug 998096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336726" comment="openldap2-client is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8242</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8242" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8242" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8242" ref_url="https://www.suse.com/security/cve/CVE-2014-8242" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001813.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1752-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00034.html" source="SUSE-SU"/>
    <description>
    librsync before 1.0.0 uses a truncated MD4 checksum to match blocks, which makes it easier for remote attackers to modify transmitted data via a birthday attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8242/">CVE-2014-8242</cve>
	<bugzilla href="https://bugzilla.suse.com/900914">SUSE bug 900914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922710">SUSE bug 922710</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567101" comment="rsync-3.0.4-2.49.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8275</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8275" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8275" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8275" ref_url="https://www.suse.com/security/cve/CVE-2014-8275" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0172-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="TID7021823" ref_url="https://www.suse.com/support/kb/doc/?id=7021823" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0130-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not enforce certain constraints on certificate data, which allows remote attackers to defeat a fingerprint-based certificate-blacklist protection mechanism by including crafted data within a certificate's unsigned portion, related to crypto/asn1/a_verify.c, crypto/dsa/dsa_asn1.c, crypto/ecdsa/ecs_vrf.c, and crypto/x509/x_all.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8275/">CVE-2014-8275</cve>
	<bugzilla href="https://bugzilla.suse.com/912018">SUSE bug 912018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592978" comment="compat-openssl097g-0.9.7g-146.22.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592979" comment="compat-openssl097g-32bit-0.9.7g-146.22.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592963" comment="libmysql55client18-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592964" comment="libmysql55client18-32bit-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592965" comment="libmysql55client_r18-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592966" comment="libmysql55client_r18-32bit-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590297" comment="libmysqlclient15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590298" comment="libmysqlclient15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590299" comment="libmysqlclient_r15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590300" comment="libmysqlclient_r15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592980" comment="libopenssl0_9_8-0.9.8j-0.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592981" comment="libopenssl0_9_8-32bit-0.9.8j-0.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592967" comment="mysql-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592968" comment="mysql-client-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592982" comment="openssl-0.9.8j-0.68.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8354</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8354" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8354" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8354" ref_url="https://www.suse.com/security/cve/CVE-2014-8354" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001111.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00036.html" source="SUSE-SU"/>
    <description>
    The HorizontalFilter function in resize.c in ImageMagick before 6.8.9-9 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-14"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8354/">CVE-2014-8354</cve>
	<bugzilla href="https://bugzilla.suse.com/903204">SUSE bug 903204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903638">SUSE bug 903638</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566313" comment="ImageMagick-6.4.3.6-7.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566314" comment="libMagick++1-6.4.3.6-7.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566315" comment="libMagickCore1-6.4.3.6-7.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566316" comment="libMagickCore1-32bit-6.4.3.6-7.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566317" comment="libMagickWand1-6.4.3.6-7.30.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8355</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8355" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8355" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8355" ref_url="https://www.suse.com/security/cve/CVE-2014-8355" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001111.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00036.html" source="SUSE-SU"/>
    <description>
    PCX parser code in ImageMagick before 6.8.9-9 allows remote attackers to cause a denial of service (out-of-bounds read).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-14"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8355/">CVE-2014-8355</cve>
	<bugzilla href="https://bugzilla.suse.com/903216">SUSE bug 903216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903638">SUSE bug 903638</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566313" comment="ImageMagick-6.4.3.6-7.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566314" comment="libMagick++1-6.4.3.6-7.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566315" comment="libMagickCore1-6.4.3.6-7.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566316" comment="libMagickCore1-32bit-6.4.3.6-7.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566317" comment="libMagickWand1-6.4.3.6-7.30.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148369" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8369</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8369" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8369" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8369" ref_url="https://www.suse.com/security/cve/CVE-2014-8369" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    The kvm_iommu_map_pages function in virt/kvm/iommu.c in the Linux kernel through 3.17.2 miscalculates the number of pages during the handling of a mapping failure, which allows guest OS users to cause a denial of service (host OS page unpinning) or possibly have unspecified other impact by leveraging guest OS privileges.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2014-3601.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8369/">CVE-2014-8369</cve>
	<bugzilla href="https://bugzilla.suse.com/892782">SUSE bug 892782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902675">SUSE bug 902675</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592521" comment="kernel-bigsmp-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592285" comment="kernel-default-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592286" comment="kernel-default-base-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592287" comment="kernel-default-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592288" comment="kernel-default-extra-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592289" comment="kernel-pae-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592290" comment="kernel-pae-base-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592291" comment="kernel-pae-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592292" comment="kernel-pae-extra-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592293" comment="kernel-source-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592294" comment="kernel-syms-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592295" comment="kernel-trace-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592296" comment="kernel-xen-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592297" comment="kernel-xen-base-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592298" comment="kernel-xen-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592299" comment="kernel-xen-extra-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592300" comment="xen-kmp-default-4.2.5_04_3.0.101_0.47.50-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592301" comment="xen-kmp-pae-4.2.5_04_3.0.101_0.47.50-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148437" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8437</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8437" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8437" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8437" ref_url="https://www.suse.com/security/cve/CVE-2014-8437" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1442-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK &amp; Compiler before 15.0.0.356 allow remote attackers to discover session tokens via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8437/">CVE-2014-8437</cve>
	<bugzilla href="https://bugzilla.suse.com/905032">SUSE bug 905032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566535" comment="flash-player-11.2.202.418-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566536" comment="flash-player-gnome-11.2.202.418-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566537" comment="flash-player-kde4-11.2.202.418-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8438</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8438" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8438" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8438" ref_url="https://www.suse.com/security/cve/CVE-2014-8438" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1442-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK &amp; Compiler before 15.0.0.356 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-0573 and CVE-2014-0588.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8438/">CVE-2014-8438</cve>
	<bugzilla href="https://bugzilla.suse.com/905032">SUSE bug 905032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566535" comment="flash-player-11.2.202.418-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566536" comment="flash-player-gnome-11.2.202.418-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566537" comment="flash-player-kde4-11.2.202.418-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8439</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8439" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8439" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8439" ref_url="https://www.suse.com/security/cve/CVE-2014-8439" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1545-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1508-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1562-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00004.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.258 and 14.x and 15.x before 15.0.0.239 on Windows and OS X and before 11.2.202.424 on Linux, Adobe AIR before 15.0.0.293, Adobe AIR SDK before 15.0.0.302, and Adobe AIR SDK &amp; Compiler before 15.0.0.302 allow attackers to execute arbitrary code or cause a denial of service (invalid pointer dereference) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8439/">CVE-2014-8439</cve>
	<bugzilla href="https://bugzilla.suse.com/907257">SUSE bug 907257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909219">SUSE bug 909219</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593490" comment="flash-player-11.2.202.424-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593491" comment="flash-player-gnome-11.2.202.424-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593492" comment="flash-player-kde4-11.2.202.424-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8440</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8440" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8440" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8440" ref_url="https://www.suse.com/security/cve/CVE-2014-8440" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1442-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK &amp; Compiler before 15.0.0.356 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0576, CVE-2014-0581, and CVE-2014-8441.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8440/">CVE-2014-8440</cve>
	<bugzilla href="https://bugzilla.suse.com/905032">SUSE bug 905032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566535" comment="flash-player-11.2.202.418-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566536" comment="flash-player-gnome-11.2.202.418-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566537" comment="flash-player-kde4-11.2.202.418-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8441</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8441" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8441" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8441" ref_url="https://www.suse.com/security/cve/CVE-2014-8441" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1442-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK &amp; Compiler before 15.0.0.356 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0576, CVE-2014-0581, and CVE-2014-8440.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8441/">CVE-2014-8441</cve>
	<bugzilla href="https://bugzilla.suse.com/905032">SUSE bug 905032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566535" comment="flash-player-11.2.202.418-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566536" comment="flash-player-gnome-11.2.202.418-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566537" comment="flash-player-kde4-11.2.202.418-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8442</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8442" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8442" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8442" ref_url="https://www.suse.com/security/cve/CVE-2014-8442" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1442-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK &amp; Compiler before 15.0.0.356 allow attackers to complete a transition from Low Integrity to Medium Integrity by leveraging incorrect permissions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8442/">CVE-2014-8442</cve>
	<bugzilla href="https://bugzilla.suse.com/905032">SUSE bug 905032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566535" comment="flash-player-11.2.202.418-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566536" comment="flash-player-gnome-11.2.202.418-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566537" comment="flash-player-kde4-11.2.202.418-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8443</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8443" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8443" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8443" ref_url="https://www.suse.com/security/cve/CVE-2014-8443" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1650-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1622-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1629-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00016.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.259 and 14.x through 16.x before 16.0.0.235 on Windows and OS X and before 11.2.202.425 on Linux allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8443/">CVE-2014-8443</cve>
	<bugzilla href="https://bugzilla.suse.com/909219">SUSE bug 909219</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592809" comment="flash-player-11.2.202.425-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592810" comment="flash-player-gnome-11.2.202.425-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592811" comment="flash-player-kde4-11.2.202.425-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8484</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8484" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8484" ref_url="https://www.suse.com/security/cve/CVE-2014-8484" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001192.html" source="SUSE-SU"/>
    <description>
    The srec_scan function in bfd/srec.c in libdbfd in GNU binutils before 2.25 allows remote attackers to cause a denial of service (out-of-bounds read) via a small S-record.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-07"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8484/">CVE-2014-8484</cve>
	<bugzilla href="https://bugzilla.suse.com/902676">SUSE bug 902676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902677">SUSE bug 902677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566368" comment="binutils-2.23.1-0.23.15 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8485</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8485" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8485" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8485" ref_url="https://www.suse.com/security/cve/CVE-2014-8485" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001192.html" source="SUSE-SU"/>
    <description>
    The setup_group function in bfd/elf.c in libbfd in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted section group headers in an ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-07"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8485/">CVE-2014-8485</cve>
	<bugzilla href="https://bugzilla.suse.com/902676">SUSE bug 902676</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566368" comment="binutils-2.23.1-0.23.15 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8500</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8500" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8500" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8500" ref_url="https://www.suse.com/security/cve/CVE-2014-8500" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0011-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0096-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0480-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0488-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1250-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1250-2" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00039.html" source="SUSE-SU"/>
    <description>
    ISC BIND 9.0.x through 9.8.x, 9.9.0 through 9.9.6, and 9.10.0 through 9.10.1 does not limit delegation chaining, which allows remote attackers to cause a denial of service (memory consumption and named crash) via a large or infinite number of referrals.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-10"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8500/">CVE-2014-8500</cve>
	<bugzilla href="https://bugzilla.suse.com/908994">SUSE bug 908994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593494" comment="bind-libs-9.9.6P1-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593495" comment="bind-libs-32bit-9.9.6P1-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593496" comment="bind-utils-9.9.6P1-0.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8501</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8501" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8501" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8501" ref_url="https://www.suse.com/security/cve/CVE-2014-8501" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001192.html" source="SUSE-SU"/>
    <description>
    The _bfd_XXi_swap_aouthdr_in function in bfd/peXXigen.c in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (out-of-bounds write) and possibly have other unspecified impact via a crafted NumberOfRvaAndSizes field in the AOUT header in a PE executable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-07"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8501/">CVE-2014-8501</cve>
	<bugzilla href="https://bugzilla.suse.com/903655">SUSE bug 903655</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566368" comment="binutils-2.23.1-0.23.15 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8502</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8502" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8502" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8502" ref_url="https://www.suse.com/security/cve/CVE-2014-8502" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001192.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the pe_print_edata function in bfd/peXXigen.c in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (crash) and possibly have other unspecified impact via a truncated export table in a PE file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-07"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8502/">CVE-2014-8502</cve>
	<bugzilla href="https://bugzilla.suse.com/903655">SUSE bug 903655</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566368" comment="binutils-2.23.1-0.23.15 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8503</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8503" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8503" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8503" ref_url="https://www.suse.com/security/cve/CVE-2014-8503" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001192.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the ihex_scan function in bfd/ihex.c in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (crash) and possibly have other unspecified impact via a crafted ihex file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-07"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8503/">CVE-2014-8503</cve>
	<bugzilla href="https://bugzilla.suse.com/903655">SUSE bug 903655</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566368" comment="binutils-2.23.1-0.23.15 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8504</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8504" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8504" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8504" ref_url="https://www.suse.com/security/cve/CVE-2014-8504" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001192.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the srec_scan function in bfd/srec.c in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (crash) and possibly have other unspecified impact via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-07"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8504/">CVE-2014-8504</cve>
	<bugzilla href="https://bugzilla.suse.com/903655">SUSE bug 903655</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566368" comment="binutils-2.23.1-0.23.15 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8559</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8559" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8559" ref_url="https://www.suse.com/security/cve/CVE-2014-8559" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0178-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0529-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0713-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.html" source="SUSE-SU"/>
    <description>
    The d_walk function in fs/dcache.c in the Linux kernel through 3.17.2 does not properly maintain the semantics of rename_lock, which allows local users to cause a denial of service (deadlock and system hang) via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8559/">CVE-2014-8559</cve>
	<bugzilla href="https://bugzilla.suse.com/903640">SUSE bug 903640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915517">SUSE bug 915517</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592521" comment="kernel-bigsmp-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592285" comment="kernel-default-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592286" comment="kernel-default-base-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592287" comment="kernel-default-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592288" comment="kernel-default-extra-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592289" comment="kernel-pae-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592290" comment="kernel-pae-base-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592291" comment="kernel-pae-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592292" comment="kernel-pae-extra-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592293" comment="kernel-source-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592294" comment="kernel-syms-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592295" comment="kernel-trace-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592296" comment="kernel-xen-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592297" comment="kernel-xen-base-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592298" comment="kernel-xen-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592299" comment="kernel-xen-extra-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592300" comment="xen-kmp-default-4.2.5_04_3.0.101_0.47.50-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592301" comment="xen-kmp-pae-4.2.5_04_3.0.101_0.47.50-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8561</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8561" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8561" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8561" ref_url="https://www.suse.com/security/cve/CVE-2014-8561" source="SUSE CVE"/>
    <description>
    imagemagick 6.8.9.6 has remote DOS via infinite loop
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2014-8561/">CVE-2014-8561</cve>
	<bugzilla href="https://bugzilla.suse.com/1156786">SUSE bug 1156786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8562</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8562" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8562" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8562" ref_url="https://www.suse.com/security/cve/CVE-2014-8562" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001111.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00036.html" source="SUSE-SU"/>
    <description>
    DCM decode in ImageMagick before 6.8.9-9 allows remote attackers to cause a denial of service (out-of-bounds read).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8562/">CVE-2014-8562</cve>
	<bugzilla href="https://bugzilla.suse.com/903638">SUSE bug 903638</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566313" comment="ImageMagick-6.4.3.6-7.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566314" comment="libMagick++1-6.4.3.6-7.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566315" comment="libMagickCore1-6.4.3.6-7.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566316" comment="libMagickCore1-32bit-6.4.3.6-7.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566317" comment="libMagickWand1-6.4.3.6-7.30.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8594</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8594" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8594" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8594" ref_url="https://www.suse.com/security/cve/CVE-2014-8594" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html" source="SUSE-SU"/>
    <description>
    The do_mmu_update function in arch/x86/mm.c in Xen 4.x through 4.4.x does not properly restrict updates to only PV page tables, which allows remote PV guests to cause a denial of service (NULL pointer dereference) by leveraging hardware emulation services for HVM guests using Hardware Assisted Paging (HAP).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8594/">CVE-2014-8594</cve>
	<bugzilla href="https://bugzilla.suse.com/903967">SUSE bug 903967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903970">SUSE bug 903970</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567172" comment="xen-4.2.5_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567173" comment="xen-doc-html-4.2.5_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567174" comment="xen-doc-pdf-4.2.5_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567175" comment="xen-kmp-default-4.2.5_02_3.0.101_0.40-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567176" comment="xen-libs-4.2.5_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567177" comment="xen-libs-32bit-4.2.5_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567178" comment="xen-tools-4.2.5_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567179" comment="xen-tools-domU-4.2.5_02-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8595</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8595" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8595" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8595" ref_url="https://www.suse.com/security/cve/CVE-2014-8595" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html" source="SUSE-SU"/>
    <description>
    arch/x86/x86_emulate/x86_emulate.c in Xen 3.2.1 through 4.4.x does not properly check privileges, which allows local HVM guest users to gain privileges or cause a denial of service (crash) via a crafted (1) CALL, (2) JMP, (3) RETF, (4) LCALL, (5) LJMP, or (6) LRET far branch instruction.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8595/">CVE-2014-8595</cve>
	<bugzilla href="https://bugzilla.suse.com/903970">SUSE bug 903970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907649">SUSE bug 907649</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567172" comment="xen-4.2.5_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567173" comment="xen-doc-html-4.2.5_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567174" comment="xen-doc-pdf-4.2.5_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567175" comment="xen-kmp-default-4.2.5_02_3.0.101_0.40-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567176" comment="xen-libs-4.2.5_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567177" comment="xen-libs-32bit-4.2.5_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567178" comment="xen-tools-4.2.5_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567179" comment="xen-tools-domU-4.2.5_02-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8634</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8634" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8634" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8634" ref_url="https://www.suse.com/security/cve/CVE-2014-8634" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0076-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0171-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0173-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0077-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0133-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, Thunderbird before 31.4, and SeaMonkey before 2.32 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8634/">CVE-2014-8634</cve>
	<bugzilla href="https://bugzilla.suse.com/913064">SUSE bug 913064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913096">SUSE bug 913096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566471" comment="MozillaFirefox-31.4.0esr-0.8.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566472" comment="MozillaFirefox-translations-31.4.0esr-0.8.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566473" comment="libfreebl3-3.17.3-0.8.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566474" comment="libfreebl3-32bit-3.17.3-0.8.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566475" comment="libsoftokn3-3.17.3-0.8.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566476" comment="libsoftokn3-32bit-3.17.3-0.8.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566477" comment="mozilla-nss-3.17.3-0.8.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566478" comment="mozilla-nss-32bit-3.17.3-0.8.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566479" comment="mozilla-nss-tools-3.17.3-0.8.11 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8636</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8636" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8636" ref_url="https://www.suse.com/security/cve/CVE-2014-8636" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0171-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0173-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0077-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00002.html" source="SUSE-SU"/>
    <description>
    The XrayWrapper implementation in Mozilla Firefox before 35.0 and SeaMonkey before 2.32 does not properly interact with a DOM object that has a named getter, which might allow remote attackers to execute arbitrary JavaScript code with chrome privileges via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8636/">CVE-2014-8636</cve>
	<bugzilla href="https://bugzilla.suse.com/913096">SUSE bug 913096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913102">SUSE bug 913102</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566471" comment="MozillaFirefox-31.4.0esr-0.8.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566472" comment="MozillaFirefox-translations-31.4.0esr-0.8.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566473" comment="libfreebl3-3.17.3-0.8.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566474" comment="libfreebl3-32bit-3.17.3-0.8.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566475" comment="libsoftokn3-3.17.3-0.8.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566476" comment="libsoftokn3-32bit-3.17.3-0.8.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566477" comment="mozilla-nss-3.17.3-0.8.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566478" comment="mozilla-nss-32bit-3.17.3-0.8.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566479" comment="mozilla-nss-tools-3.17.3-0.8.11 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8637</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8637" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8637" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8637" ref_url="https://www.suse.com/security/cve/CVE-2014-8637" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0171-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0173-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0077-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00002.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 35.0 and SeaMonkey before 2.32 do not properly initialize memory for BMP images, which allows remote attackers to obtain sensitive information from process memory via a crafted web page that triggers the rendering of malformed BMP data within a CANVAS element.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8637/">CVE-2014-8637</cve>
	<bugzilla href="https://bugzilla.suse.com/913096">SUSE bug 913096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913103">SUSE bug 913103</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566471" comment="MozillaFirefox-31.4.0esr-0.8.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566472" comment="MozillaFirefox-translations-31.4.0esr-0.8.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566473" comment="libfreebl3-3.17.3-0.8.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566474" comment="libfreebl3-32bit-3.17.3-0.8.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566475" comment="libsoftokn3-3.17.3-0.8.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566476" comment="libsoftokn3-32bit-3.17.3-0.8.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566477" comment="mozilla-nss-3.17.3-0.8.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566478" comment="mozilla-nss-32bit-3.17.3-0.8.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566479" comment="mozilla-nss-tools-3.17.3-0.8.11 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8638</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8638" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8638" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8638" ref_url="https://www.suse.com/security/cve/CVE-2014-8638" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0076-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0171-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0173-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0077-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0133-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    The navigator.sendBeacon implementation in Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, Thunderbird before 31.4, and SeaMonkey before 2.32 omits the CORS Origin header, which allows remote attackers to bypass intended CORS access-control checks and conduct cross-site request forgery (CSRF) attacks via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8638/">CVE-2014-8638</cve>
	<bugzilla href="https://bugzilla.suse.com/913068">SUSE bug 913068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913096">SUSE bug 913096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566471" comment="MozillaFirefox-31.4.0esr-0.8.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566472" comment="MozillaFirefox-translations-31.4.0esr-0.8.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566473" comment="libfreebl3-3.17.3-0.8.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566474" comment="libfreebl3-32bit-3.17.3-0.8.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566475" comment="libsoftokn3-3.17.3-0.8.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566476" comment="libsoftokn3-32bit-3.17.3-0.8.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566477" comment="mozilla-nss-3.17.3-0.8.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566478" comment="mozilla-nss-32bit-3.17.3-0.8.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566479" comment="mozilla-nss-tools-3.17.3-0.8.11 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8639</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8639" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8639" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8639" ref_url="https://www.suse.com/security/cve/CVE-2014-8639" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0076-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0171-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0173-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0077-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0133-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, Thunderbird before 31.4, and SeaMonkey before 2.32 do not properly interpret Set-Cookie headers within responses that have a 407 (aka Proxy Authentication Required) status code, which allows remote HTTP proxy servers to conduct session fixation attacks by providing a cookie name that corresponds to the session cookie of the origin server.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8639/">CVE-2014-8639</cve>
	<bugzilla href="https://bugzilla.suse.com/913066">SUSE bug 913066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913096">SUSE bug 913096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566471" comment="MozillaFirefox-31.4.0esr-0.8.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566472" comment="MozillaFirefox-translations-31.4.0esr-0.8.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566473" comment="libfreebl3-3.17.3-0.8.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566474" comment="libfreebl3-32bit-3.17.3-0.8.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566475" comment="libsoftokn3-3.17.3-0.8.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566476" comment="libsoftokn3-32bit-3.17.3-0.8.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566477" comment="mozilla-nss-3.17.3-0.8.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566478" comment="mozilla-nss-32bit-3.17.3-0.8.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566479" comment="mozilla-nss-tools-3.17.3-0.8.11 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8640</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8640" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8640" ref_url="https://www.suse.com/security/cve/CVE-2014-8640" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0171-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0173-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0077-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00002.html" source="SUSE-SU"/>
    <description>
    The mozilla::dom::AudioParamTimeline::AudioNodeInputValue function in the Web Audio API implementation in Mozilla Firefox before 35.0 and SeaMonkey before 2.32 does not properly restrict timeline operations, which allows remote attackers to cause a denial of service (uninitialized-memory read and application crash) via crafted API calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8640/">CVE-2014-8640</cve>
	<bugzilla href="https://bugzilla.suse.com/913096">SUSE bug 913096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913104">SUSE bug 913104</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566471" comment="MozillaFirefox-31.4.0esr-0.8.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566472" comment="MozillaFirefox-translations-31.4.0esr-0.8.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566473" comment="libfreebl3-3.17.3-0.8.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566474" comment="libfreebl3-32bit-3.17.3-0.8.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566475" comment="libsoftokn3-3.17.3-0.8.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566476" comment="libsoftokn3-32bit-3.17.3-0.8.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566477" comment="mozilla-nss-3.17.3-0.8.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566478" comment="mozilla-nss-32bit-3.17.3-0.8.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566479" comment="mozilla-nss-tools-3.17.3-0.8.11 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8641</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8641" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8641" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8641" ref_url="https://www.suse.com/security/cve/CVE-2014-8641" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0076-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0171-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0173-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0077-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00002.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the WebRTC implementation in Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, and SeaMonkey before 2.32 allows remote attackers to execute arbitrary code via crafted track data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8641/">CVE-2014-8641</cve>
	<bugzilla href="https://bugzilla.suse.com/913067">SUSE bug 913067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913096">SUSE bug 913096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566471" comment="MozillaFirefox-31.4.0esr-0.8.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566472" comment="MozillaFirefox-translations-31.4.0esr-0.8.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566473" comment="libfreebl3-3.17.3-0.8.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566474" comment="libfreebl3-32bit-3.17.3-0.8.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566475" comment="libsoftokn3-3.17.3-0.8.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566476" comment="libsoftokn3-32bit-3.17.3-0.8.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566477" comment="mozilla-nss-3.17.3-0.8.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566478" comment="mozilla-nss-32bit-3.17.3-0.8.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566479" comment="mozilla-nss-tools-3.17.3-0.8.11 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8651</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8651" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8651" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8651" ref_url="https://www.suse.com/security/cve/CVE-2014-8651" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001839.html" source="SUSE-SU"/>
    <description>
    The KDE Clock KCM policykit helper in kde-workspace before 4.11.14 and plasma-desktop before 5.1.1 allows local users to gain privileges via a crafted ntpUtility (ntp utility name) argument.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8651/">CVE-2014-8651</cve>
	<bugzilla href="https://bugzilla.suse.com/904625">SUSE bug 904625</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566698" comment="kde4-kgreeter-plugins-4.3.5-0.12.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566699" comment="kdebase4-wallpapers-4.3.5-0.11.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566700" comment="kdebase4-workspace-4.3.5-0.12.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566701" comment="kdebase4-workspace-ksysguardd-4.3.5-0.12.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566702" comment="kdm-4.3.5-0.12.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566703" comment="kwin-4.3.5-0.12.20.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8709</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8709" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8709" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8709" ref_url="https://www.suse.com/security/cve/CVE-2014-8709" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    The ieee80211_fragment function in net/mac80211/tx.c in the Linux kernel before 3.13.5 does not properly maintain a certain tail pointer, which allows remote attackers to obtain sensitive cleartext information by reading packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8709/">CVE-2014-8709</cve>
	<bugzilla href="https://bugzilla.suse.com/904700">SUSE bug 904700</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590044" comment="kernel-bigsmp-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590045" comment="kernel-default-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590046" comment="kernel-default-base-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590047" comment="kernel-default-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590048" comment="kernel-default-extra-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590049" comment="kernel-pae-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590050" comment="kernel-pae-base-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590051" comment="kernel-pae-devel-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590052" comment="kernel-pae-extra-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590053" comment="kernel-source-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590054" comment="kernel-syms-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590055" comment="kernel-trace-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590056" comment="kernel-xen-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590057" comment="kernel-xen-base-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590058" comment="kernel-xen-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590059" comment="kernel-xen-extra-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590060" comment="xen-kmp-default-4.2.5_02_3.0.101_0.46-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590061" comment="xen-kmp-pae-4.2.5_02_3.0.101_0.42-0.7.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8710</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8710" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8710" ref_url="https://www.suse.com/security/cve/CVE-2014-8710" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1503-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00104.html" source="SUSE-SU"/>
    <description>
    The decompress_sigcomp_message function in epan/sigcomp-udvm.c in the SigComp UDVM dissector in Wireshark 1.10.x before 1.10.11 allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8710/">CVE-2014-8710</cve>
	<bugzilla href="https://bugzilla.suse.com/905246">SUSE bug 905246</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563891" comment="wireshark-1.10.11-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8711</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8711" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8711" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8711" ref_url="https://www.suse.com/security/cve/CVE-2014-8711" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1503-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00104.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in epan/dissectors/packet-amqp.c in the AMQP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 allow remote attackers to cause a denial of service (application crash) via a crafted amqp_0_10 PDU in a packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8711/">CVE-2014-8711</cve>
	<bugzilla href="https://bugzilla.suse.com/905245">SUSE bug 905245</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563891" comment="wireshark-1.10.11-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8712</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8712" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8712" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8712" ref_url="https://www.suse.com/security/cve/CVE-2014-8712" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1503-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00104.html" source="SUSE-SU"/>
    <description>
    The build_expert_data function in epan/dissectors/packet-ncp2222.inc in the NCP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 does not properly initialize a data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8712/">CVE-2014-8712</cve>
	<bugzilla href="https://bugzilla.suse.com/905248">SUSE bug 905248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563891" comment="wireshark-1.10.11-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8713</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8713" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8713" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8713" ref_url="https://www.suse.com/security/cve/CVE-2014-8713" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1503-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00104.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the build_expert_data function in epan/dissectors/packet-ncp2222.inc in the NCP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8713/">CVE-2014-8713</cve>
	<bugzilla href="https://bugzilla.suse.com/905248">SUSE bug 905248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563891" comment="wireshark-1.10.11-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8714</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8714" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8714" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8714" ref_url="https://www.suse.com/security/cve/CVE-2014-8714" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1503-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00104.html" source="SUSE-SU"/>
    <description>
    The dissect_write_structured_field function in epan/dissectors/packet-tn5250.c in the TN5250 dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8714/">CVE-2014-8714</cve>
	<bugzilla href="https://bugzilla.suse.com/905247">SUSE bug 905247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563891" comment="wireshark-1.10.11-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148716" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8716</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8716" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8716" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8716" ref_url="https://www.suse.com/security/cve/CVE-2014-8716" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001111.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1492-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00100.html" source="SUSE-SU"/>
    <description>
    The JPEG decoder in ImageMagick before 6.8.9-9 allows local users to cause a denial of service (out-of-bounds memory access and crash).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8716/">CVE-2014-8716</cve>
	<bugzilla href="https://bugzilla.suse.com/905260">SUSE bug 905260</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566313" comment="ImageMagick-6.4.3.6-7.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566314" comment="libMagick++1-6.4.3.6-7.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566315" comment="libMagickCore1-6.4.3.6-7.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566316" comment="libMagickCore1-32bit-6.4.3.6-7.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566317" comment="libMagickWand1-6.4.3.6-7.30.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8737</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8737" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8737" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8737" ref_url="https://www.suse.com/security/cve/CVE-2014-8737" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001192.html" source="SUSE-SU"/>
    <description>
    Multiple directory traversal vulnerabilities in GNU binutils 2.24 and earlier allow local users to delete arbitrary files via a .. (dot dot) or full path name in an archive to (1) strip or (2) objcopy or create arbitrary files via (3) a .. (dot dot) or full path name in an archive to ar.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-07"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8737/">CVE-2014-8737</cve>
	<bugzilla href="https://bugzilla.suse.com/905736">SUSE bug 905736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912408">SUSE bug 912408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566368" comment="binutils-2.23.1-0.23.15 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8738</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8738" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8738" ref_url="https://www.suse.com/security/cve/CVE-2014-8738" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001192.html" source="SUSE-SU"/>
    <description>
    The _bfd_slurp_extended_name_table function in bfd/archive.c in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (invalid write, segmentation fault, and crash) via a crafted extended name table in an archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-07"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8738/">CVE-2014-8738</cve>
	<bugzilla href="https://bugzilla.suse.com/905735">SUSE bug 905735</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566368" comment="binutils-2.23.1-0.23.15 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8767</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8767" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8767" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8767" ref_url="https://www.suse.com/security/cve/CVE-2014-8767" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0284-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    Integer underflow in the olsr_print function in tcpdump 3.9.6 through 4.6.2, when in verbose mode, allows remote attackers to cause a denial of service (crash) via a crafted length value in an OLSR frame.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8767/">CVE-2014-8767</cve>
	<bugzilla href="https://bugzilla.suse.com/905870">SUSE bug 905870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905871">SUSE bug 905871</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593519" comment="tcpdump-3.9.8-1.23.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8769</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8769" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8769" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8769" ref_url="https://www.suse.com/security/cve/CVE-2014-8769" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0284-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    tcpdump 3.8 through 4.6.2 might allow remote attackers to obtain sensitive information from memory or cause a denial of service (packet loss or segmentation fault) via a crafted Ad hoc On-Demand Distance Vector (AODV) packet, which triggers an out-of-bounds memory access.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8769/">CVE-2014-8769</cve>
	<bugzilla href="https://bugzilla.suse.com/905871">SUSE bug 905871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905872">SUSE bug 905872</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593519" comment="tcpdump-3.9.8-1.23.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8866</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8866" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8866" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8866" ref_url="https://www.suse.com/security/cve/CVE-2014-8866" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html" source="SUSE-SU"/>
    <description>
    The compatibility mode hypercall argument translation in Xen 3.3.x through 4.4.x, when running on a 64-bit hypervisor, allows local 32-bit HVM guests to cause a denial of service (host crash) via vectors involving altering the high halves of registers while in 64-bit mode.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8866/">CVE-2014-8866</cve>
	<bugzilla href="https://bugzilla.suse.com/903970">SUSE bug 903970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905465">SUSE bug 905465</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567172" comment="xen-4.2.5_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567173" comment="xen-doc-html-4.2.5_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567174" comment="xen-doc-pdf-4.2.5_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567175" comment="xen-kmp-default-4.2.5_02_3.0.101_0.40-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567176" comment="xen-libs-4.2.5_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567177" comment="xen-libs-32bit-4.2.5_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567178" comment="xen-tools-4.2.5_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567179" comment="xen-tools-domU-4.2.5_02-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8867</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8867" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8867" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8867" ref_url="https://www.suse.com/security/cve/CVE-2014-8867" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html" source="SUSE-SU"/>
    <description>
    The acceleration support for the "REP MOVS" instruction in Xen 4.4.x, 3.2.x, and earlier lacks properly bounds checking for memory mapped I/O (MMIO) emulated in the hypervisor, which allows local HVM guests to cause a denial of service (host crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8867/">CVE-2014-8867</cve>
	<bugzilla href="https://bugzilla.suse.com/903970">SUSE bug 903970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905467">SUSE bug 905467</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567172" comment="xen-4.2.5_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567173" comment="xen-doc-html-4.2.5_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567174" comment="xen-doc-pdf-4.2.5_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567175" comment="xen-kmp-default-4.2.5_02_3.0.101_0.40-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567176" comment="xen-libs-4.2.5_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567177" comment="xen-libs-32bit-4.2.5_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567178" comment="xen-tools-4.2.5_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567179" comment="xen-tools-domU-4.2.5_02-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8884</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8884" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8884" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8884" ref_url="https://www.suse.com/security/cve/CVE-2014-8884" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00019.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the ttusbdecfe_dvbs_diseqc_send_master_cmd function in drivers/media/usb/ttusb-dec/ttusbdecfe.c in the Linux kernel before 3.17.4 allows local users to cause a denial of service (system crash) or possibly gain privileges via a large message length in an ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8884/">CVE-2014-8884</cve>
	<bugzilla href="https://bugzilla.suse.com/904876">SUSE bug 904876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905522">SUSE bug 905522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905739">SUSE bug 905739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905744">SUSE bug 905744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905748">SUSE bug 905748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905764">SUSE bug 905764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590044" comment="kernel-bigsmp-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590045" comment="kernel-default-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590046" comment="kernel-default-base-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590047" comment="kernel-default-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590048" comment="kernel-default-extra-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590049" comment="kernel-pae-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590050" comment="kernel-pae-base-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590051" comment="kernel-pae-devel-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590052" comment="kernel-pae-extra-3.0.101-0.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590053" comment="kernel-source-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590054" comment="kernel-syms-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590055" comment="kernel-trace-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590056" comment="kernel-xen-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590057" comment="kernel-xen-base-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590058" comment="kernel-xen-devel-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590059" comment="kernel-xen-extra-3.0.101-0.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590060" comment="xen-kmp-default-4.2.5_02_3.0.101_0.46-0.7.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590061" comment="xen-kmp-pae-4.2.5_02_3.0.101_0.42-0.7.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8962</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8962" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8962" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8962" ref_url="https://www.suse.com/security/cve/CVE-2014-8962" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001117.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1588-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00034.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in stream_decoder.c in libFLAC before 1.3.1 allows remote attackers to execute arbitrary code via a crafted .flac file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-12"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8962/">CVE-2014-8962</cve>
	<bugzilla href="https://bugzilla.suse.com/906831">SUSE bug 906831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907764">SUSE bug 907764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969774">SUSE bug 969774</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566532" comment="libFLAC++6-1.2.1-68.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566533" comment="libFLAC8-1.2.1-68.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566534" comment="libFLAC8-32bit-1.2.1-68.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8964</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8964" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8964" ref_url="https://www.suse.com/security/cve/CVE-2014-8964" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0858-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00076.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in PCRE 8.36 and earlier allows remote attackers to cause a denial of service (crash) or have other unspecified impact via a crafted regular expression, related to an assertion that allows zero repeats.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8964/">CVE-2014-8964</cve>
	<bugzilla href="https://bugzilla.suse.com/906574">SUSE bug 906574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924960">SUSE bug 924960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933288">SUSE bug 933288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936408">SUSE bug 936408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958373">SUSE bug 958373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334068" comment="pcre is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9028</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9028" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9028" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9028" ref_url="https://www.suse.com/security/cve/CVE-2014-9028" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001117.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1588-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00034.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in stream_decoder.c in libFLAC before 1.3.1 allows remote attackers to execute arbitrary code via a crafted .flac file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-12"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9028/">CVE-2014-9028</cve>
	<bugzilla href="https://bugzilla.suse.com/907016">SUSE bug 907016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969774">SUSE bug 969774</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566532" comment="libFLAC++6-1.2.1-68.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566533" comment="libFLAC8-1.2.1-68.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566534" comment="libFLAC8-32bit-1.2.1-68.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9029</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9029" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9029" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9029" ref_url="https://www.suse.com/security/cve/CVE-2014-9029" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001206.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1644-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2737-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00018.html" source="SUSE-SU"/>
    <description>
    Multiple off-by-one errors in the (1) jpc_dec_cp_setfromcox and (2) jpc_dec_cp_setfromrgn functions in jpc/jpc_dec.c in JasPer 1.900.1 and earlier allow remote attackers to execute arbitrary code via a crafted jp2 file, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-10"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9029/">CVE-2014-9029</cve>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906364">SUSE bug 906364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909474">SUSE bug 909474</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566825" comment="libjasper-1.900.1-134.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566826" comment="libjasper-32bit-1.900.1-134.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9030</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9030" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9030" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9030" ref_url="https://www.suse.com/security/cve/CVE-2014-9030" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html" source="SUSE-SU"/>
    <description>
    The do_mmu_update function in arch/x86/mm.c in Xen 3.2.x through 4.4.x does not properly manage page references, which allows remote domains to cause a denial of service by leveraging control over an HVM guest and a crafted MMU_MACHPHYS_UPDATE.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9030/">CVE-2014-9030</cve>
	<bugzilla href="https://bugzilla.suse.com/903970">SUSE bug 903970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906439">SUSE bug 906439</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567172" comment="xen-4.2.5_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567173" comment="xen-doc-html-4.2.5_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567174" comment="xen-doc-pdf-4.2.5_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567175" comment="xen-kmp-default-4.2.5_02_3.0.101_0.40-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567176" comment="xen-libs-4.2.5_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567177" comment="xen-libs-32bit-4.2.5_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567178" comment="xen-tools-4.2.5_02-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567179" comment="xen-tools-domU-4.2.5_02-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9050</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9050" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9050" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9050" ref_url="https://www.suse.com/security/cve/CVE-2014-9050" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1571-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1574-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001204.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00003.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the cli_scanpe function in libclamav/pe.c in ClamAV before 0.98.5 allows remote attackers to cause a denial of service (crash) via a crafted y0da Crypter PE file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9050/">CVE-2014-9050</cve>
	<bugzilla href="https://bugzilla.suse.com/1040662">SUSE bug 1040662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906770">SUSE bug 906770</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592218" comment="clamav-0.98.5-0.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9087</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9087" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9087" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9087" ref_url="https://www.suse.com/security/cve/CVE-2014-9087" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001154.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1682-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00081.html" source="SUSE-SU"/>
    <description>
    Integer underflow in the ksba_oid_to_str function in Libksba before 1.3.2, as used in GnuPG, allows remote attackers to cause a denial of service (crash) via a crafted OID in a (1) S/MIME message or (2) ECC based OpenPGP data, which triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9087/">CVE-2014-9087</cve>
	<bugzilla href="https://bugzilla.suse.com/907074">SUSE bug 907074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926826">SUSE bug 926826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996084">SUSE bug 996084</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566827" comment="libksba-1.0.4-1.18.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9090</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9090" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9090" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9090" ref_url="https://www.suse.com/security/cve/CVE-2014-9090" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1735-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
    <description>
    The do_double_fault function in arch/x86/kernel/traps.c in the Linux kernel through 3.17.4 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to cause a denial of service (panic) via a modify_ldt system call, as demonstrated by sigreturn_32 in the linux-clock-tests test suite.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9090/">CVE-2014-9090</cve>
	<bugzilla href="https://bugzilla.suse.com/817142">SUSE bug 817142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907818">SUSE bug 907818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909077">SUSE bug 909077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910251">SUSE bug 910251</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592521" comment="kernel-bigsmp-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592285" comment="kernel-default-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592286" comment="kernel-default-base-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592287" comment="kernel-default-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592288" comment="kernel-default-extra-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592289" comment="kernel-pae-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592290" comment="kernel-pae-base-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592291" comment="kernel-pae-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592292" comment="kernel-pae-extra-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592293" comment="kernel-source-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592294" comment="kernel-syms-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592295" comment="kernel-trace-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592296" comment="kernel-xen-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592297" comment="kernel-xen-base-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592298" comment="kernel-xen-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592299" comment="kernel-xen-extra-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592300" comment="xen-kmp-default-4.2.5_04_3.0.101_0.47.50-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592301" comment="xen-kmp-pae-4.2.5_04_3.0.101_0.47.50-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9093</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9093" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9093" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9093" ref_url="https://www.suse.com/security/cve/CVE-2014-9093" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001841.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1727-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00109.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0588-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00156.html" source="SUSE-SU"/>
    <description>
    LibreOffice before 4.3.5 allows remote attackers to cause a denial of service (invalid write operation and crash) and possibly execute arbitrary code via a crafted RTF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9093/">CVE-2014-9093</cve>
	<bugzilla href="https://bugzilla.suse.com/907636">SUSE bug 907636</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009564685" comment="google-carlito-fonts-1.1.03.beta1-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564687" comment="libhyphen0-2.8.8-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564688" comment="libmythes-1_2-0-1.2.4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564689" comment="libreoffice-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564690" comment="libreoffice-base-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564691" comment="libreoffice-base-drivers-postgresql-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564693" comment="libreoffice-calc-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564694" comment="libreoffice-calc-extensions-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564695" comment="libreoffice-draw-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564696" comment="libreoffice-filters-optional-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564697" comment="libreoffice-gnome-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564698" comment="libreoffice-icon-theme-galaxy-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564699" comment="libreoffice-icon-theme-tango-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564700" comment="libreoffice-impress-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564701" comment="libreoffice-kde4-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564702" comment="libreoffice-l10n-af-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564703" comment="libreoffice-l10n-ar-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564704" comment="libreoffice-l10n-ca-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564705" comment="libreoffice-l10n-cs-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564706" comment="libreoffice-l10n-da-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564707" comment="libreoffice-l10n-de-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564708" comment="libreoffice-l10n-en-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564709" comment="libreoffice-l10n-es-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564710" comment="libreoffice-l10n-fi-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564711" comment="libreoffice-l10n-fr-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564712" comment="libreoffice-l10n-gu-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564713" comment="libreoffice-l10n-hi-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564714" comment="libreoffice-l10n-hu-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564715" comment="libreoffice-l10n-it-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564716" comment="libreoffice-l10n-ja-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564717" comment="libreoffice-l10n-ko-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564718" comment="libreoffice-l10n-nb-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564719" comment="libreoffice-l10n-nl-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564720" comment="libreoffice-l10n-nn-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564721" comment="libreoffice-l10n-pl-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564722" comment="libreoffice-l10n-pt-BR-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564723" comment="libreoffice-l10n-pt-PT-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564724" comment="libreoffice-l10n-ru-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564725" comment="libreoffice-l10n-sk-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564726" comment="libreoffice-l10n-sv-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564727" comment="libreoffice-l10n-xh-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564728" comment="libreoffice-l10n-zh-Hans-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564729" comment="libreoffice-l10n-zh-Hant-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564730" comment="libreoffice-l10n-zu-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564731" comment="libreoffice-mailmerge-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564732" comment="libreoffice-math-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564733" comment="libreoffice-officebean-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564734" comment="libreoffice-pyuno-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564735" comment="libreoffice-sdk-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515206" comment="libreoffice-share-linker-1-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564736" comment="libreoffice-voikko-4.1-2.26 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564737" comment="libreoffice-writer-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564738" comment="libreoffice-writer-extensions-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564740" comment="libvoikko1-3.7.1-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564741" comment="myspell-af_NA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564742" comment="myspell-af_ZA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564743" comment="myspell-ar-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564744" comment="myspell-ar_AE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564745" comment="myspell-ar_BH-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564746" comment="myspell-ar_DZ-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564747" comment="myspell-ar_EG-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564748" comment="myspell-ar_IQ-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564749" comment="myspell-ar_JO-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564750" comment="myspell-ar_KW-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564751" comment="myspell-ar_LB-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564752" comment="myspell-ar_LY-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564753" comment="myspell-ar_MA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564754" comment="myspell-ar_OM-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564755" comment="myspell-ar_QA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564756" comment="myspell-ar_SA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564757" comment="myspell-ar_SD-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564758" comment="myspell-ar_SY-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564759" comment="myspell-ar_TN-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564760" comment="myspell-ar_YE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564761" comment="myspell-be_BY-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564762" comment="myspell-bg_BG-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564763" comment="myspell-bn_BD-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564764" comment="myspell-bn_IN-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564765" comment="myspell-bs-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564766" comment="myspell-bs_BA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564767" comment="myspell-ca-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564768" comment="myspell-ca_AD-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564769" comment="myspell-ca_ES-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564770" comment="myspell-ca_ES_valencia-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564771" comment="myspell-ca_FR-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564772" comment="myspell-ca_IT-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564773" comment="myspell-cs_CZ-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564774" comment="myspell-da_DK-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564775" comment="myspell-de-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564776" comment="myspell-de_AT-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564777" comment="myspell-de_CH-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564778" comment="myspell-de_DE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564779" comment="myspell-dictionaries-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564780" comment="myspell-el_GR-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564781" comment="myspell-en-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564782" comment="myspell-en_AU-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564783" comment="myspell-en_BS-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564784" comment="myspell-en_BZ-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564785" comment="myspell-en_CA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564786" comment="myspell-en_GB-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564787" comment="myspell-en_GH-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564788" comment="myspell-en_IE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564789" comment="myspell-en_IN-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564790" comment="myspell-en_JM-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564791" comment="myspell-en_MW-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564792" comment="myspell-en_NA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564793" comment="myspell-en_NZ-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564794" comment="myspell-en_PH-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564795" comment="myspell-en_TT-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564796" comment="myspell-en_US-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564797" comment="myspell-en_ZA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564798" comment="myspell-en_ZW-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564799" comment="myspell-es-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564800" comment="myspell-es_AR-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564801" comment="myspell-es_BO-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564802" comment="myspell-es_CL-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564803" comment="myspell-es_CO-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564804" comment="myspell-es_CR-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564805" comment="myspell-es_CU-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564806" comment="myspell-es_DO-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564807" comment="myspell-es_EC-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564808" comment="myspell-es_ES-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564809" comment="myspell-es_GT-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564810" comment="myspell-es_HN-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564811" comment="myspell-es_MX-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564812" comment="myspell-es_NI-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564813" comment="myspell-es_PA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564814" comment="myspell-es_PE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564815" comment="myspell-es_PR-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564816" comment="myspell-es_PY-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564817" comment="myspell-es_SV-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564818" comment="myspell-es_UY-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564819" comment="myspell-es_VE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564820" comment="myspell-et_EE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564821" comment="myspell-fr_BE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564822" comment="myspell-fr_CA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564823" comment="myspell-fr_CH-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564824" comment="myspell-fr_FR-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564825" comment="myspell-fr_LU-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564826" comment="myspell-fr_MC-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564827" comment="myspell-gu_IN-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564828" comment="myspell-he_IL-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564829" comment="myspell-hi_IN-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564830" comment="myspell-hr_HR-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564831" comment="myspell-hu_HU-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564832" comment="myspell-it_IT-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564833" comment="myspell-lightproof-en-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564834" comment="myspell-lightproof-hu_HU-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564835" comment="myspell-lightproof-pt_BR-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564836" comment="myspell-lightproof-ru_RU-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564837" comment="myspell-lo_LA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564838" comment="myspell-lt_LT-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564839" comment="myspell-lv_LV-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564840" comment="myspell-nb_NO-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564841" comment="myspell-nl_BE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564842" comment="myspell-nl_NL-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564843" comment="myspell-nn_NO-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564844" comment="myspell-no-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564845" comment="myspell-pl_PL-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564846" comment="myspell-pt_AO-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564847" comment="myspell-pt_BR-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564848" comment="myspell-pt_PT-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564849" comment="myspell-ro-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564850" comment="myspell-ro_RO-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564851" comment="myspell-ru_RU-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564852" comment="myspell-sk_SK-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564853" comment="myspell-sl_SI-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564854" comment="myspell-sr-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564855" comment="myspell-sr_CS-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564856" comment="myspell-sr_Latn_CS-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564857" comment="myspell-sr_Latn_RS-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564858" comment="myspell-sr_RS-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564859" comment="myspell-sv_FI-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564860" comment="myspell-sv_SE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564861" comment="myspell-te-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564862" comment="myspell-te_IN-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564863" comment="myspell-th_TH-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564864" comment="myspell-vi-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564865" comment="myspell-vi_VN-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564866" comment="myspell-zu_ZA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564868" comment="python-importlib-1.0.2-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9112</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9112" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9112" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9112" ref_url="https://www.suse.com/security/cve/CVE-2014-9112" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001118.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1643-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00061.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the process_copy_in function in GNU Cpio 2.11 allows remote attackers to cause a denial of service via a large block value in a cpio archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9112/">CVE-2014-9112</cve>
	<bugzilla href="https://bugzilla.suse.com/907456">SUSE bug 907456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913479">SUSE bug 913479</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566378" comment="cpio-2.9-75.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566379" comment="cpio-lang-2.9-75.78.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9114</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9114" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9114" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9114" ref_url="https://www.suse.com/security/cve/CVE-2014-9114" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001313.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0066-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00035.html" source="SUSE-SU"/>
    <description>
    Blkid in util-linux before 2.26rc-1 allows local users to execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9114/">CVE-2014-9114</cve>
	<bugzilla href="https://bugzilla.suse.com/907434">SUSE bug 907434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908742">SUSE bug 908742</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593546" comment="libblkid1-2.19.1-6.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593547" comment="libblkid1-32bit-2.19.1-6.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593548" comment="libuuid-devel-2.19.1-6.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593549" comment="libuuid1-2.19.1-6.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593550" comment="libuuid1-32bit-2.19.1-6.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593551" comment="util-linux-2.19.1-6.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593552" comment="util-linux-lang-2.19.1-6.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593553" comment="uuid-runtime-2.19.1-6.62.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9116</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9116" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9116" ref_url="https://www.suse.com/security/cve/CVE-2014-9116" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0012-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0758-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005432.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1635-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2212-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0052-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00018.html" source="SUSE-SU"/>
    <description>
    The write_one_header function in mutt 1.5.23 does not properly handle newline characters at the beginning of a header, which allows remote attackers to cause a denial of service (crash) via a header with an empty body, which triggers a heap-based buffer overflow in the mutt_substrdup function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9116/">CVE-2014-9116</cve>
	<bugzilla href="https://bugzilla.suse.com/907453">SUSE bug 907453</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593573" comment="mutt-1.5.17-42.39.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9140</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9140" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9140" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9140" ref_url="https://www.suse.com/security/cve/CVE-2014-9140" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001338.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0616-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00084.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the ppp_hdlc function in print-ppp.c in tcpdump 4.6.2 and earlier allows remote attackers to cause a denial of service (crash) cia a crafted PPP packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9140/">CVE-2014-9140</cve>
	<bugzilla href="https://bugzilla.suse.com/923142">SUSE bug 923142</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567151" comment="tcpdump-3.9.8-1.27.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9157</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9157" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9157" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9157" ref_url="https://www.suse.com/security/cve/CVE-2014-9157" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:3222-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00025.html" source="SUSE-SU"/>
    <description>
    Format string vulnerability in the yyerror function in lib/cgraph/scan.l in Graphviz allows remote attackers to have unspecified impact via format string specifiers in unknown vectors, which are not properly handled in an error string.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9157/">CVE-2014-9157</cve>
	<bugzilla href="https://bugzilla.suse.com/908426">SUSE bug 908426</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334142" comment="graphviz is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9162</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9162" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9162" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9162" ref_url="https://www.suse.com/security/cve/CVE-2014-9162" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1650-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1622-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1629-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.259 and 14.x through 16.x before 16.0.0.235 on Windows and OS X and before 11.2.202.425 on Linux allows attackers to obtain sensitive information via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9162/">CVE-2014-9162</cve>
	<bugzilla href="https://bugzilla.suse.com/909219">SUSE bug 909219</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592809" comment="flash-player-11.2.202.425-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592810" comment="flash-player-gnome-11.2.202.425-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592811" comment="flash-player-kde4-11.2.202.425-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9163</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9163" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9163" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9163" ref_url="https://www.suse.com/security/cve/CVE-2014-9163" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1650-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1622-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1629-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00016.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in Adobe Flash Player before 13.0.0.259 and 14.x and 15.x before 15.0.0.246 on Windows and OS X and before 11.2.202.425 on Linux allows attackers to execute arbitrary code via unspecified vectors, as exploited in the wild in December 2014.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9163/">CVE-2014-9163</cve>
	<bugzilla href="https://bugzilla.suse.com/909219">SUSE bug 909219</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592809" comment="flash-player-11.2.202.425-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592810" comment="flash-player-gnome-11.2.202.425-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592811" comment="flash-player-kde4-11.2.202.425-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9164</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9164" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9164" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9164" ref_url="https://www.suse.com/security/cve/CVE-2014-9164" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1650-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1622-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1629-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.259 and 14.x through 16.x before 16.0.0.235 on Windows and OS X and before 11.2.202.425 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0587.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9164/">CVE-2014-9164</cve>
	<bugzilla href="https://bugzilla.suse.com/909219">SUSE bug 909219</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592809" comment="flash-player-11.2.202.425-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592810" comment="flash-player-gnome-11.2.202.425-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592811" comment="flash-player-kde4-11.2.202.425-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9221</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9221" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9221" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9221" ref_url="https://www.suse.com/security/cve/CVE-2014-9221" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001221.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0114-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00054.html" source="SUSE-SU"/>
    <description>
    strongSwan 4.5.x through 5.2.x before 5.2.1 allows remote attackers to cause a denial of service (invalid pointer dereference) via a crafted IKEv2 Key Exchange (KE) message with Diffie-Hellman (DH) group 1025.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9221/">CVE-2014-9221</cve>
	<bugzilla href="https://bugzilla.suse.com/910491">SUSE bug 910491</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333984" comment="strongswan is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149278" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9278</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9278" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9278" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9278" ref_url="https://www.suse.com/security/cve/CVE-2014-9278" source="SUSE CVE"/>
    <description>
    The OpenSSH server, as used in Fedora and Red Hat Enterprise Linux 7 and when running in a Kerberos environment, allows remote authenticated users to log in as another user when they are listed in the .k5users file of that user, which might bypass intended authentication requirements that would force a local login.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9278/">CVE-2014-9278</cve>
	<bugzilla href="https://bugzilla.suse.com/908424">SUSE bug 908424</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333996" comment="openssh is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149293" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9293</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9293" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9293" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9293" ref_url="https://www.suse.com/security/cve/CVE-2014-9293" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0259-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0259-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0259-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0274-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0322-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00023.html" source="SUSE-SU"/>
    <description>
    The config_auth function in ntpd in NTP before 4.2.7p11, when an auth key is not configured, improperly generates a key, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via a brute-force attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-05"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9293/">CVE-2014-9293</cve>
	<bugzilla href="https://bugzilla.suse.com/910764">SUSE bug 910764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911053">SUSE bug 911053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911792">SUSE bug 911792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593576" comment="ntp-4.2.4p8-1.29.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593577" comment="ntp-doc-4.2.4p8-1.29.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149294" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9294</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9294" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9294" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9294" ref_url="https://www.suse.com/security/cve/CVE-2014-9294" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0259-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0259-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0259-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0274-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0322-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00023.html" source="SUSE-SU"/>
    <description>
    util/ntp-keygen.c in ntp-keygen in NTP before 4.2.7p230 uses a weak RNG seed, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via a brute-force attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-05"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9294/">CVE-2014-9294</cve>
	<bugzilla href="https://bugzilla.suse.com/910764">SUSE bug 910764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911053">SUSE bug 911053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911792">SUSE bug 911792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593576" comment="ntp-4.2.4p8-1.29.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593577" comment="ntp-doc-4.2.4p8-1.29.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9295</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9295" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9295" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9295" ref_url="https://www.suse.com/security/cve/CVE-2014-9295" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1686-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1686-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1686-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="TID7016020" ref_url="https://www.suse.com/support/kb/doc?id=7016020" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1670-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1680-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00024.html" source="SUSE-SU"/>
    <description>
    Multiple stack-based buffer overflows in ntpd in NTP before 4.2.8 allow remote attackers to execute arbitrary code via a crafted packet, related to (1) the crypto_recv function when the Autokey Authentication feature is used, (2) the ctl_putdata function, and (3) the configure function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-24"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9295/">CVE-2014-9295</cve>
	<bugzilla href="https://bugzilla.suse.com/910764">SUSE bug 910764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911792">SUSE bug 911792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916239">SUSE bug 916239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593580" comment="ntp-4.2.4p8-1.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593581" comment="ntp-doc-4.2.4p8-1.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9297</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9297" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9297" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9297" ref_url="https://www.suse.com/security/cve/CVE-2014-9297" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0259-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0259-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0259-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0274-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0322-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00023.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2014-9750, CVE-2014-9751.  Reason: this ID was intended for one issue, but was associated with two issues.  Notes: All CVE users should consult CVE-2014-9750 and CVE-2014-9751 to identify the ID or IDs of interest. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9297/">CVE-2014-9297</cve>
	<bugzilla href="https://bugzilla.suse.com/911792">SUSE bug 911792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948963">SUSE bug 948963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593576" comment="ntp-4.2.4p8-1.29.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593577" comment="ntp-doc-4.2.4p8-1.29.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149298" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9298</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9298" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9298" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9298" ref_url="https://www.suse.com/security/cve/CVE-2014-9298" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0259-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0259-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0259-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0274-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0322-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00023.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2014-9750, CVE-2014-9751.  Reason: this ID was intended for one issue, but was associated with two issues.  Notes: All CVE users should consult CVE-2014-9750 and CVE-2014-9751 to identify the ID or IDs of interest. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9298/">CVE-2014-9298</cve>
	<bugzilla href="https://bugzilla.suse.com/911792">SUSE bug 911792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948963">SUSE bug 948963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593576" comment="ntp-4.2.4p8-1.29.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593577" comment="ntp-doc-4.2.4p8-1.29.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9322</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9322" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9322" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9322" ref_url="https://www.suse.com/security/cve/CVE-2014-9322" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to gain privileges by triggering an IRET instruction that leads to access to a GS Base address from the wrong space.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-13"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9322/">CVE-2014-9322</cve>
	<bugzilla href="https://bugzilla.suse.com/817142">SUSE bug 817142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910251">SUSE bug 910251</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592521" comment="kernel-bigsmp-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592285" comment="kernel-default-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592286" comment="kernel-default-base-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592287" comment="kernel-default-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592288" comment="kernel-default-extra-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592289" comment="kernel-pae-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592290" comment="kernel-pae-base-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592291" comment="kernel-pae-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592292" comment="kernel-pae-extra-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592293" comment="kernel-source-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592294" comment="kernel-syms-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592295" comment="kernel-trace-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592296" comment="kernel-xen-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592297" comment="kernel-xen-base-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592298" comment="kernel-xen-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592299" comment="kernel-xen-extra-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592300" comment="xen-kmp-default-4.2.5_04_3.0.101_0.47.50-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592301" comment="xen-kmp-pae-4.2.5_04_3.0.101_0.47.50-0.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149328" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9328</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9328" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9328" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9328" ref_url="https://www.suse.com/security/cve/CVE-2014-9328" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0285-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00014.html" source="SUSE-SU"/>
    <description>
    ClamAV before 0.98.6 allows remote attackers to have unspecified impact via a crafted upack packer file, related to a "heap out of bounds condition."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9328/">CVE-2014-9328</cve>
	<bugzilla href="https://bugzilla.suse.com/1040662">SUSE bug 1040662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915512">SUSE bug 915512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593584" comment="clamav-0.98.6-0.6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9402</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9402" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9402" ref_url="https://www.suse.com/security/cve/CVE-2014-9402" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001305.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0351-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00089.html" source="SUSE-SU"/>
    <description>
    The nss_dns implementation of getnetbyname in GNU C Library (aka glibc) before 2.21, when the DNS backend in the Name Service Switch configuration is enabled, allows remote attackers to cause a denial of service (infinite loop) by sending a positive answer while a network name is being process.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9402/">CVE-2014-9402</cve>
	<bugzilla href="https://bugzilla.suse.com/910599">SUSE bug 910599</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592352" comment="glibc-2.11.3-17.82.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592353" comment="glibc-32bit-2.11.3-17.82.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592354" comment="glibc-devel-2.11.3-17.82.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592355" comment="glibc-devel-32bit-2.11.3-17.82.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592356" comment="glibc-i18ndata-2.11.3-17.82.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592357" comment="glibc-locale-2.11.3-17.82.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592358" comment="glibc-locale-32bit-2.11.3-17.82.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592359" comment="nscd-2.11.3-17.82.11 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9419</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9419" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9419" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9419" ref_url="https://www.suse.com/security/cve/CVE-2014-9419" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0529-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0713-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
    <description>
    The __switch_to function in arch/x86/kernel/process_64.c in the Linux kernel through 3.18.1 does not ensure that Thread Local Storage (TLS) descriptors are loaded before proceeding with other steps, which makes it easier for local users to bypass the ASLR protection mechanism via a crafted application that reads a TLS base address.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9419/">CVE-2014-9419</cve>
	<bugzilla href="https://bugzilla.suse.com/911326">SUSE bug 911326</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593262" comment="kernel-default-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593263" comment="kernel-default-base-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593264" comment="kernel-default-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593265" comment="kernel-default-extra-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593266" comment="kernel-pae-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593267" comment="kernel-pae-base-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593268" comment="kernel-pae-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593269" comment="kernel-pae-extra-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593270" comment="kernel-source-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593271" comment="kernel-syms-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593272" comment="kernel-trace-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593273" comment="kernel-xen-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593274" comment="kernel-xen-base-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593275" comment="kernel-xen-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593276" comment="kernel-xen-extra-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590534" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590535" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9420</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9420" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9420" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9420" ref_url="https://www.suse.com/security/cve/CVE-2014-9420" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0178-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0713-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.html" source="SUSE-SU"/>
    <description>
    The rock_continue function in fs/isofs/rock.c in the Linux kernel through 3.18.1 does not restrict the number of Rock Ridge continuation entries, which allows local users to cause a denial of service (infinite loop, and system crash or hang) via a crafted iso9660 image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9420/">CVE-2014-9420</cve>
	<bugzilla href="https://bugzilla.suse.com/906545">SUSE bug 906545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911325">SUSE bug 911325</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592521" comment="kernel-bigsmp-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592285" comment="kernel-default-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592286" comment="kernel-default-base-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592287" comment="kernel-default-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592288" comment="kernel-default-extra-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592289" comment="kernel-pae-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592290" comment="kernel-pae-base-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592291" comment="kernel-pae-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592292" comment="kernel-pae-extra-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592293" comment="kernel-source-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592294" comment="kernel-syms-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592295" comment="kernel-trace-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592296" comment="kernel-xen-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592297" comment="kernel-xen-base-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592298" comment="kernel-xen-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592299" comment="kernel-xen-extra-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592300" comment="xen-kmp-default-4.2.5_04_3.0.101_0.47.50-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592301" comment="xen-kmp-pae-4.2.5_04_3.0.101_0.47.50-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9421</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9421" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9421" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9421" ref_url="https://www.suse.com/security/cve/CVE-2014-9421" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0290-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0255-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00044.html" source="SUSE-SU"/>
    <description>
    The auth_gssapi_unwrap_data function in lib/rpc/auth_gssapi_misc.c in MIT Kerberos 5 (aka krb5) through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 does not properly handle partial XDR deserialization, which allows remote authenticated users to cause a denial of service (use-after-free and double free, and daemon crash) or possibly execute arbitrary code via malformed XDR data, as demonstrated by data sent to kadmind.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9421/">CVE-2014-9421</cve>
	<bugzilla href="https://bugzilla.suse.com/1005509">SUSE bug 1005509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912002">SUSE bug 912002</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566772" comment="krb5-1.6.3-133.49.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566773" comment="krb5-32bit-1.6.3-133.49.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566774" comment="krb5-client-1.6.3-133.49.66.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9422</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9422" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9422" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9422" ref_url="https://www.suse.com/security/cve/CVE-2014-9422" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0290-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0255-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00044.html" source="SUSE-SU"/>
    <description>
    The check_rpcsec_auth function in kadmin/server/kadm_rpc_svc.c in kadmind in MIT Kerberos 5 (aka krb5) through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 allows remote authenticated users to bypass a kadmin/* authorization check and obtain administrative access by leveraging access to a two-component principal with an initial "kadmind" substring, as demonstrated by a "ka/x" principal.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9422/">CVE-2014-9422</cve>
	<bugzilla href="https://bugzilla.suse.com/1005509">SUSE bug 1005509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912002">SUSE bug 912002</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566772" comment="krb5-1.6.3-133.49.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566773" comment="krb5-32bit-1.6.3-133.49.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566774" comment="krb5-client-1.6.3-133.49.66.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9423</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9423" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9423" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9423" ref_url="https://www.suse.com/security/cve/CVE-2014-9423" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0290-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0255-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00044.html" source="SUSE-SU"/>
    <description>
    The svcauth_gss_accept_sec_context function in lib/rpc/svc_auth_gss.c in MIT Kerberos 5 (aka krb5) 1.11.x through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 transmits uninitialized interposer data to clients, which allows remote attackers to obtain sensitive information from process heap memory by sniffing the network for data in a handle field.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9423/">CVE-2014-9423</cve>
	<bugzilla href="https://bugzilla.suse.com/1005509">SUSE bug 1005509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912002">SUSE bug 912002</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566772" comment="krb5-1.6.3-133.49.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566773" comment="krb5-32bit-1.6.3-133.49.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566774" comment="krb5-client-1.6.3-133.49.66.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9447</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9447" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9447" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9447" ref_url="https://www.suse.com/security/cve/CVE-2014-9447" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001269.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0123-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00063.html" source="SUSE-SU"/>
    <description>
    Directory traversal vulnerability in the read_long_names function in libelf/elf_begin.c in elfutils 0.152 and 0.161 allows remote attackers to write to arbitrary files to the root directory via a / (slash) in a crafted archive, as demonstrated using the ar program.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9447/">CVE-2014-9447</cve>
	<bugzilla href="https://bugzilla.suse.com/911662">SUSE bug 911662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912408">SUSE bug 912408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566409" comment="elfutils-0.152-4.9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566410" comment="libasm1-0.152-4.9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566411" comment="libdw1-0.152-4.9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566412" comment="libdw1-32bit-0.152-4.9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566413" comment="libebl1-0.152-4.9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566414" comment="libebl1-32bit-0.152-4.9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566415" comment="libelf1-0.152-4.9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563274" comment="libelf1-32bit-0.152-4.9.17 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9471</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9471" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9471" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9471" ref_url="https://www.suse.com/security/cve/CVE-2014-9471" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001364.html" source="SUSE-SU"/>
    <description>
    The parse_datetime function in GNU coreutils allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted date string, as demonstrated by the "--date=TZ="123"345" @1" string to the touch or date command.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9471/">CVE-2014-9471</cve>
	<bugzilla href="https://bugzilla.suse.com/911832">SUSE bug 911832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593586" comment="coreutils-8.12-6.25.32.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593587" comment="coreutils-lang-8.12-6.25.32.33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149474" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9474</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9474" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9474" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9474" ref_url="https://www.suse.com/security/cve/CVE-2014-9474" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001208.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the mpfr_strtofr function in GNU MPFR before 3.1.2-p11 allows context-dependent attackers to have unspecified impact via vectors related to incorrect documentation for mpn_set_str.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9474/">CVE-2014-9474</cve>
	<bugzilla href="https://bugzilla.suse.com/911812">SUSE bug 911812</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566831" comment="libmpfr1-2.3.2-3.118.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149496" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9496</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9496" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9496" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9496" ref_url="https://www.suse.com/security/cve/CVE-2014-9496" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001193.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0041-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00016.html" source="SUSE-SU"/>
    <description>
    The sd2_parse_rsrc_fork function in sd2.c in libsndfile allows attackers to have unspecified impact via vectors related to a (1) map offset or (2) rsrc marker, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9496/">CVE-2014-9496</cve>
	<bugzilla href="https://bugzilla.suse.com/911796">SUSE bug 911796</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566912" comment="libsndfile-1.0.20-2.6.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566913" comment="libsndfile-32bit-1.0.20-2.6.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9512</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9512" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9512" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9512" ref_url="https://www.suse.com/security/cve/CVE-2014-9512" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002227.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0249-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1671-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00095.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1695-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00112.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0101-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00044.html" source="SUSE-SU"/>
    <description>
    rsync 3.1.1 allows remote attackers to write to arbitrary files via a symlink attack on a file in the synchronization path.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9512/">CVE-2014-9512</cve>
	<bugzilla href="https://bugzilla.suse.com/915410">SUSE bug 915410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960191">SUSE bug 960191</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567101" comment="rsync-3.0.4-2.49.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9529</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9529" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9529" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9529" ref_url="https://www.suse.com/security/cve/CVE-2014-9529" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0713-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00005.html" source="SUSE-SU"/>
    <description>
    Race condition in the key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 3.18.2 allows local users to cause a denial of service (memory corruption or panic) or possibly have unspecified other impact via keyctl commands that trigger access to a key structure member during garbage collection of a key.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9529/">CVE-2014-9529</cve>
	<bugzilla href="https://bugzilla.suse.com/912202">SUSE bug 912202</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593262" comment="kernel-default-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593263" comment="kernel-default-base-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593264" comment="kernel-default-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593265" comment="kernel-default-extra-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593266" comment="kernel-pae-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593267" comment="kernel-pae-base-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593268" comment="kernel-pae-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593269" comment="kernel-pae-extra-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593270" comment="kernel-source-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593271" comment="kernel-syms-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593272" comment="kernel-trace-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593273" comment="kernel-xen-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593274" comment="kernel-xen-base-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593275" comment="kernel-xen-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593276" comment="kernel-xen-extra-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590534" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590535" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9556</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9556" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9556" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9556" ref_url="https://www.suse.com/security/cve/CVE-2014-9556" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001703.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0187-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0449-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00021.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the qtmd_decompress function in libmspack 0.4 allows remote attackers to cause a denial of service (hang) via a crafted CAB file, which triggers an infinite loop.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-07"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9556/">CVE-2014-9556</cve>
	<bugzilla href="https://bugzilla.suse.com/912214">SUSE bug 912214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919283">SUSE bug 919283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934533">SUSE bug 934533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566370" comment="cabextract-1.2-2.12.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566370" comment="cabextract-1.2-2.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566832" comment="libmspack0-0.0.20060920alpha-74.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9584</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9584" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9584" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9584" ref_url="https://www.suse.com/security/cve/CVE-2014-9584" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0529-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0713-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.html" source="SUSE-SU"/>
    <description>
    The parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel before 3.18.2 does not validate a length value in the Extensions Reference (ER) System Use Field, which allows local users to obtain sensitive information from kernel memory via a crafted iso9660 image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9584/">CVE-2014-9584</cve>
	<bugzilla href="https://bugzilla.suse.com/912654">SUSE bug 912654</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592521" comment="kernel-bigsmp-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592285" comment="kernel-default-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592286" comment="kernel-default-base-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592287" comment="kernel-default-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592288" comment="kernel-default-extra-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592289" comment="kernel-pae-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592290" comment="kernel-pae-base-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592291" comment="kernel-pae-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592292" comment="kernel-pae-extra-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592293" comment="kernel-source-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592294" comment="kernel-syms-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592295" comment="kernel-trace-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592296" comment="kernel-xen-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592297" comment="kernel-xen-base-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592298" comment="kernel-xen-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592299" comment="kernel-xen-extra-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592300" comment="xen-kmp-default-4.2.5_04_3.0.101_0.47.50-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592301" comment="xen-kmp-pae-4.2.5_04_3.0.101_0.47.50-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9585</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9585" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9585" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9585" ref_url="https://www.suse.com/security/cve/CVE-2014-9585" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0178-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0713-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.html" source="SUSE-SU"/>
    <description>
    The vdso_addr function in arch/x86/vdso/vma.c in the Linux kernel through 3.18.2 does not properly choose memory locations for the vDSO area, which makes it easier for local users to bypass the ASLR protection mechanism by guessing a location at the end of a PMD.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9585/">CVE-2014-9585</cve>
	<bugzilla href="https://bugzilla.suse.com/912705">SUSE bug 912705</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592521" comment="kernel-bigsmp-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592285" comment="kernel-default-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592286" comment="kernel-default-base-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592287" comment="kernel-default-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592288" comment="kernel-default-extra-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592289" comment="kernel-pae-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592290" comment="kernel-pae-base-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592291" comment="kernel-pae-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592292" comment="kernel-pae-extra-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592293" comment="kernel-source-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592294" comment="kernel-syms-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592295" comment="kernel-trace-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592296" comment="kernel-xen-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592297" comment="kernel-xen-base-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592298" comment="kernel-xen-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592299" comment="kernel-xen-extra-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592300" comment="xen-kmp-default-4.2.5_04_3.0.101_0.47.50-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592301" comment="xen-kmp-pae-4.2.5_04_3.0.101_0.47.50-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9620</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9620" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9620" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9620" ref_url="https://www.suse.com/security/cve/CVE-2014-9620" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3067-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00071.html" source="SUSE-SU"/>
    <description>
    The ELF parser in file 5.08 through 5.21 allows remote attackers to cause a denial of service via a large number of notes.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9620/">CVE-2014-9620</cve>
	<bugzilla href="https://bugzilla.suse.com/913651">SUSE bug 913651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917152">SUSE bug 917152</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334026" comment="file is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9621</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9621" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9621" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9621" ref_url="https://www.suse.com/security/cve/CVE-2014-9621" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3067-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00071.html" source="SUSE-SU"/>
    <description>
    The ELF parser in file 5.16 through 5.21 allows remote attackers to cause a denial of service via a long string.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9621/">CVE-2014-9621</cve>
	<bugzilla href="https://bugzilla.suse.com/913650">SUSE bug 913650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917152">SUSE bug 917152</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334026" comment="file is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9622</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9622" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9622" ref_url="https://www.suse.com/security/cve/CVE-2014-9622" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001219.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0191-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00007.html" source="SUSE-SU"/>
    <description>
    Eval injection vulnerability in xdg-utils 1.1.0 RC1, when no supported desktop environment is identified, allows context-dependent attackers to execute arbitrary code via the URL argument to xdg-open.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9622/">CVE-2014-9622</cve>
	<bugzilla href="https://bugzilla.suse.com/913676">SUSE bug 913676</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334243" comment="xdg-utils is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9636</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9636" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9636" ref_url="https://www.suse.com/security/cve/CVE-2014-9636" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004635.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00013.html" source="SUSE-SU"/>
    <description>
    unzip 6.0 allows remote attackers to cause a denial of service (out-of-bounds read or write and crash) via an extra field with an uncompressed size smaller than the compressed field size in a zip archive that advertises STORED method compression.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-13"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9636/">CVE-2014-9636</cve>
	<bugzilla href="https://bugzilla.suse.com/914442">SUSE bug 914442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567155" comment="unzip-6.00-11.13.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9638</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9638" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9638" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9638" ref_url="https://www.suse.com/security/cve/CVE-2014-9638" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001634.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0522-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00054.html" source="SUSE-SU"/>
    <description>
    oggenc in vorbis-tools 1.4.0 allows remote attackers to cause a denial of service (divide-by-zero error and crash) via a WAV file with the number of channels set to zero.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9638/">CVE-2014-9638</cve>
	<bugzilla href="https://bugzilla.suse.com/914439">SUSE bug 914439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914441">SUSE bug 914441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567156" comment="vorbis-tools-1.1.1-174.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9639</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9639" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9639" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9639" ref_url="https://www.suse.com/security/cve/CVE-2014-9639" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001634.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0522-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00054.html" source="SUSE-SU"/>
    <description>
    Integer overflow in oggenc in vorbis-tools 1.4.0 allows remote attackers to cause a denial of service (crash) via a crafted number of channels in a WAV file, which triggers an out-of-bounds memory access.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9639/">CVE-2014-9639</cve>
	<bugzilla href="https://bugzilla.suse.com/1081744">SUSE bug 1081744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914439">SUSE bug 914439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914441">SUSE bug 914441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567156" comment="vorbis-tools-1.1.1-174.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9653</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9653" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9653" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9653" ref_url="https://www.suse.com/security/cve/CVE-2014-9653" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3067-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00071.html" source="SUSE-SU"/>
    <description>
    readelf.c in file before 5.22, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not consider that pread calls sometimes read only a subset of the available data, which allows remote attackers to cause a denial of service (uninitialized memory access) or possibly have unspecified other impact via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9653/">CVE-2014-9653</cve>
	<bugzilla href="https://bugzilla.suse.com/917152">SUSE bug 917152</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334026" comment="file is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9654</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9654" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9654" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9654" ref_url="https://www.suse.com/security/cve/CVE-2014-9654" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002018.html" source="SUSE-SU"/>
    <description>
    The Regular Expressions package in International Components for Unicode (ICU) for C/C++ before 2014-12-03, as used in Google Chrome before 40.0.2214.91, calculates certain values without ensuring that they can be represented in a 24-bit field, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted string, a related issue to CVE-2014-7923.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-13"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9654/">CVE-2014-9654</cve>
	<bugzilla href="https://bugzilla.suse.com/917129">SUSE bug 917129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929629">SUSE bug 929629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952260">SUSE bug 952260</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009563371" comment="icu-4.0-7.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566637" comment="libicu-4.0-7.28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009564553" comment="icu-4.0-7.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567334" comment="libicu-4.0-7.30.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9655</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9655" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9655" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9655" ref_url="https://www.suse.com/security/cve/CVE-2014-9655" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001561.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0450-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1213-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00019.html" source="SUSE-SU"/>
    <description>
    The (1) putcontig8bitYCbCr21tile function in tif_getimage.c or (2) NeXTDecode function in tif_next.c in LibTIFF allows remote attackers to cause a denial of service (uninitialized memory access) via a crafted TIFF image, as demonstrated by libtiff-cvs-1.tif and libtiff-cvs-2.tif.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9655/">CVE-2014-9655</cve>
	<bugzilla href="https://bugzilla.suse.com/914890">SUSE bug 914890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916925">SUSE bug 916925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916927">SUSE bug 916927</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567153" comment="libtiff3-3.8.2-141.160.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567154" comment="libtiff3-32bit-3.8.2-141.160.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9656</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9656" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9656" ref_url="https://www.suse.com/security/cve/CVE-2014-9656" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0627-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html" source="SUSE-SU"/>
    <description>
    The tt_sbit_decoder_load_image function in sfnt/ttsbit.c in FreeType before 2.5.4 does not properly check for an integer overflow, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted OpenType font.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9656/">CVE-2014-9656</cve>
	<bugzilla href="https://bugzilla.suse.com/916847">SUSE bug 916847</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566566" comment="freetype2-2.3.7-25.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566567" comment="freetype2-32bit-2.3.7-25.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566568" comment="ft2demos-2.3.7-25.34.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149657" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9657</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9657" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9657" ref_url="https://www.suse.com/security/cve/CVE-2014-9657" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<reference ref_id="TID7021823" ref_url="https://www.suse.com/support/kb/doc/?id=7021823" source="SUSE-SU"/>
		<reference ref_id="TID7021836" ref_url="https://www.suse.com/support/kb/doc/?id=7021836" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0627-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html" source="SUSE-SU"/>
    <description>
    The tt_face_load_hdmx function in truetype/ttpload.c in FreeType before 2.5.4 does not establish a minimum record size, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted TrueType font.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9657/">CVE-2014-9657</cve>
	<bugzilla href="https://bugzilla.suse.com/916856">SUSE bug 916856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566566" comment="freetype2-2.3.7-25.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566567" comment="freetype2-32bit-2.3.7-25.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566568" comment="ft2demos-2.3.7-25.34.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9658</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9658" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9658" ref_url="https://www.suse.com/security/cve/CVE-2014-9658" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<reference ref_id="TID7021823" ref_url="https://www.suse.com/support/kb/doc/?id=7021823" source="SUSE-SU"/>
		<reference ref_id="TID7021836" ref_url="https://www.suse.com/support/kb/doc/?id=7021836" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0627-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html" source="SUSE-SU"/>
    <description>
    The tt_face_load_kern function in sfnt/ttkern.c in FreeType before 2.5.4 enforces an incorrect minimum table length, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted TrueType font.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9658/">CVE-2014-9658</cve>
	<bugzilla href="https://bugzilla.suse.com/916857">SUSE bug 916857</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566566" comment="freetype2-2.3.7-25.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566567" comment="freetype2-32bit-2.3.7-25.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566568" comment="ft2demos-2.3.7-25.34.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9659</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9659" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9659" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9659" ref_url="https://www.suse.com/security/cve/CVE-2014-9659" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0627-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html" source="SUSE-SU"/>
    <description>
    cff/cf2intrp.c in the CFF CharString interpreter in FreeType before 2.5.4 proceeds with additional hints after the hint mask has been computed, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted OpenType font.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-2240.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9659/">CVE-2014-9659</cve>
	<bugzilla href="https://bugzilla.suse.com/916867">SUSE bug 916867</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566566" comment="freetype2-2.3.7-25.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566567" comment="freetype2-32bit-2.3.7-25.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566568" comment="ft2demos-2.3.7-25.34.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9660</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9660" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9660" ref_url="https://www.suse.com/security/cve/CVE-2014-9660" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0627-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html" source="SUSE-SU"/>
    <description>
    The _bdf_parse_glyphs function in bdf/bdflib.c in FreeType before 2.5.4 does not properly handle a missing ENDCHAR record, which allows remote attackers to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a crafted BDF font.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9660/">CVE-2014-9660</cve>
	<bugzilla href="https://bugzilla.suse.com/916858">SUSE bug 916858</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566566" comment="freetype2-2.3.7-25.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566567" comment="freetype2-32bit-2.3.7-25.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566568" comment="ft2demos-2.3.7-25.34.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9661</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9661" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9661" ref_url="https://www.suse.com/security/cve/CVE-2014-9661" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0627-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html" source="SUSE-SU"/>
    <description>
    type42/t42parse.c in FreeType before 2.5.4 does not consider that scanning can be incomplete without triggering an error, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted Type42 font.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9661/">CVE-2014-9661</cve>
	<bugzilla href="https://bugzilla.suse.com/916859">SUSE bug 916859</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566566" comment="freetype2-2.3.7-25.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566567" comment="freetype2-32bit-2.3.7-25.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566568" comment="ft2demos-2.3.7-25.34.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9662</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9662" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9662" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9662" ref_url="https://www.suse.com/security/cve/CVE-2014-9662" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0627-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html" source="SUSE-SU"/>
    <description>
    cff/cf2ft.c in FreeType before 2.5.4 does not validate the return values of point-allocation functions, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted OTF font.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9662/">CVE-2014-9662</cve>
	<bugzilla href="https://bugzilla.suse.com/916860">SUSE bug 916860</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566566" comment="freetype2-2.3.7-25.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566567" comment="freetype2-32bit-2.3.7-25.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566568" comment="ft2demos-2.3.7-25.34.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9663</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9663" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9663" ref_url="https://www.suse.com/security/cve/CVE-2014-9663" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0627-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html" source="SUSE-SU"/>
    <description>
    The tt_cmap4_validate function in sfnt/ttcmap.c in FreeType before 2.5.4 validates a certain length field before that field's value is completely calculated, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted cmap SFNT table.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9663/">CVE-2014-9663</cve>
	<bugzilla href="https://bugzilla.suse.com/916865">SUSE bug 916865</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566566" comment="freetype2-2.3.7-25.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566567" comment="freetype2-32bit-2.3.7-25.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566568" comment="ft2demos-2.3.7-25.34.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9664</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9664" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9664" ref_url="https://www.suse.com/security/cve/CVE-2014-9664" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0627-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html" source="SUSE-SU"/>
    <description>
    FreeType before 2.5.4 does not check for the end of the data during certain parsing actions, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted Type42 font, related to type42/t42parse.c and type1/t1load.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9664/">CVE-2014-9664</cve>
	<bugzilla href="https://bugzilla.suse.com/916864">SUSE bug 916864</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566566" comment="freetype2-2.3.7-25.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566567" comment="freetype2-32bit-2.3.7-25.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566568" comment="ft2demos-2.3.7-25.34.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9665</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9665" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9665" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9665" ref_url="https://www.suse.com/security/cve/CVE-2014-9665" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0627-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html" source="SUSE-SU"/>
    <description>
    The Load_SBit_Png function in sfnt/pngshim.c in FreeType before 2.5.4 does not restrict the rows and pitch values of PNG data, which allows remote attackers to cause a denial of service (integer overflow and heap-based buffer overflow) or possibly have unspecified other impact by embedding a PNG file in a .ttf font file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9665/">CVE-2014-9665</cve>
	<bugzilla href="https://bugzilla.suse.com/916863">SUSE bug 916863</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566566" comment="freetype2-2.3.7-25.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566567" comment="freetype2-32bit-2.3.7-25.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566568" comment="ft2demos-2.3.7-25.34.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149666" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9666</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9666" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9666" ref_url="https://www.suse.com/security/cve/CVE-2014-9666" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0627-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html" source="SUSE-SU"/>
    <description>
    The tt_sbit_decoder_init function in sfnt/ttsbit.c in FreeType before 2.5.4 proceeds with a count-to-size association without restricting the count value, which allows remote attackers to cause a denial of service (integer overflow and out-of-bounds read) or possibly have unspecified other impact via a crafted embedded bitmap.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9666/">CVE-2014-9666</cve>
	<bugzilla href="https://bugzilla.suse.com/916862">SUSE bug 916862</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566566" comment="freetype2-2.3.7-25.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566567" comment="freetype2-32bit-2.3.7-25.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566568" comment="ft2demos-2.3.7-25.34.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9667</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9667" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9667" ref_url="https://www.suse.com/security/cve/CVE-2014-9667" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0627-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html" source="SUSE-SU"/>
    <description>
    sfnt/ttload.c in FreeType before 2.5.4 proceeds with offset+length calculations without restricting the values, which allows remote attackers to cause a denial of service (integer overflow and out-of-bounds read) or possibly have unspecified other impact via a crafted SFNT table.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9667/">CVE-2014-9667</cve>
	<bugzilla href="https://bugzilla.suse.com/916861">SUSE bug 916861</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566566" comment="freetype2-2.3.7-25.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566567" comment="freetype2-32bit-2.3.7-25.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566568" comment="ft2demos-2.3.7-25.34.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9668</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9668" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9668" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9668" ref_url="https://www.suse.com/security/cve/CVE-2014-9668" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0627-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html" source="SUSE-SU"/>
    <description>
    The woff_open_font function in sfnt/sfobjs.c in FreeType before 2.5.4 proceeds with offset+length calculations without restricting length values, which allows remote attackers to cause a denial of service (integer overflow and heap-based buffer overflow) or possibly have unspecified other impact via a crafted Web Open Font Format (WOFF) file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9668/">CVE-2014-9668</cve>
	<bugzilla href="https://bugzilla.suse.com/916868">SUSE bug 916868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566566" comment="freetype2-2.3.7-25.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566567" comment="freetype2-32bit-2.3.7-25.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566568" comment="ft2demos-2.3.7-25.34.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9669</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9669" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9669" ref_url="https://www.suse.com/security/cve/CVE-2014-9669" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0627-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in sfnt/ttcmap.c in FreeType before 2.5.4 allow remote attackers to cause a denial of service (out-of-bounds read or memory corruption) or possibly have unspecified other impact via a crafted cmap SFNT table.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9669/">CVE-2014-9669</cve>
	<bugzilla href="https://bugzilla.suse.com/916870">SUSE bug 916870</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566566" comment="freetype2-2.3.7-25.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566567" comment="freetype2-32bit-2.3.7-25.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566568" comment="ft2demos-2.3.7-25.34.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9670</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9670" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9670" ref_url="https://www.suse.com/security/cve/CVE-2014-9670" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0627-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html" source="SUSE-SU"/>
    <description>
    Multiple integer signedness errors in the pcf_get_encodings function in pcf/pcfread.c in FreeType before 2.5.4 allow remote attackers to cause a denial of service (integer overflow, NULL pointer dereference, and application crash) via a crafted PCF file that specifies negative values for the first column and first row.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9670/">CVE-2014-9670</cve>
	<bugzilla href="https://bugzilla.suse.com/916871">SUSE bug 916871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933247">SUSE bug 933247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566566" comment="freetype2-2.3.7-25.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566567" comment="freetype2-32bit-2.3.7-25.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566568" comment="ft2demos-2.3.7-25.34.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9671</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9671" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9671" ref_url="https://www.suse.com/security/cve/CVE-2014-9671" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0627-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in the pcf_get_properties function in pcf/pcfread.c in FreeType before 2.5.4 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted PCF file with a 0xffffffff size value that is improperly incremented.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9671/">CVE-2014-9671</cve>
	<bugzilla href="https://bugzilla.suse.com/916872">SUSE bug 916872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933247">SUSE bug 933247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593594" comment="freetype2-2.3.7-25.35.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593595" comment="freetype2-32bit-2.3.7-25.35.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593596" comment="ft2demos-2.3.7-25.35.36.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9672</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9672" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9672" ref_url="https://www.suse.com/security/cve/CVE-2014-9672" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0627-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html" source="SUSE-SU"/>
    <description>
    Array index error in the parse_fond function in base/ftmac.c in FreeType before 2.5.4 allows remote attackers to cause a denial of service (out-of-bounds read) or obtain sensitive information from process memory via a crafted FOND resource in a Mac font file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9672/">CVE-2014-9672</cve>
	<bugzilla href="https://bugzilla.suse.com/916873">SUSE bug 916873</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566566" comment="freetype2-2.3.7-25.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566567" comment="freetype2-32bit-2.3.7-25.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566568" comment="ft2demos-2.3.7-25.34.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9673</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9673" ref_url="https://www.suse.com/security/cve/CVE-2014-9673" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0627-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html" source="SUSE-SU"/>
    <description>
    Integer signedness error in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.5.4 allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted Mac font.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9673/">CVE-2014-9673</cve>
	<bugzilla href="https://bugzilla.suse.com/916874">SUSE bug 916874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566566" comment="freetype2-2.3.7-25.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566567" comment="freetype2-32bit-2.3.7-25.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566568" comment="ft2demos-2.3.7-25.34.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9674</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9674" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9674" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9674" ref_url="https://www.suse.com/security/cve/CVE-2014-9674" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0627-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html" source="SUSE-SU"/>
    <description>
    The Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.5.4 proceeds with adding to length values without validating the original values, which allows remote attackers to cause a denial of service (integer overflow and heap-based buffer overflow) or possibly have unspecified other impact via a crafted Mac font.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9674/">CVE-2014-9674</cve>
	<bugzilla href="https://bugzilla.suse.com/916879">SUSE bug 916879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566566" comment="freetype2-2.3.7-25.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566567" comment="freetype2-32bit-2.3.7-25.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566568" comment="ft2demos-2.3.7-25.34.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9675</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9675" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9675" ref_url="https://www.suse.com/security/cve/CVE-2014-9675" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0627-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html" source="SUSE-SU"/>
    <description>
    bdf/bdflib.c in FreeType before 2.5.4 identifies property names by only verifying that an initial substring is present, which allows remote attackers to discover heap pointer values and bypass the ASLR protection mechanism via a crafted BDF font.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9675/">CVE-2014-9675</cve>
	<bugzilla href="https://bugzilla.suse.com/916881">SUSE bug 916881</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566566" comment="freetype2-2.3.7-25.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566567" comment="freetype2-32bit-2.3.7-25.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566568" comment="ft2demos-2.3.7-25.34.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9679</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9679" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9679" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9679" ref_url="https://www.suse.com/security/cve/CVE-2014-9679" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0465-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001311.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0381-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00098.html" source="SUSE-SU"/>
    <description>
    Integer underflow in the cupsRasterReadPixels function in filter/raster.c in CUPS before 2.0.2 allows remote attackers to have unspecified impact via a malformed compressed raster file, which triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-9679/">CVE-2014-9679</cve>
	<bugzilla href="https://bugzilla.suse.com/917799">SUSE bug 917799</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593605" comment="cups-1.3.9-8.46.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593606" comment="cups-client-1.3.9-8.46.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593607" comment="cups-libs-1.3.9-8.46.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593608" comment="cups-libs-32bit-1.3.9-8.46.54.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9680</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9680" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9680" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9680" ref_url="https://www.suse.com/security/cve/CVE-2014-9680" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002420.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1849-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1913-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2983-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3004-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00029.html" source="SUSE-SU"/>
    <description>
    sudo before 1.8.12 does not ensure that the TZ environment variable is associated with a zoneinfo file, which allows local users to open arbitrary files for read access (but not view file contents) by running a program within an sudo session, as demonstrated by interfering with terminal output, discarding kernel-log messages, or repositioning tape drives.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9680/">CVE-2014-9680</cve>
	<bugzilla href="https://bugzilla.suse.com/917806">SUSE bug 917806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919737">SUSE bug 919737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921999">SUSE bug 921999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953359">SUSE bug 953359</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593615" comment="sudo-1.7.6p2-0.23.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9683</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9683" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9683" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9683" ref_url="https://www.suse.com/security/cve/CVE-2014-9683" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1478-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in the ecryptfs_decode_from_filename function in fs/ecryptfs/crypto.c in the eCryptfs subsystem in the Linux kernel before 3.18.2 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted filename.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9683/">CVE-2014-9683</cve>
	<bugzilla href="https://bugzilla.suse.com/918333">SUSE bug 918333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593262" comment="kernel-default-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593263" comment="kernel-default-base-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593264" comment="kernel-default-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593265" comment="kernel-default-extra-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593266" comment="kernel-pae-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593267" comment="kernel-pae-base-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593268" comment="kernel-pae-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593269" comment="kernel-pae-extra-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593270" comment="kernel-source-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593271" comment="kernel-syms-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593272" comment="kernel-trace-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593273" comment="kernel-xen-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593274" comment="kernel-xen-base-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593275" comment="kernel-xen-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593276" comment="kernel-xen-extra-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590534" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590535" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9687</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9687" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9687" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9687" ref_url="https://www.suse.com/security/cve/CVE-2014-9687" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001837.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0291-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00118.html" source="SUSE-SU"/>
    <description>
    eCryptfs 104 and earlier uses a default salt to encrypt the mount passphrase, which makes it easier for attackers to obtain user passwords via a brute force attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9687/">CVE-2014-9687</cve>
	<bugzilla href="https://bugzilla.suse.com/920160">SUSE bug 920160</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566407" comment="ecryptfs-utils-61-1.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566408" comment="ecryptfs-utils-32bit-61-1.35.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9709</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9709" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9709" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9709" ref_url="https://www.suse.com/security/cve/CVE-2014-9709" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0868-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1638-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0637-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0644-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-04/msg00002.html" source="SUSE-SU"/>
    <description>
    The GetCode_ function in gd_gif_in.c in GD 2.1.1 and earlier, as used in PHP before 5.5.21 and 5.6.x before 5.6.5, allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted GIF image that is improperly handled by the gdImageCreateFromGif function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9709/">CVE-2014-9709</cve>
	<bugzilla href="https://bugzilla.suse.com/923945">SUSE bug 923945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923946">SUSE bug 923946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566571" comment="gd-2.0.36.RC1-52.20.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9710</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9710" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9710" ref_url="https://www.suse.com/security/cve/CVE-2014-9710" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1489-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005579.html" source="SUSE-SU"/>
    <description>
    The Btrfs implementation in the Linux kernel before 3.19 does not ensure that the visible xattr state is consistent with a requested replacement, which allows local users to bypass intended ACL settings and gain privileges via standard filesystem operations (1) during an xattr-replacement time window, related to a race condition, or (2) after an xattr-replacement attempt that fails because the data does not fit.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9710/">CVE-2014-9710</cve>
	<bugzilla href="https://bugzilla.suse.com/923908">SUSE bug 923908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939260">SUSE bug 939260</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9715</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9715" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9715" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9715" ref_url="https://www.suse.com/security/cve/CVE-2014-9715" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
    <description>
    include/net/netfilter/nf_conntrack_extend.h in the netfilter subsystem in the Linux kernel before 3.14.5 uses an insufficiently large data type for certain extension data, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via outbound network traffic that triggers extension loading, as demonstrated by configuring a PPTP tunnel in a NAT environment.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9715/">CVE-2014-9715</cve>
	<bugzilla href="https://bugzilla.suse.com/927780">SUSE bug 927780</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9718</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9718" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9718" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9718" ref_url="https://www.suse.com/security/cve/CVE-2014-9718" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
    <description>
    The (1) BMDMA and (2) AHCI HBA interfaces in the IDE functionality in QEMU 1.0 through 2.1.3 have multiple interpretations of a function's return value, which allows guest OS users to cause a host OS denial of service (memory consumption or infinite loop, and system crash) via a PRDT with zero complete sectors, related to the bmdma_prepare_buf and ahci_dma_prepare_buf functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9718/">CVE-2014-9718</cve>
	<bugzilla href="https://bugzilla.suse.com/928393">SUSE bug 928393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964431">SUSE bug 964431</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567467" comment="xen-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567468" comment="xen-doc-html-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567469" comment="xen-kmp-default-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567470" comment="xen-kmp-pae-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567471" comment="xen-libs-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567472" comment="xen-libs-32bit-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567473" comment="xen-tools-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567474" comment="xen-tools-domU-4.4.4_02-32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9728</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9728" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9728" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9728" ref_url="https://www.suse.com/security/cve/CVE-2014-9728" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1611-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001611.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
    <description>
    The UDF filesystem implementation in the Linux kernel before 3.18.2 does not validate certain lengths, which allows local users to cause a denial of service (buffer over-read and system crash) via a crafted filesystem image, related to fs/udf/inode.c and fs/udf/symlink.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9728/">CVE-2014-9728</cve>
	<bugzilla href="https://bugzilla.suse.com/911325">SUSE bug 911325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933904">SUSE bug 933904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566727" comment="kernel-bigsmp-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566728" comment="kernel-default-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566729" comment="kernel-default-base-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566730" comment="kernel-default-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566731" comment="kernel-default-extra-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566732" comment="kernel-pae-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566733" comment="kernel-pae-base-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566734" comment="kernel-pae-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566735" comment="kernel-pae-extra-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566736" comment="kernel-source-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566737" comment="kernel-syms-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566738" comment="kernel-trace-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566739" comment="kernel-xen-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566740" comment="kernel-xen-base-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566741" comment="kernel-xen-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566742" comment="kernel-xen-extra-3.0.101-0.47.67.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567338" comment="kernel-default-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567339" comment="kernel-default-base-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567340" comment="kernel-default-devel-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567341" comment="kernel-default-extra-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567342" comment="kernel-pae-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567343" comment="kernel-pae-base-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567344" comment="kernel-pae-devel-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567345" comment="kernel-pae-extra-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567346" comment="kernel-source-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567347" comment="kernel-syms-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567348" comment="kernel-trace-devel-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567349" comment="kernel-xen-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567350" comment="kernel-xen-base-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567351" comment="kernel-xen-devel-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567352" comment="kernel-xen-extra-3.0.101-65.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9729</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9729" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9729" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9729" ref_url="https://www.suse.com/security/cve/CVE-2014-9729" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1611-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001611.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
    <description>
    The udf_read_inode function in fs/udf/inode.c in the Linux kernel before 3.18.2 does not ensure a certain data-structure size consistency, which allows local users to cause a denial of service (system crash) via a crafted UDF filesystem image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9729/">CVE-2014-9729</cve>
	<bugzilla href="https://bugzilla.suse.com/911325">SUSE bug 911325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933904">SUSE bug 933904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566727" comment="kernel-bigsmp-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566728" comment="kernel-default-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566729" comment="kernel-default-base-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566730" comment="kernel-default-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566731" comment="kernel-default-extra-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566732" comment="kernel-pae-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566733" comment="kernel-pae-base-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566734" comment="kernel-pae-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566735" comment="kernel-pae-extra-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566736" comment="kernel-source-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566737" comment="kernel-syms-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566738" comment="kernel-trace-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566739" comment="kernel-xen-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566740" comment="kernel-xen-base-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566741" comment="kernel-xen-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566742" comment="kernel-xen-extra-3.0.101-0.47.67.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567338" comment="kernel-default-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567339" comment="kernel-default-base-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567340" comment="kernel-default-devel-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567341" comment="kernel-default-extra-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567342" comment="kernel-pae-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567343" comment="kernel-pae-base-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567344" comment="kernel-pae-devel-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567345" comment="kernel-pae-extra-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567346" comment="kernel-source-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567347" comment="kernel-syms-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567348" comment="kernel-trace-devel-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567349" comment="kernel-xen-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567350" comment="kernel-xen-base-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567351" comment="kernel-xen-devel-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567352" comment="kernel-xen-extra-3.0.101-65.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9730</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9730" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9730" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9730" ref_url="https://www.suse.com/security/cve/CVE-2014-9730" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1611-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001611.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
    <description>
    The udf_pc_to_char function in fs/udf/symlink.c in the Linux kernel before 3.18.2 relies on component lengths that are unused, which allows local users to cause a denial of service (system crash) via a crafted UDF filesystem image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9730/">CVE-2014-9730</cve>
	<bugzilla href="https://bugzilla.suse.com/911325">SUSE bug 911325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933904">SUSE bug 933904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566727" comment="kernel-bigsmp-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566728" comment="kernel-default-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566729" comment="kernel-default-base-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566730" comment="kernel-default-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566731" comment="kernel-default-extra-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566732" comment="kernel-pae-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566733" comment="kernel-pae-base-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566734" comment="kernel-pae-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566735" comment="kernel-pae-extra-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566736" comment="kernel-source-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566737" comment="kernel-syms-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566738" comment="kernel-trace-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566739" comment="kernel-xen-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566740" comment="kernel-xen-base-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566741" comment="kernel-xen-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566742" comment="kernel-xen-extra-3.0.101-0.47.67.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567338" comment="kernel-default-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567339" comment="kernel-default-base-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567340" comment="kernel-default-devel-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567341" comment="kernel-default-extra-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567342" comment="kernel-pae-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567343" comment="kernel-pae-base-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567344" comment="kernel-pae-devel-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567345" comment="kernel-pae-extra-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567346" comment="kernel-source-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567347" comment="kernel-syms-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567348" comment="kernel-trace-devel-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567349" comment="kernel-xen-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567350" comment="kernel-xen-base-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567351" comment="kernel-xen-devel-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567352" comment="kernel-xen-extra-3.0.101-65.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9731</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9731" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9731" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9731" ref_url="https://www.suse.com/security/cve/CVE-2014-9731" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1611-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001611.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
    <description>
    The UDF filesystem implementation in the Linux kernel before 3.18.2 does not ensure that space is available for storing a symlink target's name along with a trailing \0 character, which allows local users to obtain sensitive information via a crafted filesystem image, related to fs/udf/symlink.c and fs/udf/unicode.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9731/">CVE-2014-9731</cve>
	<bugzilla href="https://bugzilla.suse.com/911325">SUSE bug 911325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933896">SUSE bug 933896</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566727" comment="kernel-bigsmp-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566728" comment="kernel-default-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566729" comment="kernel-default-base-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566730" comment="kernel-default-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566731" comment="kernel-default-extra-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566732" comment="kernel-pae-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566733" comment="kernel-pae-base-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566734" comment="kernel-pae-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566735" comment="kernel-pae-extra-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566736" comment="kernel-source-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566737" comment="kernel-syms-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566738" comment="kernel-trace-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566739" comment="kernel-xen-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566740" comment="kernel-xen-base-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566741" comment="kernel-xen-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566742" comment="kernel-xen-extra-3.0.101-0.47.67.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567338" comment="kernel-default-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567339" comment="kernel-default-base-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567340" comment="kernel-default-devel-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567341" comment="kernel-default-extra-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567342" comment="kernel-pae-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567343" comment="kernel-pae-base-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567344" comment="kernel-pae-devel-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567345" comment="kernel-pae-extra-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567346" comment="kernel-source-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567347" comment="kernel-syms-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567348" comment="kernel-trace-devel-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567349" comment="kernel-xen-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567350" comment="kernel-xen-base-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567351" comment="kernel-xen-devel-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567352" comment="kernel-xen-extra-3.0.101-65.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9732</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9732" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9732" ref_url="https://www.suse.com/security/cve/CVE-2014-9732" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001776.html" source="SUSE-SU"/>
    <description>
    The cabd_extract function in cabd.c in libmspack before 0.5 does not properly maintain decompression callbacks in certain cases where an invalid file follows a valid file, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted CAB archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-07"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9732/">CVE-2014-9732</cve>
	<bugzilla href="https://bugzilla.suse.com/934524">SUSE bug 934524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934533">SUSE bug 934533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566370" comment="cabextract-1.2-2.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566833" comment="libmspack0-0.0.20060920alpha-74.10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9756</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9756" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9756" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9756" ref_url="https://www.suse.com/security/cve/CVE-2014-9756" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2000-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001763.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1995-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2119-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00145.html" source="SUSE-SU"/>
    <description>
    The psf_fwrite function in file_io.c in libsndfile allows attackers to cause a denial of service (divide-by-zero error and application crash) via unspecified vectors related to the headindex variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9756/">CVE-2014-9756</cve>
	<bugzilla href="https://bugzilla.suse.com/953516">SUSE bug 953516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953519">SUSE bug 953519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953521">SUSE bug 953521</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566914" comment="libsndfile-1.0.20-2.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566915" comment="libsndfile-32bit-1.0.20-2.10.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9761</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9761" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9761" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9761" ref_url="https://www.suse.com/security/cve/CVE-2014-9761" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0472-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="TID7017287" ref_url="https://www.suse.com/support/kb/doc?id=7017287" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html" source="SUSE-SU"/>
    <description>
    Multiple stack-based buffer overflows in the GNU C Library (aka glibc or libc6) before 2.23 allow context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long argument to the (1) nan, (2) nanf, or (3) nanl function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9761/">CVE-2014-9761</cve>
	<bugzilla href="https://bugzilla.suse.com/962738">SUSE bug 962738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986086">SUSE bug 986086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566593" comment="glibc-2.11.3-17.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566594" comment="glibc-32bit-2.11.3-17.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566595" comment="glibc-devel-2.11.3-17.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566596" comment="glibc-devel-32bit-2.11.3-17.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566597" comment="glibc-i18ndata-2.11.3-17.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566598" comment="glibc-locale-2.11.3-17.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566599" comment="glibc-locale-32bit-2.11.3-17.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566600" comment="nscd-2.11.3-17.95.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9769</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9769" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9769" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9769" ref_url="https://www.suse.com/security/cve/CVE-2014-9769" source="SUSE CVE"/>
    <description>
    pcre_jit_compile.c in PCRE 8.35 does not properly use table jumps to optimize nested alternatives, which allows remote attackers to cause a denial of service (stack memory corruption) or possibly have unspecified other impact via a crafted string, as demonstrated by packets encountered by Suricata during use of a regular expression in an Emerging Threats Open ruleset.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9769/">CVE-2014-9769</cve>
	<bugzilla href="https://bugzilla.suse.com/973012">SUSE bug 973012</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334068" comment="pcre is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9771</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9771" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9771" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9771" ref_url="https://www.suse.com/security/cve/CVE-2014-9771" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1330-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00076.html" source="SUSE-SU"/>
    <description>
    Integer overflow in imlib2 before 1.4.7 allows remote attackers to cause a denial of service (memory consumption or application crash) via a crafted image, which triggers an invalid read operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9771/">CVE-2014-9771</cve>
	<bugzilla href="https://bugzilla.suse.com/974854">SUSE bug 974854</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339303" comment="imlib2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0204</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0204" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0204" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0172-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-4" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1161-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7014420" ref_url="https://www.suse.com/support/kb/doc/?id=7014420" source="SUSE-SU"/>
		<reference ref_id="TID7016252" ref_url="https://www.suse.com/support/kb/doc?id=7016252" source="SUSE-SU"/>
		<reference ref_id="TID7016260" ref_url="https://www.suse.com/support/kb/doc/?id=7016260" source="SUSE-SU"/>
		<reference ref_id="TID7016273" ref_url="https://www.suse.com/support/kb/doc/?id=7016273" source="SUSE-SU"/>
		<reference ref_id="TID7016312" ref_url="https://www.suse.com/support/kb/doc/?id=7016312" source="SUSE-SU"/>
		<reference ref_id="TID7016336" ref_url="https://www.suse.com/support/kb/doc/?id=7016336" source="SUSE-SU"/>
		<reference ref_id="TID7016340" ref_url="https://www.suse.com/support/kb/doc/?id=7016340" source="SUSE-SU"/>
		<reference ref_id="TID7016875" ref_url="https://www.suse.com/support/kb/doc/?id=7016875" source="SUSE-SU"/>
		<reference ref_id="TID7021279" ref_url="https://www.suse.com/support/kb/doc/?id=7021279" source="SUSE-SU"/>
		<reference ref_id="TID7021435" ref_url="https://www.suse.com/support/kb/doc/?id=7021435" source="SUSE-SU"/>
		<reference ref_id="TID7021518" ref_url="https://www.suse.com/support/kb/doc/?id=7021518" source="SUSE-SU"/>
		<reference ref_id="TID7021676" ref_url="https://www.suse.com/support/kb/doc/?id=7021676" source="SUSE-SU"/>
		<reference ref_id="TID7021714" ref_url="https://www.suse.com/support/kb/doc/?id=7021714" source="SUSE-SU"/>
		<reference ref_id="TID7021743" ref_url="https://www.suse.com/support/kb/doc/?id=7021743" source="SUSE-SU"/>
		<reference ref_id="TID7021744" ref_url="https://www.suse.com/support/kb/doc/?id=7021744" source="SUSE-SU"/>
		<reference ref_id="TID7021848" ref_url="https://www.suse.com/support/kb/doc/?id=7021848" source="SUSE-SU"/>
		<reference ref_id="TID7021863" ref_url="https://www.suse.com/support/kb/doc/?id=7021863" source="SUSE-SU"/>
		<reference ref_id="TID7021977" ref_url="https://www.suse.com/support/kb/doc/?id=7021977" source="SUSE-SU"/>
		<reference ref_id="TID7021993" ref_url="https://www.suse.com/support/kb/doc/?id=7021993" source="SUSE-SU"/>
		<reference ref_id="TID7021994" ref_url="https://www.suse.com/support/kb/doc/?id=7021994" source="SUSE-SU"/>
		<reference ref_id="TID7021995" ref_url="https://www.suse.com/support/kb/doc/?id=7021995" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0130-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate brute-force decryption by offering a weak ephemeral RSA key in a noncompliant role, related to the "FREAK" issue.  NOTE: the scope of this CVE is only client code based on OpenSSL, not EXPORT_RSA issues associated with servers or other TLS implementations.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-15"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204</cve>
	<bugzilla href="https://bugzilla.suse.com/912014">SUSE bug 912014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920482">SUSE bug 920482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920484">SUSE bug 920484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927591">SUSE bug 927591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952088">SUSE bug 952088</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592978" comment="compat-openssl097g-0.9.7g-146.22.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592979" comment="compat-openssl097g-32bit-0.9.7g-146.22.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592963" comment="libmysql55client18-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592964" comment="libmysql55client18-32bit-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592965" comment="libmysql55client_r18-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592966" comment="libmysql55client_r18-32bit-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590297" comment="libmysqlclient15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590298" comment="libmysqlclient15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590299" comment="libmysqlclient_r15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590300" comment="libmysqlclient_r15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592980" comment="libopenssl0_9_8-0.9.8j-0.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592981" comment="libopenssl0_9_8-32bit-0.9.8j-0.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592967" comment="mysql-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592968" comment="mysql-client-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592982" comment="openssl-0.9.8j-0.68.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0205</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0205" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0205" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0205" ref_url="https://www.suse.com/security/cve/CVE-2015-0205" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0172-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0130-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html" source="SUSE-SU"/>
    <description>
    The ssl3_get_cert_verify function in s3_srvr.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 before 1.0.1k accepts client authentication with a Diffie-Hellman (DH) certificate without requiring a CertificateVerify message, which allows remote attackers to obtain access without knowledge of a private key via crafted TLS Handshake Protocol traffic to a server that recognizes a Certification Authority with DH support.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0205/">CVE-2015-0205</cve>
	<bugzilla href="https://bugzilla.suse.com/912293">SUSE bug 912293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592978" comment="compat-openssl097g-0.9.7g-146.22.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592979" comment="compat-openssl097g-32bit-0.9.7g-146.22.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592963" comment="libmysql55client18-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592964" comment="libmysql55client18-32bit-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592965" comment="libmysql55client_r18-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592966" comment="libmysql55client_r18-32bit-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590297" comment="libmysqlclient15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590298" comment="libmysqlclient15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590299" comment="libmysqlclient_r15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590300" comment="libmysqlclient_r15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592980" comment="libopenssl0_9_8-0.9.8j-0.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592981" comment="libopenssl0_9_8-32bit-0.9.8j-0.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592967" comment="mysql-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592968" comment="mysql-client-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592982" comment="openssl-0.9.8j-0.68.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0206</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0206" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0206" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0206" ref_url="https://www.suse.com/security/cve/CVE-2015-0206" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0130-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html" source="SUSE-SU"/>
    <description>
    Memory leak in the dtls1_buffer_record function in d1_pkt.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 before 1.0.1k allows remote attackers to cause a denial of service (memory consumption) by sending many duplicate records for the next epoch, leading to failure of replay detection.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0206/">CVE-2015-0206</cve>
	<bugzilla href="https://bugzilla.suse.com/912292">SUSE bug 912292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592963" comment="libmysql55client18-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592964" comment="libmysql55client18-32bit-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592965" comment="libmysql55client_r18-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592966" comment="libmysql55client_r18-32bit-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590297" comment="libmysqlclient15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590298" comment="libmysqlclient15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590299" comment="libmysqlclient_r15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590300" comment="libmysqlclient_r15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592967" comment="mysql-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592968" comment="mysql-client-5.5.43-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0207</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0207" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0207" ref_url="https://www.suse.com/security/cve/CVE-2015-0207" source="SUSE CVE"/>
		<reference ref_id="TID7016336" ref_url="https://www.suse.com/support/kb/doc/?id=7016336" source="SUSE-SU"/>
    <description>
    The dtls1_listen function in d1_lib.c in OpenSSL 1.0.2 before 1.0.2a does not properly isolate the state information of independent data streams, which allows remote attackers to cause a denial of service (application crash) via crafted DTLS traffic, as demonstrated by DTLS 1.0 traffic to a DTLS 1.2 server.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0207/">CVE-2015-0207</cve>
	<bugzilla href="https://bugzilla.suse.com/922494">SUSE bug 922494</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0208</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0208" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0208" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0208" ref_url="https://www.suse.com/security/cve/CVE-2015-0208" source="SUSE CVE"/>
		<reference ref_id="TID7016336" ref_url="https://www.suse.com/support/kb/doc/?id=7016336" source="SUSE-SU"/>
		<reference ref_id="TID7021977" ref_url="https://www.suse.com/support/kb/doc/?id=7021977" source="SUSE-SU"/>
    <description>
    The ASN.1 signature-verification implementation in the rsa_item_verify function in crypto/rsa/rsa_ameth.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via crafted RSA PSS parameters to an endpoint that uses the certificate-verification feature.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0208/">CVE-2015-0208</cve>
	<bugzilla href="https://bugzilla.suse.com/922498">SUSE bug 922498</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0209</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0209" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0209" ref_url="https://www.suse.com/security/cve/CVE-2015-0209" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0546-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="TID7016336" ref_url="https://www.suse.com/support/kb/doc/?id=7016336" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0554-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the d2i_ECPrivateKey function in crypto/ec/ec_asn1.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a malformed Elliptic Curve (EC) private-key file that is improperly handled during import.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0209/">CVE-2015-0209</cve>
	<bugzilla href="https://bugzilla.suse.com/919648">SUSE bug 919648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936586">SUSE bug 936586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009587402" comment="libopenssl0_9_8-0.9.8j-0.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009587403" comment="libopenssl0_9_8-32bit-0.9.8j-0.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009587404" comment="openssl-0.9.8j-0.70.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0235</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0235" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0235" ref_url="https://www.suse.com/security/cve/CVE-2015-0235" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0158-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="TID7016113" ref_url="https://www.suse.com/support/kb/doc?id=7016113" source="SUSE-SU"/>
		<reference ref_id="TID7016115" ref_url="https://www.suse.com/support/kb/doc/?id=7016115" source="SUSE-SU"/>
		<reference ref_id="TID7016118" ref_url="https://www.suse.com/support/kb/doc/?id=7016118" source="SUSE-SU"/>
		<reference ref_id="TID7016147" ref_url="https://www.suse.com/support/kb/doc/?id=7016147" source="SUSE-SU"/>
		<reference ref_id="TID7016171" ref_url="https://www.suse.com/support/kb/doc/?id=7016171" source="SUSE-SU"/>
		<reference ref_id="TID7016215" ref_url="https://www.suse.com/support/kb/doc/?id=7016215" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka "GHOST."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-23"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0235/">CVE-2015-0235</cve>
	<bugzilla href="https://bugzilla.suse.com/844309">SUSE bug 844309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913646">SUSE bug 913646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949238">SUSE bug 949238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954983">SUSE bug 954983</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593743" comment="glibc-2.11.3-17.74.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593744" comment="glibc-32bit-2.11.3-17.74.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593745" comment="glibc-devel-2.11.3-17.74.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593746" comment="glibc-devel-32bit-2.11.3-17.74.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593747" comment="glibc-i18ndata-2.11.3-17.74.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593748" comment="glibc-locale-2.11.3-17.74.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593749" comment="glibc-locale-32bit-2.11.3-17.74.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593750" comment="nscd-2.11.3-17.74.13 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0236</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0236" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0236" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0236" ref_url="https://www.suse.com/security/cve/CVE-2015-0236" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001840.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0225-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00028.html" source="SUSE-SU"/>
    <description>
    libvirt before 1.2.12 allow remote authenticated users to obtain the VNC password by using the VIR_DOMAIN_XML_SECURE flag with a crafted (1) snapshot to the virDomainSnapshotGetXMLDesc interface or (2) image to the virDomainSaveImageGetXMLDesc interface.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0236/">CVE-2015-0236</cve>
	<bugzilla href="https://bugzilla.suse.com/914693">SUSE bug 914693</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333954" comment="libvirt is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0240</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0240" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0240" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0240" ref_url="https://www.suse.com/security/cve/CVE-2015-0240" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0353-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0371-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="TID7014420" ref_url="https://www.suse.com/support/kb/doc/?id=7014420" source="SUSE-SU"/>
		<reference ref_id="TID7016875" ref_url="https://www.suse.com/support/kb/doc/?id=7016875" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1106-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" source="SUSE-SU"/>
    <description>
    The Netlogon server implementation in smbd in Samba 3.5.x and 3.6.x before 3.6.25, 4.0.x before 4.0.25, 4.1.x before 4.1.17, and 4.2.x before 4.2.0rc5 performs a free operation on an uninitialized stack pointer, which allows remote attackers to execute arbitrary code via crafted Netlogon packets that use the ServerPasswordSet RPC API, as demonstrated by packets reaching the _netr_ServerPasswordSet function in rpc_server/netlogon/srv_netlog_nt.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0240/">CVE-2015-0240</cve>
	<bugzilla href="https://bugzilla.suse.com/917376">SUSE bug 917376</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567104" comment="libldb1-3.6.3-0.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567105" comment="libldb1-32bit-3.6.3-0.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567106" comment="libsmbclient0-3.6.3-0.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567107" comment="libsmbclient0-32bit-3.6.3-0.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567108" comment="libtalloc2-3.6.3-0.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567109" comment="libtalloc2-32bit-3.6.3-0.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567110" comment="libtdb1-3.6.3-0.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567111" comment="libtdb1-32bit-3.6.3-0.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567112" comment="libtevent0-3.6.3-0.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567113" comment="libtevent0-32bit-3.6.3-0.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567114" comment="libwbclient0-3.6.3-0.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567115" comment="libwbclient0-32bit-3.6.3-0.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567116" comment="samba-3.6.3-0.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567117" comment="samba-32bit-3.6.3-0.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567118" comment="samba-client-3.6.3-0.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567119" comment="samba-client-32bit-3.6.3-0.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567120" comment="samba-doc-3.6.3-0.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567121" comment="samba-krb-printing-3.6.3-0.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567122" comment="samba-winbind-3.6.3-0.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567123" comment="samba-winbind-32bit-3.6.3-0.56.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0241</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0241" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0241" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0241" ref_url="https://www.suse.com/security/cve/CVE-2015-0241" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001321.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0414-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0499-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00042.html" source="SUSE-SU"/>
    <description>
    The to_char function in PostgreSQL before 9.0.19, 9.1.x before 9.1.15, 9.2.x before 9.2.10, 9.3.x before 9.3.6, and 9.4.x before 9.4.1 allows remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a (1) large number of digits when processing a numeric formatting template, which triggers a buffer over-read, or (2) crafted timestamp formatting template, which triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0241/">CVE-2015-0241</cve>
	<bugzilla href="https://bugzilla.suse.com/916953">SUSE bug 916953</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567049" comment="libecpg6-9.1.15-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567050" comment="libpq5-9.1.15-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567051" comment="libpq5-32bit-9.1.15-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567052" comment="postgresql91-9.1.15-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567053" comment="postgresql91-docs-9.1.15-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0243</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0243" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0243" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0243" ref_url="https://www.suse.com/security/cve/CVE-2015-0243" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001321.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0414-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0499-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00042.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in contrib/pgcrypto in PostgreSQL before 9.0.19, 9.1.x before 9.1.15, 9.2.x before 9.2.10, 9.3.x before 9.3.6, and 9.4.x before 9.4.1 allow remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0243/">CVE-2015-0243</cve>
	<bugzilla href="https://bugzilla.suse.com/916953">SUSE bug 916953</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567049" comment="libecpg6-9.1.15-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567050" comment="libpq5-9.1.15-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567051" comment="libpq5-32bit-9.1.15-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567052" comment="postgresql91-9.1.15-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567053" comment="postgresql91-docs-9.1.15-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0244</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0244" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0244" ref_url="https://www.suse.com/security/cve/CVE-2015-0244" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001321.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0414-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0499-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00042.html" source="SUSE-SU"/>
    <description>
    PostgreSQL before 9.0.19, 9.1.x before 9.1.15, 9.2.x before 9.2.10, 9.3.x before 9.3.6, and 9.4.x before 9.4.1 does not properly handle errors while reading a protocol message, which allows remote attackers to conduct SQL injection attacks via crafted binary data in a parameter and causing an error, which triggers the loss of synchronization and part of the protocol message to be treated as a new message, as demonstrated by causing a timeout or query cancellation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0244/">CVE-2015-0244</cve>
	<bugzilla href="https://bugzilla.suse.com/916953">SUSE bug 916953</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567049" comment="libecpg6-9.1.15-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567050" comment="libpq5-9.1.15-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567051" comment="libpq5-32bit-9.1.15-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567052" comment="postgresql91-9.1.15-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567053" comment="postgresql91-docs-9.1.15-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0245</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0245" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0245" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0245" ref_url="https://www.suse.com/security/cve/CVE-2015-0245" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0300-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2736-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00017.html" source="SUSE-SU"/>
    <description>
    D-Bus 1.4.x through 1.6.x before 1.6.30, 1.8.x before 1.8.16, and 1.9.x before 1.9.10 does not validate the source of ActivationFailure signals, which allows local users to cause a denial of service (activation failure error returned) by leveraging a race condition involving sending an ActivationFailure signal before systemd responds.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0245/">CVE-2015-0245</cve>
	<bugzilla href="https://bugzilla.suse.com/1003898">SUSE bug 1003898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916343">SUSE bug 916343</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334246" comment="dbus-1 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0247</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0247" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0247" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0247" ref_url="https://www.suse.com/security/cve/CVE-2015-0247" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004281.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1006-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-06/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2133-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00050.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in openfs.c in the libext2fs library in e2fsprogs before 1.42.12 allows local users to execute arbitrary code via crafted block group descriptor data in a filesystem image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-0247/">CVE-2015-0247</cve>
	<bugzilla href="https://bugzilla.suse.com/1123790">SUSE bug 1123790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915402">SUSE bug 915402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918346">SUSE bug 918346</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566399" comment="e2fsprogs-1.41.9-2.10.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566400" comment="libblkid1-2.19.1-6.62.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009440332" comment="libblkid1-32bit-2.19.1-6.62.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566401" comment="libcom_err2-1.41.9-2.10.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566402" comment="libcom_err2-32bit-1.41.9-2.10.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566403" comment="libext2fs2-1.41.9-2.10.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566404" comment="libuuid-devel-2.19.1-6.62.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566405" comment="libuuid1-2.19.1-6.62.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009440334" comment="libuuid1-32bit-2.19.1-6.62.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566406" comment="uuid-runtime-2.19.1-6.62.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0255</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0255" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0255" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0255" ref_url="https://www.suse.com/security/cve/CVE-2015-0255" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001403.html" source="SUSE-SU"/>
		<reference ref_id="TID7016170" ref_url="https://www.suse.com/support/kb/doc/?id=7016170" source="SUSE-SU"/>
		<reference ref_id="TID7021676" ref_url="https://www.suse.com/support/kb/doc/?id=7021676" source="SUSE-SU"/>
		<reference ref_id="TID7021743" ref_url="https://www.suse.com/support/kb/doc/?id=7021743" source="SUSE-SU"/>
		<reference ref_id="TID7021744" ref_url="https://www.suse.com/support/kb/doc/?id=7021744" source="SUSE-SU"/>
		<reference ref_id="TID7021823" ref_url="https://www.suse.com/support/kb/doc/?id=7021823" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0337-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0338-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00086.html" source="SUSE-SU"/>
    <description>
    X.Org Server (aka xserver and xorg-server) before 1.16.3 and 1.17.x before 1.17.1 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (crash) via a crafted string length value in a XkbSetGeometry request.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0255/">CVE-2015-0255</cve>
	<bugzilla href="https://bugzilla.suse.com/915810">SUSE bug 915810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593820" comment="xorg-x11-Xvnc-7.4-27.103.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593821" comment="xorg-x11-server-7.4-27.103.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593822" comment="xorg-x11-server-extra-7.4-27.103.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0261</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0261" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0261" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0261" ref_url="https://www.suse.com/security/cve/CVE-2015-0261" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0616-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    Integer signedness error in the mobility_opt_print function in the IPv6 mobility printer in tcpdump before 4.7.2 allows remote attackers to cause a denial of service (out-of-bounds read and crash) or possibly execute arbitrary code via a negative length value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0261/">CVE-2015-0261</cve>
	<bugzilla href="https://bugzilla.suse.com/922220">SUSE bug 922220</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567151" comment="tcpdump-3.9.8-1.27.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0272</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0272" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0272" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0272" ref_url="https://www.suse.com/security/cve/CVE-2015-0272" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2194-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2292-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2339-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2350-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0354-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0585-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1842-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    GNOME NetworkManager allows remote attackers to cause a denial of service (IPv6 traffic disruption) via a crafted MTU value in an IPv6 Router Advertisement (RA) message, a different vulnerability than CVE-2015-8215.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0272/">CVE-2015-0272</cve>
	<bugzilla href="https://bugzilla.suse.com/944296">SUSE bug 944296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951638">SUSE bug 951638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955354">SUSE bug 955354</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566744" comment="kernel-bigsmp-devel-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566745" comment="kernel-default-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566746" comment="kernel-default-base-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566747" comment="kernel-default-devel-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566748" comment="kernel-default-extra-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566749" comment="kernel-pae-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566750" comment="kernel-pae-base-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566751" comment="kernel-pae-devel-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566752" comment="kernel-pae-extra-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566753" comment="kernel-source-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566754" comment="kernel-syms-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566755" comment="kernel-trace-devel-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566756" comment="kernel-xen-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566757" comment="kernel-xen-base-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566758" comment="kernel-xen-devel-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566759" comment="kernel-xen-extra-3.0.101-0.47.71.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567368" comment="kernel-default-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567369" comment="kernel-default-base-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567370" comment="kernel-default-devel-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567371" comment="kernel-default-extra-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567372" comment="kernel-pae-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567373" comment="kernel-pae-base-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567374" comment="kernel-pae-devel-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567375" comment="kernel-pae-extra-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567376" comment="kernel-source-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567377" comment="kernel-syms-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567378" comment="kernel-trace-devel-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567379" comment="kernel-xen-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567380" comment="kernel-xen-base-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567381" comment="kernel-xen-devel-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567382" comment="kernel-xen-extra-3.0.101-68.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0275</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0275" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0275" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0275" ref_url="https://www.suse.com/security/cve/CVE-2015-0275" source="SUSE CVE"/>
    <description>
    The ext4_zero_range function in fs/ext4/extents.c in the Linux kernel before 4.1 allows local users to cause a denial of service (BUG) via a crafted fallocate zero-range request.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-02-22"/>
	<updated date="2022-02-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0275/">CVE-2015-0275</cve>
	<bugzilla href="https://bugzilla.suse.com/919032">SUSE bug 919032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0282</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0282" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0282" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0282" ref_url="https://www.suse.com/security/cve/CVE-2015-0282" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001333.html" source="SUSE-SU"/>
    <description>
    GnuTLS before 3.1.0 does not verify that the RSA PKCS #1 signature algorithm matches the signature algorithm in the certificate, which allows remote attackers to conduct downgrade attacks via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0282/">CVE-2015-0282</cve>
	<bugzilla href="https://bugzilla.suse.com/919938">SUSE bug 919938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921684">SUSE bug 921684</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593474" comment="gnutls-2.4.1-24.39.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593475" comment="libgnutls26-2.4.1-24.39.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593476" comment="libgnutls26-32bit-2.4.1-24.39.55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0285</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0285" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0285" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0285" ref_url="https://www.suse.com/security/cve/CVE-2015-0285" source="SUSE CVE"/>
		<reference ref_id="TID7016336" ref_url="https://www.suse.com/support/kb/doc/?id=7016336" source="SUSE-SU"/>
    <description>
    The ssl3_client_hello function in s3_clnt.c in OpenSSL 1.0.2 before 1.0.2a does not ensure that the PRNG is seeded before proceeding with a handshake, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by sniffing the network and then conducting a brute-force attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0285/">CVE-2015-0285</cve>
	<bugzilla href="https://bugzilla.suse.com/921572">SUSE bug 921572</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0286</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0286" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0286" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0286" ref_url="https://www.suse.com/security/cve/CVE-2015-0286" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0546-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="TID7016336" ref_url="https://www.suse.com/support/kb/doc/?id=7016336" source="SUSE-SU"/>
		<reference ref_id="TID7021977" ref_url="https://www.suse.com/support/kb/doc/?id=7021977" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0554-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    The ASN1_TYPE_cmp function in crypto/asn1/a_type.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not properly perform boolean-type comparisons, which allows remote attackers to cause a denial of service (invalid read operation and application crash) via a crafted X.509 certificate to an endpoint that uses the certificate-verification feature.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0286/">CVE-2015-0286</cve>
	<bugzilla href="https://bugzilla.suse.com/919648">SUSE bug 919648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922496">SUSE bug 922496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936586">SUSE bug 936586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566978" comment="libmysql55client18-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566979" comment="libmysql55client18-32bit-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566980" comment="libmysql55client_r18-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566981" comment="libmysql55client_r18-32bit-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566982" comment="mysql-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566983" comment="mysql-client-5.5.46-0.14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593830" comment="compat-openssl097g-0.9.7g-146.22.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590589" comment="compat-openssl097g-32bit-0.9.7g-146.22.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566978" comment="libmysql55client18-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566979" comment="libmysql55client18-32bit-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566980" comment="libmysql55client_r18-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566981" comment="libmysql55client_r18-32bit-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009587402" comment="libopenssl0_9_8-0.9.8j-0.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009587403" comment="libopenssl0_9_8-32bit-0.9.8j-0.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566982" comment="mysql-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566983" comment="mysql-client-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009587404" comment="openssl-0.9.8j-0.70.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0287</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0287" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0287" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0287" ref_url="https://www.suse.com/security/cve/CVE-2015-0287" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0546-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="TID7016336" ref_url="https://www.suse.com/support/kb/doc/?id=7016336" source="SUSE-SU"/>
		<reference ref_id="TID7021977" ref_url="https://www.suse.com/support/kb/doc/?id=7021977" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0554-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    The ASN1_item_ex_d2i function in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not reinitialize CHOICE and ADB data structures, which might allow attackers to cause a denial of service (invalid write operation and memory corruption) by leveraging an application that relies on ASN.1 structure reuse.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-15"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0287/">CVE-2015-0287</cve>
	<bugzilla href="https://bugzilla.suse.com/919648">SUSE bug 919648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922499">SUSE bug 922499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936586">SUSE bug 936586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968888">SUSE bug 968888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991722">SUSE bug 991722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593831" comment="compat-openssl097g-0.9.7g-146.22.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593832" comment="compat-openssl097g-32bit-0.9.7g-146.22.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593833" comment="libopenssl0_9_8-0.9.8j-0.74.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593834" comment="libopenssl0_9_8-32bit-0.9.8j-0.74.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593835" comment="openssl-0.9.8j-0.74.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0288</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0288" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0288" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0288" ref_url="https://www.suse.com/security/cve/CVE-2015-0288" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0546-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="TID7016336" ref_url="https://www.suse.com/support/kb/doc/?id=7016336" source="SUSE-SU"/>
		<reference ref_id="TID7021977" ref_url="https://www.suse.com/support/kb/doc/?id=7021977" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0554-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    The X509_to_X509_REQ function in crypto/x509/x509_req.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow attackers to cause a denial of service (NULL pointer dereference and application crash) via an invalid certificate key.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0288/">CVE-2015-0288</cve>
	<bugzilla href="https://bugzilla.suse.com/919648">SUSE bug 919648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920236">SUSE bug 920236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936586">SUSE bug 936586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566978" comment="libmysql55client18-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566979" comment="libmysql55client18-32bit-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566980" comment="libmysql55client_r18-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566981" comment="libmysql55client_r18-32bit-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566982" comment="mysql-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566983" comment="mysql-client-5.5.46-0.14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593830" comment="compat-openssl097g-0.9.7g-146.22.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590589" comment="compat-openssl097g-32bit-0.9.7g-146.22.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566978" comment="libmysql55client18-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566979" comment="libmysql55client18-32bit-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566980" comment="libmysql55client_r18-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566981" comment="libmysql55client_r18-32bit-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009587402" comment="libopenssl0_9_8-0.9.8j-0.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009587403" comment="libopenssl0_9_8-32bit-0.9.8j-0.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566982" comment="mysql-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566983" comment="mysql-client-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009587404" comment="openssl-0.9.8j-0.70.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0289</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0289" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0289" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0289" ref_url="https://www.suse.com/security/cve/CVE-2015-0289" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0546-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0578-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7016336" ref_url="https://www.suse.com/support/kb/doc/?id=7016336" source="SUSE-SU"/>
		<reference ref_id="TID7021279" ref_url="https://www.suse.com/support/kb/doc/?id=7021279" source="SUSE-SU"/>
		<reference ref_id="TID7021518" ref_url="https://www.suse.com/support/kb/doc/?id=7021518" source="SUSE-SU"/>
		<reference ref_id="TID7021676" ref_url="https://www.suse.com/support/kb/doc/?id=7021676" source="SUSE-SU"/>
		<reference ref_id="TID7021714" ref_url="https://www.suse.com/support/kb/doc/?id=7021714" source="SUSE-SU"/>
		<reference ref_id="TID7021743" ref_url="https://www.suse.com/support/kb/doc/?id=7021743" source="SUSE-SU"/>
		<reference ref_id="TID7021744" ref_url="https://www.suse.com/support/kb/doc/?id=7021744" source="SUSE-SU"/>
		<reference ref_id="TID7021848" ref_url="https://www.suse.com/support/kb/doc/?id=7021848" source="SUSE-SU"/>
		<reference ref_id="TID7021863" ref_url="https://www.suse.com/support/kb/doc/?id=7021863" source="SUSE-SU"/>
		<reference ref_id="TID7021977" ref_url="https://www.suse.com/support/kb/doc/?id=7021977" source="SUSE-SU"/>
		<reference ref_id="TID7021993" ref_url="https://www.suse.com/support/kb/doc/?id=7021993" source="SUSE-SU"/>
		<reference ref_id="TID7021994" ref_url="https://www.suse.com/support/kb/doc/?id=7021994" source="SUSE-SU"/>
		<reference ref_id="TID7021995" ref_url="https://www.suse.com/support/kb/doc/?id=7021995" source="SUSE-SU"/>
		<reference ref_id="TID7022095" ref_url="https://www.suse.com/support/kb/doc/?id=7022095" source="SUSE-SU"/>
		<reference ref_id="TID7022096" ref_url="https://www.suse.com/support/kb/doc/?id=7022096" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0554-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    The PKCS#7 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not properly handle a lack of outer ContentInfo, which allows attackers to cause a denial of service (NULL pointer dereference and application crash) by leveraging an application that processes arbitrary PKCS#7 data and providing malformed data with ASN.1 encoding, related to crypto/pkcs7/pk7_doit.c and crypto/pkcs7/pk7_lib.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0289/">CVE-2015-0289</cve>
	<bugzilla href="https://bugzilla.suse.com/919648">SUSE bug 919648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922500">SUSE bug 922500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936586">SUSE bug 936586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593830" comment="compat-openssl097g-0.9.7g-146.22.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590589" comment="compat-openssl097g-32bit-0.9.7g-146.22.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009587402" comment="libopenssl0_9_8-0.9.8j-0.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009587403" comment="libopenssl0_9_8-32bit-0.9.8j-0.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009587404" comment="openssl-0.9.8j-0.70.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150290" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0290</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0290" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0290" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0290" ref_url="https://www.suse.com/security/cve/CVE-2015-0290" source="SUSE CVE"/>
		<reference ref_id="TID7016336" ref_url="https://www.suse.com/support/kb/doc/?id=7016336" source="SUSE-SU"/>
    <description>
    The multi-block feature in the ssl3_write_bytes function in s3_pkt.c in OpenSSL 1.0.2 before 1.0.2a on 64-bit x86 platforms with AES NI support does not properly handle certain non-blocking I/O cases, which allows remote attackers to cause a denial of service (pointer corruption and application crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0290/">CVE-2015-0290</cve>
	<bugzilla href="https://bugzilla.suse.com/922493">SUSE bug 922493</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0291</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0291" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0291" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0291" ref_url="https://www.suse.com/security/cve/CVE-2015-0291" source="SUSE CVE"/>
		<reference ref_id="TID7016336" ref_url="https://www.suse.com/support/kb/doc/?id=7016336" source="SUSE-SU"/>
    <description>
    The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0291/">CVE-2015-0291</cve>
	<bugzilla href="https://bugzilla.suse.com/922490">SUSE bug 922490</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0292</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0292" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0292" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0292" ref_url="https://www.suse.com/security/cve/CVE-2015-0292" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0546-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0578-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7016336" ref_url="https://www.suse.com/support/kb/doc/?id=7016336" source="SUSE-SU"/>
		<reference ref_id="TID7021279" ref_url="https://www.suse.com/support/kb/doc/?id=7021279" source="SUSE-SU"/>
		<reference ref_id="TID7021518" ref_url="https://www.suse.com/support/kb/doc/?id=7021518" source="SUSE-SU"/>
		<reference ref_id="TID7021676" ref_url="https://www.suse.com/support/kb/doc/?id=7021676" source="SUSE-SU"/>
		<reference ref_id="TID7021714" ref_url="https://www.suse.com/support/kb/doc/?id=7021714" source="SUSE-SU"/>
		<reference ref_id="TID7021743" ref_url="https://www.suse.com/support/kb/doc/?id=7021743" source="SUSE-SU"/>
		<reference ref_id="TID7021744" ref_url="https://www.suse.com/support/kb/doc/?id=7021744" source="SUSE-SU"/>
		<reference ref_id="TID7021848" ref_url="https://www.suse.com/support/kb/doc/?id=7021848" source="SUSE-SU"/>
		<reference ref_id="TID7021863" ref_url="https://www.suse.com/support/kb/doc/?id=7021863" source="SUSE-SU"/>
		<reference ref_id="TID7021977" ref_url="https://www.suse.com/support/kb/doc/?id=7021977" source="SUSE-SU"/>
		<reference ref_id="TID7021993" ref_url="https://www.suse.com/support/kb/doc/?id=7021993" source="SUSE-SU"/>
		<reference ref_id="TID7021994" ref_url="https://www.suse.com/support/kb/doc/?id=7021994" source="SUSE-SU"/>
		<reference ref_id="TID7021995" ref_url="https://www.suse.com/support/kb/doc/?id=7021995" source="SUSE-SU"/>
		<reference ref_id="TID7022095" ref_url="https://www.suse.com/support/kb/doc/?id=7022095" source="SUSE-SU"/>
		<reference ref_id="TID7022096" ref_url="https://www.suse.com/support/kb/doc/?id=7022096" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
    <description>
    Integer underflow in the EVP_DecodeUpdate function in crypto/evp/encode.c in the base64-decoding implementation in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted base64 data that triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0292/">CVE-2015-0292</cve>
	<bugzilla href="https://bugzilla.suse.com/919648">SUSE bug 919648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922501">SUSE bug 922501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936586">SUSE bug 936586</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593830" comment="compat-openssl097g-0.9.7g-146.22.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590589" comment="compat-openssl097g-32bit-0.9.7g-146.22.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009587402" comment="libopenssl0_9_8-0.9.8j-0.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009587403" comment="libopenssl0_9_8-32bit-0.9.8j-0.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009587404" comment="openssl-0.9.8j-0.70.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150293" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0293</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0293" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0293" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0293" ref_url="https://www.suse.com/security/cve/CVE-2015-0293" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0546-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0578-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0617-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0624-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0631-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0641-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1057-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7016336" ref_url="https://www.suse.com/support/kb/doc/?id=7016336" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0554-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0628-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0637-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0638-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0720-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00025.html" source="SUSE-SU"/>
    <description>
    The SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (s2_lib.c assertion failure and daemon exit) via a crafted CLIENT-MASTER-KEY message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0293/">CVE-2015-0293</cve>
	<bugzilla href="https://bugzilla.suse.com/919648">SUSE bug 919648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922488">SUSE bug 922488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936586">SUSE bug 936586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968044">SUSE bug 968044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968051">SUSE bug 968051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968053">SUSE bug 968053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986238">SUSE bug 986238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593830" comment="compat-openssl097g-0.9.7g-146.22.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590589" comment="compat-openssl097g-32bit-0.9.7g-146.22.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009587402" comment="libopenssl0_9_8-0.9.8j-0.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009587403" comment="libopenssl0_9_8-32bit-0.9.8j-0.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009587404" comment="openssl-0.9.8j-0.70.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150294" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0294</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0294" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0294" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0294" ref_url="https://www.suse.com/security/cve/CVE-2015-0294" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001351.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0622-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00086.html" source="SUSE-SU"/>
    <description>
    GnuTLS before 3.3.13 does not validate that the signature algorithms match when importing a certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0294/">CVE-2015-0294</cve>
	<bugzilla href="https://bugzilla.suse.com/919938">SUSE bug 919938</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593474" comment="gnutls-2.4.1-24.39.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593475" comment="libgnutls26-2.4.1-24.39.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593476" comment="libgnutls26-32bit-2.4.1-24.39.55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0295</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0295" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0295" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0295" ref_url="https://www.suse.com/security/cve/CVE-2015-0295" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001540.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0573-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00068.html" source="SUSE-SU"/>
    <description>
    The BMP decoder in QtGui in QT before 5.5 does not properly calculate the masks used to extract the color components, which allows remote attackers to cause a denial of service (divide-by-zero and crash) via a crafted BMP file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0295/">CVE-2015-0295</cve>
	<bugzilla href="https://bugzilla.suse.com/921999">SUSE bug 921999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927806">SUSE bug 927806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927807">SUSE bug 927807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927808">SUSE bug 927808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936523">SUSE bug 936523</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566891" comment="libQtWebKit4-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566892" comment="libQtWebKit4-32bit-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566893" comment="libqt4-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566894" comment="libqt4-32bit-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566895" comment="libqt4-qt3support-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566896" comment="libqt4-qt3support-32bit-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566897" comment="libqt4-sql-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566898" comment="libqt4-sql-32bit-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566899" comment="libqt4-sql-mysql-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566900" comment="libqt4-sql-mysql-32bit-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566901" comment="libqt4-sql-postgresql-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566902" comment="libqt4-sql-postgresql-32bit-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566903" comment="libqt4-sql-sqlite-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566904" comment="libqt4-sql-sqlite-32bit-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566905" comment="libqt4-sql-unixODBC-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566906" comment="libqt4-sql-unixODBC-32bit-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566907" comment="libqt4-x11-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566908" comment="libqt4-x11-32bit-4.6.3-5.34.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0296</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0296" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0296" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0296" ref_url="https://www.suse.com/security/cve/CVE-2015-0296" source="SUSE CVE"/>
    <description>
    The pre-install script in texlive 3.1.20140525_r34255.fc21 as packaged in Fedora 21 and rpm, and texlive 6.20131226_r32488.fc20 and rpm allows local users to delete arbitrary files via a crafted file in the user's home directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0296/">CVE-2015-0296</cve>
	<bugzilla href="https://bugzilla.suse.com/920172">SUSE bug 920172</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334271" comment="texlive is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0301</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0301" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0301" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0301" ref_url="https://www.suse.com/security/cve/CVE-2015-0301" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0052-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0062-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0059-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00034.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK &amp; Compiler before 16.0.0.272 do not properly validate files, which has unspecified impact and attack vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0301/">CVE-2015-0301</cve>
	<bugzilla href="https://bugzilla.suse.com/913057">SUSE bug 913057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334247" comment="flash-player is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593860" comment="flash-player-11.2.202.429-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593861" comment="flash-player-gnome-11.2.202.429-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593862" comment="flash-player-kde4-11.2.202.429-0.4.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0302</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0302" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0302" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0302" ref_url="https://www.suse.com/security/cve/CVE-2015-0302" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0052-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0062-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0059-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00034.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK &amp; Compiler before 16.0.0.272 allow attackers to obtain sensitive keystroke information via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0302/">CVE-2015-0302</cve>
	<bugzilla href="https://bugzilla.suse.com/913057">SUSE bug 913057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334247" comment="flash-player is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593860" comment="flash-player-11.2.202.429-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593861" comment="flash-player-gnome-11.2.202.429-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593862" comment="flash-player-kde4-11.2.202.429-0.4.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150303" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0303</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0303" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0303" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0303" ref_url="https://www.suse.com/security/cve/CVE-2015-0303" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0052-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0062-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0059-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00034.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK &amp; Compiler before 16.0.0.272 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0306.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0303/">CVE-2015-0303</cve>
	<bugzilla href="https://bugzilla.suse.com/913057">SUSE bug 913057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593860" comment="flash-player-11.2.202.429-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593861" comment="flash-player-gnome-11.2.202.429-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593862" comment="flash-player-kde4-11.2.202.429-0.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0304</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0304" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0304" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0304" ref_url="https://www.suse.com/security/cve/CVE-2015-0304" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0052-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0062-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0059-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00034.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK &amp; Compiler before 16.0.0.272 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0309.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0304/">CVE-2015-0304</cve>
	<bugzilla href="https://bugzilla.suse.com/913057">SUSE bug 913057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593860" comment="flash-player-11.2.202.429-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593861" comment="flash-player-gnome-11.2.202.429-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593862" comment="flash-player-kde4-11.2.202.429-0.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0305</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0305" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0305" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0305" ref_url="https://www.suse.com/security/cve/CVE-2015-0305" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0052-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0062-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0059-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00034.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK &amp; Compiler before 16.0.0.272 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0305/">CVE-2015-0305</cve>
	<bugzilla href="https://bugzilla.suse.com/913057">SUSE bug 913057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593860" comment="flash-player-11.2.202.429-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593861" comment="flash-player-gnome-11.2.202.429-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593862" comment="flash-player-kde4-11.2.202.429-0.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150306" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0306</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0306" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0306" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0306" ref_url="https://www.suse.com/security/cve/CVE-2015-0306" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0052-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0062-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0059-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00034.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK &amp; Compiler before 16.0.0.272 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0303.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0306/">CVE-2015-0306</cve>
	<bugzilla href="https://bugzilla.suse.com/913057">SUSE bug 913057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593860" comment="flash-player-11.2.202.429-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593861" comment="flash-player-gnome-11.2.202.429-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593862" comment="flash-player-kde4-11.2.202.429-0.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150307" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0307</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0307" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0307" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0307" ref_url="https://www.suse.com/security/cve/CVE-2015-0307" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0052-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0062-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0059-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00034.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK &amp; Compiler before 16.0.0.272 allow remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0307/">CVE-2015-0307</cve>
	<bugzilla href="https://bugzilla.suse.com/913057">SUSE bug 913057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334247" comment="flash-player is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593860" comment="flash-player-11.2.202.429-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593861" comment="flash-player-gnome-11.2.202.429-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593862" comment="flash-player-kde4-11.2.202.429-0.4.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150308" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0308</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0308" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0308" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0308" ref_url="https://www.suse.com/security/cve/CVE-2015-0308" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0052-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0062-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0059-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00034.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK &amp; Compiler before 16.0.0.272 allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0308/">CVE-2015-0308</cve>
	<bugzilla href="https://bugzilla.suse.com/913057">SUSE bug 913057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593860" comment="flash-player-11.2.202.429-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593861" comment="flash-player-gnome-11.2.202.429-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593862" comment="flash-player-kde4-11.2.202.429-0.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150309" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0309</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0309" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0309" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0309" ref_url="https://www.suse.com/security/cve/CVE-2015-0309" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0052-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0062-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0059-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00034.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK &amp; Compiler before 16.0.0.272 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0304.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0309/">CVE-2015-0309</cve>
	<bugzilla href="https://bugzilla.suse.com/913057">SUSE bug 913057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593860" comment="flash-player-11.2.202.429-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593861" comment="flash-player-gnome-11.2.202.429-0.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593862" comment="flash-player-kde4-11.2.202.429-0.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0310</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0310" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0310" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0310" ref_url="https://www.suse.com/security/cve/CVE-2015-0310" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0129-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0135-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0110-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00034.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.262 and 14.x through 16.x before 16.0.0.287 on Windows and OS X and before 11.2.202.438 on Linux does not properly restrict discovery of memory addresses, which allows attackers to bypass the ASLR protection mechanism on Windows, and have an unspecified impact on other platforms, via unknown vectors, as exploited in the wild in January 2015.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0310/">CVE-2015-0310</cve>
	<bugzilla href="https://bugzilla.suse.com/914333">SUSE bug 914333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593863" comment="flash-player-11.2.202.438-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593864" comment="flash-player-gnome-11.2.202.438-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593865" comment="flash-player-kde4-11.2.202.438-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0311</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0311" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0311" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0311" ref_url="https://www.suse.com/security/cve/CVE-2015-0311" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0151-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0163-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0150-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00034.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player through 13.0.0.262 and 14.x, 15.x, and 16.x through 16.0.0.287 on Windows and OS X and through 11.2.202.438 on Linux allows remote attackers to execute arbitrary code via unknown vectors, as exploited in the wild in January 2015.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0311/">CVE-2015-0311</cve>
	<bugzilla href="https://bugzilla.suse.com/914463">SUSE bug 914463</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334247" comment="flash-player is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593866" comment="flash-player-11.2.202.440-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593867" comment="flash-player-gnome-11.2.202.440-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593868" comment="flash-player-kde4-11.2.202.440-0.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0312</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0312" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0312" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0312" ref_url="https://www.suse.com/security/cve/CVE-2015-0312" source="SUSE CVE"/>
    <description>
    Double free vulnerability in Adobe Flash Player before 13.0.0.264 and 14.x through 16.x before 16.0.0.296 on Windows and OS X and before 11.2.202.440 on Linux allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0312/">CVE-2015-0312</cve>
	<bugzilla href="https://bugzilla.suse.com/914463">SUSE bug 914463</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334247" comment="flash-player is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0313</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0313" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0313" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0313" ref_url="https://www.suse.com/security/cve/CVE-2015-0313" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00007.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows remote attackers to execute arbitrary code via unspecified vectors, as exploited in the wild in February 2015, a different vulnerability than CVE-2015-0315, CVE-2015-0320, and CVE-2015-0322.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0313/">CVE-2015-0313</cve>
	<bugzilla href="https://bugzilla.suse.com/915918">SUSE bug 915918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916374">SUSE bug 916374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922033">SUSE bug 922033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593869" comment="flash-player-11.2.202.442-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593870" comment="flash-player-gnome-11.2.202.442-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593871" comment="flash-player-kde4-11.2.202.442-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150314" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0314</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0314" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0314" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0314" ref_url="https://www.suse.com/security/cve/CVE-2015-0314" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00007.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0316, CVE-2015-0318, CVE-2015-0321, CVE-2015-0329, and CVE-2015-0330.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0314/">CVE-2015-0314</cve>
	<bugzilla href="https://bugzilla.suse.com/915918">SUSE bug 915918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922033">SUSE bug 922033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593869" comment="flash-player-11.2.202.442-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593870" comment="flash-player-gnome-11.2.202.442-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593871" comment="flash-player-kde4-11.2.202.442-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150315" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0315</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0315" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0315" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0315" ref_url="https://www.suse.com/security/cve/CVE-2015-0315" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00007.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0313, CVE-2015-0320, and CVE-2015-0322.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0315/">CVE-2015-0315</cve>
	<bugzilla href="https://bugzilla.suse.com/915918">SUSE bug 915918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922033">SUSE bug 922033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593869" comment="flash-player-11.2.202.442-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593870" comment="flash-player-gnome-11.2.202.442-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593871" comment="flash-player-kde4-11.2.202.442-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150316" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0316</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0316" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0316" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0316" ref_url="https://www.suse.com/security/cve/CVE-2015-0316" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00007.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0314, CVE-2015-0318, CVE-2015-0321, CVE-2015-0329, and CVE-2015-0330.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0316/">CVE-2015-0316</cve>
	<bugzilla href="https://bugzilla.suse.com/915918">SUSE bug 915918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922033">SUSE bug 922033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593869" comment="flash-player-11.2.202.442-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593870" comment="flash-player-gnome-11.2.202.442-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593871" comment="flash-player-kde4-11.2.202.442-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0317</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0317" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0317" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0317" ref_url="https://www.suse.com/security/cve/CVE-2015-0317" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00007.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2015-0319.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0317/">CVE-2015-0317</cve>
	<bugzilla href="https://bugzilla.suse.com/915918">SUSE bug 915918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922033">SUSE bug 922033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593869" comment="flash-player-11.2.202.442-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593870" comment="flash-player-gnome-11.2.202.442-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593871" comment="flash-player-kde4-11.2.202.442-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0318</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0318" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0318" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0318" ref_url="https://www.suse.com/security/cve/CVE-2015-0318" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00007.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0314, CVE-2015-0316, CVE-2015-0321, CVE-2015-0329, and CVE-2015-0330.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0318/">CVE-2015-0318</cve>
	<bugzilla href="https://bugzilla.suse.com/915918">SUSE bug 915918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922033">SUSE bug 922033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593869" comment="flash-player-11.2.202.442-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593870" comment="flash-player-gnome-11.2.202.442-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593871" comment="flash-player-kde4-11.2.202.442-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150319" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0319</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0319" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0319" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0319" ref_url="https://www.suse.com/security/cve/CVE-2015-0319" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00007.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2015-0317.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0319/">CVE-2015-0319</cve>
	<bugzilla href="https://bugzilla.suse.com/915918">SUSE bug 915918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922033">SUSE bug 922033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593869" comment="flash-player-11.2.202.442-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593870" comment="flash-player-gnome-11.2.202.442-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593871" comment="flash-player-kde4-11.2.202.442-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150320" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0320</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0320" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0320" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0320" ref_url="https://www.suse.com/security/cve/CVE-2015-0320" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00007.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0313, CVE-2015-0315, and CVE-2015-0322.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0320/">CVE-2015-0320</cve>
	<bugzilla href="https://bugzilla.suse.com/915918">SUSE bug 915918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922033">SUSE bug 922033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593869" comment="flash-player-11.2.202.442-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593870" comment="flash-player-gnome-11.2.202.442-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593871" comment="flash-player-kde4-11.2.202.442-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150321" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0321</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0321" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0321" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0321" ref_url="https://www.suse.com/security/cve/CVE-2015-0321" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00007.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0314, CVE-2015-0316, CVE-2015-0318, CVE-2015-0329, and CVE-2015-0330.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0321/">CVE-2015-0321</cve>
	<bugzilla href="https://bugzilla.suse.com/915918">SUSE bug 915918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922033">SUSE bug 922033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593869" comment="flash-player-11.2.202.442-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593870" comment="flash-player-gnome-11.2.202.442-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593871" comment="flash-player-kde4-11.2.202.442-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0322</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0322" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0322" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0322" ref_url="https://www.suse.com/security/cve/CVE-2015-0322" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00007.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0313, CVE-2015-0315, and CVE-2015-0320.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0322/">CVE-2015-0322</cve>
	<bugzilla href="https://bugzilla.suse.com/915918">SUSE bug 915918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922033">SUSE bug 922033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593869" comment="flash-player-11.2.202.442-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593870" comment="flash-player-gnome-11.2.202.442-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593871" comment="flash-player-kde4-11.2.202.442-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150323" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0323</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0323" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0323" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0323" ref_url="https://www.suse.com/security/cve/CVE-2015-0323" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00007.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0327.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0323/">CVE-2015-0323</cve>
	<bugzilla href="https://bugzilla.suse.com/915918">SUSE bug 915918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922033">SUSE bug 922033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593869" comment="flash-player-11.2.202.442-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593870" comment="flash-player-gnome-11.2.202.442-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593871" comment="flash-player-kde4-11.2.202.442-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150324" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0324</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0324" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0324" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0324" ref_url="https://www.suse.com/security/cve/CVE-2015-0324" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00007.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0324/">CVE-2015-0324</cve>
	<bugzilla href="https://bugzilla.suse.com/915918">SUSE bug 915918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922033">SUSE bug 922033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593869" comment="flash-player-11.2.202.442-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593870" comment="flash-player-gnome-11.2.202.442-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593871" comment="flash-player-kde4-11.2.202.442-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150325" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0325</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0325" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0325" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0325" ref_url="https://www.suse.com/security/cve/CVE-2015-0325" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00007.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via unknown vectors, a different vulnerability than CVE-2015-0326 and CVE-2015-0328.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0325/">CVE-2015-0325</cve>
	<bugzilla href="https://bugzilla.suse.com/915918">SUSE bug 915918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922033">SUSE bug 922033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593869" comment="flash-player-11.2.202.442-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593870" comment="flash-player-gnome-11.2.202.442-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593871" comment="flash-player-kde4-11.2.202.442-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150326" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0326</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0326" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0326" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0326" ref_url="https://www.suse.com/security/cve/CVE-2015-0326" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00007.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via unknown vectors, a different vulnerability than CVE-2015-0325 and CVE-2015-0328.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0326/">CVE-2015-0326</cve>
	<bugzilla href="https://bugzilla.suse.com/915918">SUSE bug 915918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922033">SUSE bug 922033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593869" comment="flash-player-11.2.202.442-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593870" comment="flash-player-gnome-11.2.202.442-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593871" comment="flash-player-kde4-11.2.202.442-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0327</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0327" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0327" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0327" ref_url="https://www.suse.com/security/cve/CVE-2015-0327" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00007.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0323.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0327/">CVE-2015-0327</cve>
	<bugzilla href="https://bugzilla.suse.com/915918">SUSE bug 915918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922033">SUSE bug 922033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593869" comment="flash-player-11.2.202.442-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593870" comment="flash-player-gnome-11.2.202.442-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593871" comment="flash-player-kde4-11.2.202.442-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150328" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0328</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0328" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0328" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0328" ref_url="https://www.suse.com/security/cve/CVE-2015-0328" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00007.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via unknown vectors, a different vulnerability than CVE-2015-0325 and CVE-2015-0326.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0328/">CVE-2015-0328</cve>
	<bugzilla href="https://bugzilla.suse.com/915918">SUSE bug 915918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922033">SUSE bug 922033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593869" comment="flash-player-11.2.202.442-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593870" comment="flash-player-gnome-11.2.202.442-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593871" comment="flash-player-kde4-11.2.202.442-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150329" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0329</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0329" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0329" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0329" ref_url="https://www.suse.com/security/cve/CVE-2015-0329" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00007.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0314, CVE-2015-0316, CVE-2015-0318, CVE-2015-0321, and CVE-2015-0330.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0329/">CVE-2015-0329</cve>
	<bugzilla href="https://bugzilla.suse.com/915918">SUSE bug 915918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922033">SUSE bug 922033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593869" comment="flash-player-11.2.202.442-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593870" comment="flash-player-gnome-11.2.202.442-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593871" comment="flash-player-kde4-11.2.202.442-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150330" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0330</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0330" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0330" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0330" ref_url="https://www.suse.com/security/cve/CVE-2015-0330" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00007.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0314, CVE-2015-0316, CVE-2015-0318, CVE-2015-0321, and CVE-2015-0329.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0330/">CVE-2015-0330</cve>
	<bugzilla href="https://bugzilla.suse.com/915918">SUSE bug 915918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922033">SUSE bug 922033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593869" comment="flash-player-11.2.202.442-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593870" comment="flash-player-gnome-11.2.202.442-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593871" comment="flash-player-kde4-11.2.202.442-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150332" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0332</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0332" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0332" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0332" ref_url="https://www.suse.com/security/cve/CVE-2015-0332" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0491-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0493-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0496-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.277 and 14.x through 17.x before 17.0.0.134 on Windows and OS X and before 11.2.202.451 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0333, CVE-2015-0335, and CVE-2015-0339.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0332/">CVE-2015-0332</cve>
	<bugzilla href="https://bugzilla.suse.com/922033">SUSE bug 922033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922296">SUSE bug 922296</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593872" comment="flash-player-11.2.202.451-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593873" comment="flash-player-gnome-11.2.202.451-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593874" comment="flash-player-kde4-11.2.202.451-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150333" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0333</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0333" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0333" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0333" ref_url="https://www.suse.com/security/cve/CVE-2015-0333" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0491-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0493-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0496-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00017.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.277 and 14.x through 17.x before 17.0.0.134 on Windows and OS X and before 11.2.202.451 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0332, CVE-2015-0335, and CVE-2015-0339.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0333/">CVE-2015-0333</cve>
	<bugzilla href="https://bugzilla.suse.com/922033">SUSE bug 922033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593872" comment="flash-player-11.2.202.451-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593873" comment="flash-player-gnome-11.2.202.451-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593874" comment="flash-player-kde4-11.2.202.451-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150334" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0334</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0334" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0334" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0334" ref_url="https://www.suse.com/security/cve/CVE-2015-0334" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0491-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0493-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0496-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00017.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.277 and 14.x through 17.x before 17.0.0.134 on Windows and OS X and before 11.2.202.451 on Linux allows attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2015-0336.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0334/">CVE-2015-0334</cve>
	<bugzilla href="https://bugzilla.suse.com/922033">SUSE bug 922033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593872" comment="flash-player-11.2.202.451-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593873" comment="flash-player-gnome-11.2.202.451-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593874" comment="flash-player-kde4-11.2.202.451-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150335" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0335</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0335" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0335" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0335" ref_url="https://www.suse.com/security/cve/CVE-2015-0335" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0491-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0493-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0496-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00017.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.277 and 14.x through 17.x before 17.0.0.134 on Windows and OS X and before 11.2.202.451 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0332, CVE-2015-0333, and CVE-2015-0339.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0335/">CVE-2015-0335</cve>
	<bugzilla href="https://bugzilla.suse.com/922033">SUSE bug 922033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593872" comment="flash-player-11.2.202.451-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593873" comment="flash-player-gnome-11.2.202.451-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593874" comment="flash-player-kde4-11.2.202.451-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150336" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0336</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0336" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0336" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0336" ref_url="https://www.suse.com/security/cve/CVE-2015-0336" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0491-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0493-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0496-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00017.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.277 and 14.x through 17.x before 17.0.0.134 on Windows and OS X and before 11.2.202.451 on Linux allows attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2015-0334.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0336/">CVE-2015-0336</cve>
	<bugzilla href="https://bugzilla.suse.com/922033">SUSE bug 922033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593872" comment="flash-player-11.2.202.451-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593873" comment="flash-player-gnome-11.2.202.451-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593874" comment="flash-player-kde4-11.2.202.451-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0337</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0337" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0337" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0337" ref_url="https://www.suse.com/security/cve/CVE-2015-0337" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0491-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0493-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0496-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00017.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.277 and 14.x through 17.x before 17.0.0.134 on Windows and OS X and before 11.2.202.451 on Linux allows remote attackers to bypass the Same Origin Policy via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0337/">CVE-2015-0337</cve>
	<bugzilla href="https://bugzilla.suse.com/922033">SUSE bug 922033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593872" comment="flash-player-11.2.202.451-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593873" comment="flash-player-gnome-11.2.202.451-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593874" comment="flash-player-kde4-11.2.202.451-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150338" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0338</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0338" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0338" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0338" ref_url="https://www.suse.com/security/cve/CVE-2015-0338" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0491-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0493-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0496-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00017.html" source="SUSE-SU"/>
    <description>
    Integer overflow in Adobe Flash Player before 13.0.0.277 and 14.x through 17.x before 17.0.0.134 on Windows and OS X and before 11.2.202.451 on Linux allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0338/">CVE-2015-0338</cve>
	<bugzilla href="https://bugzilla.suse.com/922033">SUSE bug 922033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593872" comment="flash-player-11.2.202.451-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593873" comment="flash-player-gnome-11.2.202.451-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593874" comment="flash-player-kde4-11.2.202.451-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0339</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0339" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0339" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0339" ref_url="https://www.suse.com/security/cve/CVE-2015-0339" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0491-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0493-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0496-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00017.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.277 and 14.x through 17.x before 17.0.0.134 on Windows and OS X and before 11.2.202.451 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0332, CVE-2015-0333, and CVE-2015-0335.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0339/">CVE-2015-0339</cve>
	<bugzilla href="https://bugzilla.suse.com/922033">SUSE bug 922033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593872" comment="flash-player-11.2.202.451-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593873" comment="flash-player-gnome-11.2.202.451-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593874" comment="flash-player-kde4-11.2.202.451-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0340</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0340" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0340" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0340" ref_url="https://www.suse.com/security/cve/CVE-2015-0340" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0491-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0493-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0496-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00017.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.277 and 14.x through 17.x before 17.0.0.134 on Windows and OS X and before 11.2.202.451 on Linux allows remote attackers to bypass intended file-upload restrictions via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0340/">CVE-2015-0340</cve>
	<bugzilla href="https://bugzilla.suse.com/922033">SUSE bug 922033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593872" comment="flash-player-11.2.202.451-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593873" comment="flash-player-gnome-11.2.202.451-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593874" comment="flash-player-kde4-11.2.202.451-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0341</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0341" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0341" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0341" ref_url="https://www.suse.com/security/cve/CVE-2015-0341" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0491-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0493-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0496-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00017.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.277 and 14.x through 17.x before 17.0.0.134 on Windows and OS X and before 11.2.202.451 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0342.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0341/">CVE-2015-0341</cve>
	<bugzilla href="https://bugzilla.suse.com/922033">SUSE bug 922033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593872" comment="flash-player-11.2.202.451-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593873" comment="flash-player-gnome-11.2.202.451-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593874" comment="flash-player-kde4-11.2.202.451-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0342</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0342" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0342" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0342" ref_url="https://www.suse.com/security/cve/CVE-2015-0342" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0491-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0493-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0496-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00017.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.277 and 14.x through 17.x before 17.0.0.134 on Windows and OS X and before 11.2.202.451 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0341.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0342/">CVE-2015-0342</cve>
	<bugzilla href="https://bugzilla.suse.com/922033">SUSE bug 922033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593872" comment="flash-player-11.2.202.451-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593873" comment="flash-player-gnome-11.2.202.451-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593874" comment="flash-player-kde4-11.2.202.451-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150346" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0346</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0346" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0346" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0346" ref_url="https://www.suse.com/security/cve/CVE-2015-0346" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0722-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0723-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0359.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0346/">CVE-2015-0346</cve>
	<bugzilla href="https://bugzilla.suse.com/927089">SUSE bug 927089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593875" comment="flash-player-11.2.202.457-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593876" comment="flash-player-gnome-11.2.202.457-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593877" comment="flash-player-kde4-11.2.202.457-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150347" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0347</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0347" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0347" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0347" ref_url="https://www.suse.com/security/cve/CVE-2015-0347" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0722-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0723-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0350, CVE-2015-0352, CVE-2015-0353, CVE-2015-0354, CVE-2015-0355, CVE-2015-0360, CVE-2015-3038, CVE-2015-3041, CVE-2015-3042, and CVE-2015-3043.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0347/">CVE-2015-0347</cve>
	<bugzilla href="https://bugzilla.suse.com/927089">SUSE bug 927089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593875" comment="flash-player-11.2.202.457-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593876" comment="flash-player-gnome-11.2.202.457-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593877" comment="flash-player-kde4-11.2.202.457-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0348</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0348" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0348" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0348" ref_url="https://www.suse.com/security/cve/CVE-2015-0348" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0722-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0723-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0348/">CVE-2015-0348</cve>
	<bugzilla href="https://bugzilla.suse.com/927089">SUSE bug 927089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593875" comment="flash-player-11.2.202.457-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593876" comment="flash-player-gnome-11.2.202.457-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593877" comment="flash-player-kde4-11.2.202.457-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0349</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0349" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0349" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0349" ref_url="https://www.suse.com/security/cve/CVE-2015-0349" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0722-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0723-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0351, CVE-2015-0358, and CVE-2015-3039.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0349/">CVE-2015-0349</cve>
	<bugzilla href="https://bugzilla.suse.com/927089">SUSE bug 927089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593875" comment="flash-player-11.2.202.457-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593876" comment="flash-player-gnome-11.2.202.457-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593877" comment="flash-player-kde4-11.2.202.457-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150350" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0350</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0350" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0350" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0350" ref_url="https://www.suse.com/security/cve/CVE-2015-0350" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0722-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0723-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0347, CVE-2015-0352, CVE-2015-0353, CVE-2015-0354, CVE-2015-0355, CVE-2015-0360, CVE-2015-3038, CVE-2015-3041, CVE-2015-3042, and CVE-2015-3043.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0350/">CVE-2015-0350</cve>
	<bugzilla href="https://bugzilla.suse.com/927089">SUSE bug 927089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593875" comment="flash-player-11.2.202.457-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593876" comment="flash-player-gnome-11.2.202.457-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593877" comment="flash-player-kde4-11.2.202.457-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0351</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0351" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0351" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0351" ref_url="https://www.suse.com/security/cve/CVE-2015-0351" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0722-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0723-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0349, CVE-2015-0358, and CVE-2015-3039.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0351/">CVE-2015-0351</cve>
	<bugzilla href="https://bugzilla.suse.com/927089">SUSE bug 927089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593875" comment="flash-player-11.2.202.457-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593876" comment="flash-player-gnome-11.2.202.457-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593877" comment="flash-player-kde4-11.2.202.457-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0352</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0352" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0352" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0352" ref_url="https://www.suse.com/security/cve/CVE-2015-0352" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0722-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0723-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0347, CVE-2015-0350, CVE-2015-0353, CVE-2015-0354, CVE-2015-0355, CVE-2015-0360, CVE-2015-3038, CVE-2015-3041, CVE-2015-3042, and CVE-2015-3043.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0352/">CVE-2015-0352</cve>
	<bugzilla href="https://bugzilla.suse.com/927089">SUSE bug 927089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593875" comment="flash-player-11.2.202.457-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593876" comment="flash-player-gnome-11.2.202.457-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593877" comment="flash-player-kde4-11.2.202.457-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0353</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0353" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0353" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0353" ref_url="https://www.suse.com/security/cve/CVE-2015-0353" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0722-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0723-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0347, CVE-2015-0350, CVE-2015-0352, CVE-2015-0354, CVE-2015-0355, CVE-2015-0360, CVE-2015-3038, CVE-2015-3041, CVE-2015-3042, and CVE-2015-3043.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0353/">CVE-2015-0353</cve>
	<bugzilla href="https://bugzilla.suse.com/927089">SUSE bug 927089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593875" comment="flash-player-11.2.202.457-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593876" comment="flash-player-gnome-11.2.202.457-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593877" comment="flash-player-kde4-11.2.202.457-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0354</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0354" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0354" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0354" ref_url="https://www.suse.com/security/cve/CVE-2015-0354" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0722-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0723-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0347, CVE-2015-0350, CVE-2015-0352, CVE-2015-0353, CVE-2015-0355, CVE-2015-0360, CVE-2015-3038, CVE-2015-3041, CVE-2015-3042, and CVE-2015-3043.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0354/">CVE-2015-0354</cve>
	<bugzilla href="https://bugzilla.suse.com/927089">SUSE bug 927089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593875" comment="flash-player-11.2.202.457-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593876" comment="flash-player-gnome-11.2.202.457-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593877" comment="flash-player-kde4-11.2.202.457-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0355</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0355" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0355" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0355" ref_url="https://www.suse.com/security/cve/CVE-2015-0355" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0722-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0723-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0347, CVE-2015-0350, CVE-2015-0352, CVE-2015-0353, CVE-2015-0354, CVE-2015-0360, CVE-2015-3038, CVE-2015-3041, CVE-2015-3042, and CVE-2015-3043.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0355/">CVE-2015-0355</cve>
	<bugzilla href="https://bugzilla.suse.com/927089">SUSE bug 927089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593875" comment="flash-player-11.2.202.457-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593876" comment="flash-player-gnome-11.2.202.457-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593877" comment="flash-player-kde4-11.2.202.457-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0356</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0356" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0356" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0356" ref_url="https://www.suse.com/security/cve/CVE-2015-0356" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0722-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0723-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code by leveraging an unspecified "type confusion."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0356/">CVE-2015-0356</cve>
	<bugzilla href="https://bugzilla.suse.com/927089">SUSE bug 927089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593875" comment="flash-player-11.2.202.457-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593876" comment="flash-player-gnome-11.2.202.457-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593877" comment="flash-player-kde4-11.2.202.457-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150357" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0357</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0357" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0357" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0357" ref_url="https://www.suse.com/security/cve/CVE-2015-0357" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0722-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0723-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux does not properly restrict discovery of memory addresses, which allows attackers to bypass the ASLR protection mechanism via unspecified vectors, a different vulnerability than CVE-2015-3040.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0357/">CVE-2015-0357</cve>
	<bugzilla href="https://bugzilla.suse.com/927089">SUSE bug 927089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593875" comment="flash-player-11.2.202.457-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593876" comment="flash-player-gnome-11.2.202.457-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593877" comment="flash-player-kde4-11.2.202.457-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150358" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0358</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0358" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0358" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0358" ref_url="https://www.suse.com/security/cve/CVE-2015-0358" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0722-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0723-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0349, CVE-2015-0351, and CVE-2015-3039.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0358/">CVE-2015-0358</cve>
	<bugzilla href="https://bugzilla.suse.com/927089">SUSE bug 927089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593875" comment="flash-player-11.2.202.457-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593876" comment="flash-player-gnome-11.2.202.457-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593877" comment="flash-player-kde4-11.2.202.457-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150359" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0359</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0359" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0359" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0359" ref_url="https://www.suse.com/security/cve/CVE-2015-0359" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0722-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0723-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0346.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0359/">CVE-2015-0359</cve>
	<bugzilla href="https://bugzilla.suse.com/927089">SUSE bug 927089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593875" comment="flash-player-11.2.202.457-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593876" comment="flash-player-gnome-11.2.202.457-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593877" comment="flash-player-kde4-11.2.202.457-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0360</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0360" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0360" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0360" ref_url="https://www.suse.com/security/cve/CVE-2015-0360" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0722-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0723-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0347, CVE-2015-0350, CVE-2015-0352, CVE-2015-0353, CVE-2015-0354, CVE-2015-0355, CVE-2015-3038, CVE-2015-3041, CVE-2015-3042, and CVE-2015-3043.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0360/">CVE-2015-0360</cve>
	<bugzilla href="https://bugzilla.suse.com/927089">SUSE bug 927089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593875" comment="flash-player-11.2.202.457-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593876" comment="flash-player-gnome-11.2.202.457-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593877" comment="flash-player-kde4-11.2.202.457-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0374</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0374" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0374" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0374" ref_url="https://www.suse.com/security/cve/CVE-2015-0374" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote authenticated users to affect confidentiality via unknown vectors related to Server : Security : Privileges : Foreign Key.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0374/">CVE-2015-0374</cve>
	<bugzilla href="https://bugzilla.suse.com/914058">SUSE bug 914058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915911">SUSE bug 915911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590293" comment="libmysql55client18-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590294" comment="libmysql55client18-32bit-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590295" comment="libmysql55client_r18-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590296" comment="libmysql55client_r18-32bit-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590297" comment="libmysqlclient15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590298" comment="libmysqlclient15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590299" comment="libmysqlclient_r15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590300" comment="libmysqlclient_r15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590301" comment="mysql-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590302" comment="mysql-client-5.5.42-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0381</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0381" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0381" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0381" ref_url="https://www.suse.com/security/cve/CVE-2015-0381" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote attackers to affect availability via unknown vectors related to Server : Replication, a different vulnerability than CVE-2015-0382.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0381/">CVE-2015-0381</cve>
	<bugzilla href="https://bugzilla.suse.com/914058">SUSE bug 914058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915911">SUSE bug 915911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590293" comment="libmysql55client18-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590294" comment="libmysql55client18-32bit-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590295" comment="libmysql55client_r18-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590296" comment="libmysql55client_r18-32bit-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590297" comment="libmysqlclient15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590298" comment="libmysqlclient15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590299" comment="libmysqlclient_r15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590300" comment="libmysqlclient_r15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590301" comment="mysql-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590302" comment="mysql-client-5.5.42-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0382</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0382" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0382" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0382" ref_url="https://www.suse.com/security/cve/CVE-2015-0382" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote attackers to affect availability via unknown vectors related to Server : Replication, a different vulnerability than CVE-2015-0381.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0382/">CVE-2015-0382</cve>
	<bugzilla href="https://bugzilla.suse.com/914058">SUSE bug 914058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915911">SUSE bug 915911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590293" comment="libmysql55client18-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590294" comment="libmysql55client18-32bit-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590295" comment="libmysql55client_r18-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590296" comment="libmysql55client_r18-32bit-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590297" comment="libmysqlclient15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590298" comment="libmysqlclient15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590299" comment="libmysqlclient_r15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590300" comment="libmysqlclient_r15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590301" comment="mysql-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590302" comment="mysql-client-5.5.42-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0383</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0383" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0383" ref_url="https://www.suse.com/security/cve/CVE-2015-0383" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0190-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25; Java SE Embedded 7u71 and 8u6; and JRockit R27.8.4 and R28.3.4 allows local users to affect integrity and availability via unknown vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0383/">CVE-2015-0383</cve>
	<bugzilla href="https://bugzilla.suse.com/914041">SUSE bug 914041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592957" comment="java-1_7_0-openjdk-1.7.0.75-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592958" comment="java-1_7_0-openjdk-demo-1.7.0.75-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592959" comment="java-1_7_0-openjdk-devel-1.7.0.75-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150385" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0385</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0385" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0385" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0385" ref_url="https://www.suse.com/security/cve/CVE-2015-0385" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.21 and earlier allows remote authenticated users to affect availability via unknown vectors related to Pluggable Auth.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0385/">CVE-2015-0385</cve>
	<bugzilla href="https://bugzilla.suse.com/914058">SUSE bug 914058</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590293" comment="libmysql55client18-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590294" comment="libmysql55client18-32bit-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590295" comment="libmysql55client_r18-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590296" comment="libmysql55client_r18-32bit-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590297" comment="libmysqlclient15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590298" comment="libmysqlclient15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590299" comment="libmysqlclient_r15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590300" comment="libmysqlclient_r15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590301" comment="mysql-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590302" comment="mysql-client-5.5.42-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150391" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0391</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0391" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0391" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0391" ref_url="https://www.suse.com/security/cve/CVE-2015-0391" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote authenticated users to affect availability via vectors related to DDL.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0391/">CVE-2015-0391</cve>
	<bugzilla href="https://bugzilla.suse.com/914058">SUSE bug 914058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590293" comment="libmysql55client18-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590294" comment="libmysql55client18-32bit-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590295" comment="libmysql55client_r18-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590296" comment="libmysql55client_r18-32bit-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590297" comment="libmysqlclient15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590298" comment="libmysqlclient15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590299" comment="libmysqlclient_r15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590300" comment="libmysqlclient_r15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590301" comment="mysql-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590302" comment="mysql-client-5.5.42-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150395" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0395</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0395" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0395" ref_url="https://www.suse.com/security/cve/CVE-2015-0395" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0190-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0395/">CVE-2015-0395</cve>
	<bugzilla href="https://bugzilla.suse.com/914041">SUSE bug 914041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592957" comment="java-1_7_0-openjdk-1.7.0.75-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592958" comment="java-1_7_0-openjdk-demo-1.7.0.75-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592959" comment="java-1_7_0-openjdk-devel-1.7.0.75-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150400" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0400</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0400" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0400" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0400" ref_url="https://www.suse.com/security/cve/CVE-2015-0400" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0190-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u85, 7u72, and 8u25 allows remote attackers to affect confidentiality via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0400/">CVE-2015-0400</cve>
	<bugzilla href="https://bugzilla.suse.com/914041">SUSE bug 914041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592957" comment="java-1_7_0-openjdk-1.7.0.75-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592958" comment="java-1_7_0-openjdk-demo-1.7.0.75-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592959" comment="java-1_7_0-openjdk-devel-1.7.0.75-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150403" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0403</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0403" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0403" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0403" ref_url="https://www.suse.com/security/cve/CVE-2015-0403" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u85, 7u72, and 8u25 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0403/">CVE-2015-0403</cve>
	<bugzilla href="https://bugzilla.suse.com/914041">SUSE bug 914041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592957" comment="java-1_7_0-openjdk-1.7.0.75-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592958" comment="java-1_7_0-openjdk-demo-1.7.0.75-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592959" comment="java-1_7_0-openjdk-devel-1.7.0.75-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0405</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0405" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0405" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0405" ref_url="https://www.suse.com/security/cve/CVE-2015-0405" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.22 and earlier allows remote authenticated users to affect availability via unknown vectors related to XA.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0405/">CVE-2015-0405</cve>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592963" comment="libmysql55client18-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592964" comment="libmysql55client18-32bit-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592965" comment="libmysql55client_r18-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592966" comment="libmysql55client_r18-32bit-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590297" comment="libmysqlclient15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590298" comment="libmysqlclient15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590299" comment="libmysqlclient_r15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590300" comment="libmysqlclient_r15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592967" comment="mysql-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592968" comment="mysql-client-5.5.43-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150406" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0406</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0406" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0406" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0406" ref_url="https://www.suse.com/security/cve/CVE-2015-0406" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u85, 7u72, and 8u25 allows remote attackers to affect confidentiality and availability via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0406/">CVE-2015-0406</cve>
	<bugzilla href="https://bugzilla.suse.com/914041">SUSE bug 914041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592957" comment="java-1_7_0-openjdk-1.7.0.75-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592958" comment="java-1_7_0-openjdk-demo-1.7.0.75-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592959" comment="java-1_7_0-openjdk-devel-1.7.0.75-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0407</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0407" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0407" ref_url="https://www.suse.com/security/cve/CVE-2015-0407" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0190-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25 allows remote attackers to affect confidentiality via unknown vectors related to Swing.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0407/">CVE-2015-0407</cve>
	<bugzilla href="https://bugzilla.suse.com/914041">SUSE bug 914041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592957" comment="java-1_7_0-openjdk-1.7.0.75-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592958" comment="java-1_7_0-openjdk-demo-1.7.0.75-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592959" comment="java-1_7_0-openjdk-devel-1.7.0.75-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0408</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0408" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0408" ref_url="https://www.suse.com/security/cve/CVE-2015-0408" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0190-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0408/">CVE-2015-0408</cve>
	<bugzilla href="https://bugzilla.suse.com/914041">SUSE bug 914041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592957" comment="java-1_7_0-openjdk-1.7.0.75-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592958" comment="java-1_7_0-openjdk-demo-1.7.0.75-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592959" comment="java-1_7_0-openjdk-devel-1.7.0.75-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0409</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0409" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0409" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0409" ref_url="https://www.suse.com/security/cve/CVE-2015-0409" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.21 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0409/">CVE-2015-0409</cve>
	<bugzilla href="https://bugzilla.suse.com/914058">SUSE bug 914058</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590293" comment="libmysql55client18-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590294" comment="libmysql55client18-32bit-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590295" comment="libmysql55client_r18-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590296" comment="libmysql55client_r18-32bit-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590297" comment="libmysqlclient15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590298" comment="libmysqlclient15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590299" comment="libmysqlclient_r15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590300" comment="libmysqlclient_r15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590301" comment="mysql-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590302" comment="mysql-client-5.5.42-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0410</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0410" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0410" ref_url="https://www.suse.com/security/cve/CVE-2015-0410" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0190-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java SE, Java SE Embedded, JRockit component in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25; Java SE Embedded 7u71 and 8u6; and JRockit R27.8.4 and R28.3.4 allows remote attackers to affect availability via unknown vectors related to Security.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0410/">CVE-2015-0410</cve>
	<bugzilla href="https://bugzilla.suse.com/914041">SUSE bug 914041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592957" comment="java-1_7_0-openjdk-1.7.0.75-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592958" comment="java-1_7_0-openjdk-demo-1.7.0.75-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592959" comment="java-1_7_0-openjdk-devel-1.7.0.75-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0411</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0411" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0411" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0411" ref_url="https://www.suse.com/security/cve/CVE-2015-0411" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier, and 5.6.21 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Server : Security : Encryption.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0411/">CVE-2015-0411</cve>
	<bugzilla href="https://bugzilla.suse.com/914058">SUSE bug 914058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915911">SUSE bug 915911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590293" comment="libmysql55client18-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590294" comment="libmysql55client18-32bit-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590295" comment="libmysql55client_r18-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590296" comment="libmysql55client_r18-32bit-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590297" comment="libmysqlclient15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590298" comment="libmysqlclient15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590299" comment="libmysqlclient_r15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590300" comment="libmysqlclient_r15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590301" comment="mysql-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590302" comment="mysql-client-5.5.42-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0412</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0412" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0412" ref_url="https://www.suse.com/security/cve/CVE-2015-0412" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0190-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u85, 7u72, and 8u25 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JAX-WS.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0412/">CVE-2015-0412</cve>
	<bugzilla href="https://bugzilla.suse.com/914041">SUSE bug 914041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592957" comment="java-1_7_0-openjdk-1.7.0.75-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592958" comment="java-1_7_0-openjdk-demo-1.7.0.75-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592959" comment="java-1_7_0-openjdk-devel-1.7.0.75-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150413" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0413</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0413" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0413" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0413" ref_url="https://www.suse.com/security/cve/CVE-2015-0413" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u72 and 8u25 allows local users to affect integrity via unknown vectors related to Serviceability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0413/">CVE-2015-0413</cve>
	<bugzilla href="https://bugzilla.suse.com/914041">SUSE bug 914041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592957" comment="java-1_7_0-openjdk-1.7.0.75-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592958" comment="java-1_7_0-openjdk-demo-1.7.0.75-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592959" comment="java-1_7_0-openjdk-devel-1.7.0.75-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0421</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0421" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0421" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0421" ref_url="https://www.suse.com/security/cve/CVE-2015-0421" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 8u25 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to the installation process.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0421/">CVE-2015-0421</cve>
	<bugzilla href="https://bugzilla.suse.com/914041">SUSE bug 914041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592957" comment="java-1_7_0-openjdk-1.7.0.75-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592958" comment="java-1_7_0-openjdk-demo-1.7.0.75-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592959" comment="java-1_7_0-openjdk-devel-1.7.0.75-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0423</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0423" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0423" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0423" ref_url="https://www.suse.com/security/cve/CVE-2015-0423" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.22 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0423/">CVE-2015-0423</cve>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592963" comment="libmysql55client18-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592964" comment="libmysql55client18-32bit-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592965" comment="libmysql55client_r18-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592966" comment="libmysql55client_r18-32bit-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590297" comment="libmysqlclient15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590298" comment="libmysqlclient15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590299" comment="libmysqlclient_r15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590300" comment="libmysqlclient_r15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592967" comment="mysql-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592968" comment="mysql-client-5.5.43-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0432</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0432" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0432" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0432" ref_url="https://www.suse.com/security/cve/CVE-2015-0432" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier allows remote authenticated users to affect availability via vectors related to Server : InnoDB : DDL : Foreign Key.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0432/">CVE-2015-0432</cve>
	<bugzilla href="https://bugzilla.suse.com/914058">SUSE bug 914058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915911">SUSE bug 915911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009590293" comment="libmysql55client18-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590294" comment="libmysql55client18-32bit-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590295" comment="libmysql55client_r18-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590296" comment="libmysql55client_r18-32bit-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590297" comment="libmysqlclient15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590298" comment="libmysqlclient15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590299" comment="libmysqlclient_r15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590300" comment="libmysqlclient_r15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590301" comment="mysql-5.5.42-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590302" comment="mysql-client-5.5.42-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0433</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0433" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0433" ref_url="https://www.suse.com/security/cve/CVE-2015-0433" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote authenticated users to affect availability via vectors related to InnoDB : DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0433/">CVE-2015-0433</cve>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936409">SUSE bug 936409</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592963" comment="libmysql55client18-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592964" comment="libmysql55client18-32bit-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592965" comment="libmysql55client_r18-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592966" comment="libmysql55client_r18-32bit-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590297" comment="libmysqlclient15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590298" comment="libmysqlclient15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590299" comment="libmysqlclient_r15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590300" comment="libmysqlclient_r15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592967" comment="mysql-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592968" comment="mysql-client-5.5.43-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150437" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0437</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0437" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0437" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0437" ref_url="https://www.suse.com/security/cve/CVE-2015-0437" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 8u25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0437/">CVE-2015-0437</cve>
	<bugzilla href="https://bugzilla.suse.com/914041">SUSE bug 914041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592957" comment="java-1_7_0-openjdk-1.7.0.75-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592958" comment="java-1_7_0-openjdk-demo-1.7.0.75-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592959" comment="java-1_7_0-openjdk-devel-1.7.0.75-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0438</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0438" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0438" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0438" ref_url="https://www.suse.com/security/cve/CVE-2015-0438" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.22 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Partition.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0438/">CVE-2015-0438</cve>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592963" comment="libmysql55client18-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592964" comment="libmysql55client18-32bit-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592965" comment="libmysql55client_r18-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592966" comment="libmysql55client_r18-32bit-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590297" comment="libmysqlclient15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590298" comment="libmysqlclient15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590299" comment="libmysqlclient_r15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590300" comment="libmysqlclient_r15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592967" comment="mysql-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592968" comment="mysql-client-5.5.43-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0439</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0439" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0439" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0439" ref_url="https://www.suse.com/security/cve/CVE-2015-0439" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.22 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : InnoDB, a different vulnerability than CVE-2015-4756.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0439/">CVE-2015-0439</cve>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592963" comment="libmysql55client18-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592964" comment="libmysql55client18-32bit-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592965" comment="libmysql55client_r18-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592966" comment="libmysql55client_r18-32bit-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590297" comment="libmysqlclient15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590298" comment="libmysqlclient15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590299" comment="libmysqlclient_r15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590300" comment="libmysqlclient_r15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592967" comment="mysql-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592968" comment="mysql-client-5.5.43-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0441</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0441" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0441" ref_url="https://www.suse.com/security/cve/CVE-2015-0441" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Security : Encryption.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0441/">CVE-2015-0441</cve>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936409">SUSE bug 936409</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592963" comment="libmysql55client18-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592964" comment="libmysql55client18-32bit-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592965" comment="libmysql55client_r18-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592966" comment="libmysql55client_r18-32bit-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590297" comment="libmysqlclient15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590298" comment="libmysqlclient15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590299" comment="libmysqlclient_r15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590300" comment="libmysqlclient_r15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592967" comment="mysql-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592968" comment="mysql-client-5.5.43-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0458</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0458" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0458" ref_url="https://www.suse.com/security/cve/CVE-2015-0458" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-4" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1161-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0773-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00018.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in in Oracle Java SE 6u91, 7u76, and 8u40 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0458/">CVE-2015-0458</cve>
	<bugzilla href="https://bugzilla.suse.com/927591">SUSE bug 927591</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593878" comment="java-1_7_0-openjdk-1.7.0.75-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593879" comment="java-1_7_0-openjdk-demo-1.7.0.75-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593880" comment="java-1_7_0-openjdk-devel-1.7.0.75-0.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0459</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0459" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0459" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0459" ref_url="https://www.suse.com/security/cve/CVE-2015-0459" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-4" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1161-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0773-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00018.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40, and JavaFX 2.2.76, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2015-0491.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0459/">CVE-2015-0459</cve>
	<bugzilla href="https://bugzilla.suse.com/927591">SUSE bug 927591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932310">SUSE bug 932310</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593878" comment="java-1_7_0-openjdk-1.7.0.75-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593879" comment="java-1_7_0-openjdk-demo-1.7.0.75-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593880" comment="java-1_7_0-openjdk-devel-1.7.0.75-0.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0460</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0460" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0460" ref_url="https://www.suse.com/security/cve/CVE-2015-0460" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0773-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00018.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0460/">CVE-2015-0460</cve>
	<bugzilla href="https://bugzilla.suse.com/927591">SUSE bug 927591</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593878" comment="java-1_7_0-openjdk-1.7.0.75-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593879" comment="java-1_7_0-openjdk-demo-1.7.0.75-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593880" comment="java-1_7_0-openjdk-devel-1.7.0.75-0.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0469</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0469" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0469" ref_url="https://www.suse.com/security/cve/CVE-2015-0469" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-4" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1161-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0773-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00018.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0469/">CVE-2015-0469</cve>
	<bugzilla href="https://bugzilla.suse.com/927591">SUSE bug 927591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932310">SUSE bug 932310</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593878" comment="java-1_7_0-openjdk-1.7.0.75-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593879" comment="java-1_7_0-openjdk-demo-1.7.0.75-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593880" comment="java-1_7_0-openjdk-devel-1.7.0.75-0.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0477</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0477" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0477" ref_url="https://www.suse.com/security/cve/CVE-2015-0477" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-4" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1161-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0773-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00018.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40 allows remote attackers to affect integrity via unknown vectors related to Beans.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0477/">CVE-2015-0477</cve>
	<bugzilla href="https://bugzilla.suse.com/927591">SUSE bug 927591</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593878" comment="java-1_7_0-openjdk-1.7.0.75-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593879" comment="java-1_7_0-openjdk-demo-1.7.0.75-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593880" comment="java-1_7_0-openjdk-devel-1.7.0.75-0.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0478</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0478" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0478" ref_url="https://www.suse.com/security/cve/CVE-2015-0478" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-4" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1161-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0773-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00018.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40, and JRockit R28.3.5, allows remote attackers to affect confidentiality via vectors related to JCE.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0478/">CVE-2015-0478</cve>
	<bugzilla href="https://bugzilla.suse.com/927591">SUSE bug 927591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944456">SUSE bug 944456</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593878" comment="java-1_7_0-openjdk-1.7.0.75-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593879" comment="java-1_7_0-openjdk-demo-1.7.0.75-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593880" comment="java-1_7_0-openjdk-devel-1.7.0.75-0.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0480</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0480" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0480" ref_url="https://www.suse.com/security/cve/CVE-2015-0480" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-4" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1161-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0773-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00018.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40 allows remote attackers to affect integrity and availability via unknown vectors related to Tools.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0480/">CVE-2015-0480</cve>
	<bugzilla href="https://bugzilla.suse.com/927591">SUSE bug 927591</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593878" comment="java-1_7_0-openjdk-1.7.0.75-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593879" comment="java-1_7_0-openjdk-demo-1.7.0.75-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593880" comment="java-1_7_0-openjdk-devel-1.7.0.75-0.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0484</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0484" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0484" ref_url="https://www.suse.com/security/cve/CVE-2015-0484" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0773-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00018.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u76 and 8u40, and Java FX 2.2.76, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2015-0492.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0484/">CVE-2015-0484</cve>
	<bugzilla href="https://bugzilla.suse.com/927591">SUSE bug 927591</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593878" comment="java-1_7_0-openjdk-1.7.0.75-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593879" comment="java-1_7_0-openjdk-demo-1.7.0.75-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593880" comment="java-1_7_0-openjdk-devel-1.7.0.75-0.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0488</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0488" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0488" ref_url="https://www.suse.com/security/cve/CVE-2015-0488" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-4" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1161-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="TID7021823" ref_url="https://www.suse.com/support/kb/doc/?id=7021823" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0773-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00018.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40, and JRockit R28.3.5, allows remote attackers to affect availability via vectors related to JSSE.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0488/">CVE-2015-0488</cve>
	<bugzilla href="https://bugzilla.suse.com/927591">SUSE bug 927591</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593878" comment="java-1_7_0-openjdk-1.7.0.75-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593879" comment="java-1_7_0-openjdk-demo-1.7.0.75-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593880" comment="java-1_7_0-openjdk-devel-1.7.0.75-0.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0491</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0491" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0491" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0491" ref_url="https://www.suse.com/security/cve/CVE-2015-0491" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-4" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1161-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0773-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00018.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40, and Java FX 2.2.76, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2015-0459.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-22"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0491/">CVE-2015-0491</cve>
	<bugzilla href="https://bugzilla.suse.com/927591">SUSE bug 927591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932310">SUSE bug 932310</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593878" comment="java-1_7_0-openjdk-1.7.0.75-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593879" comment="java-1_7_0-openjdk-demo-1.7.0.75-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593880" comment="java-1_7_0-openjdk-devel-1.7.0.75-0.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0492</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0492" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0492" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0492" ref_url="https://www.suse.com/security/cve/CVE-2015-0492" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0773-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00018.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u76 and 8u40, and JavaFX 2.2.76, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2015-0484.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0492/">CVE-2015-0492</cve>
	<bugzilla href="https://bugzilla.suse.com/927591">SUSE bug 927591</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593878" comment="java-1_7_0-openjdk-1.7.0.75-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593879" comment="java-1_7_0-openjdk-demo-1.7.0.75-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593880" comment="java-1_7_0-openjdk-devel-1.7.0.75-0.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0498</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0498" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0498" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0498" ref_url="https://www.suse.com/security/cve/CVE-2015-0498" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.23 and earlier allows remote authenticated users to affect availability via unknown vectors related to Replication.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0498/">CVE-2015-0498</cve>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592963" comment="libmysql55client18-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592964" comment="libmysql55client18-32bit-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592965" comment="libmysql55client_r18-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592966" comment="libmysql55client_r18-32bit-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590297" comment="libmysqlclient15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590298" comment="libmysqlclient15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590299" comment="libmysqlclient_r15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590300" comment="libmysqlclient_r15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592967" comment="mysql-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592968" comment="mysql-client-5.5.43-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0499</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0499" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0499" ref_url="https://www.suse.com/security/cve/CVE-2015-0499" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Federated.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0499/">CVE-2015-0499</cve>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936408">SUSE bug 936408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592963" comment="libmysql55client18-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592964" comment="libmysql55client18-32bit-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592965" comment="libmysql55client_r18-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592966" comment="libmysql55client_r18-32bit-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590297" comment="libmysqlclient15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590298" comment="libmysqlclient15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590299" comment="libmysqlclient_r15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590300" comment="libmysqlclient_r15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592967" comment="mysql-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592968" comment="mysql-client-5.5.43-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0500</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0500" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0500" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0500" ref_url="https://www.suse.com/security/cve/CVE-2015-0500" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.23 and earlier allows remote authenticated users to affect availability via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0500/">CVE-2015-0500</cve>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592963" comment="libmysql55client18-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592964" comment="libmysql55client18-32bit-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592965" comment="libmysql55client_r18-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592966" comment="libmysql55client_r18-32bit-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590297" comment="libmysqlclient15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590298" comment="libmysqlclient15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590299" comment="libmysqlclient_r15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590300" comment="libmysqlclient_r15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592967" comment="mysql-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592968" comment="mysql-client-5.5.43-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0501</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0501" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0501" ref_url="https://www.suse.com/security/cve/CVE-2015-0501" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Compiling.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0501/">CVE-2015-0501</cve>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936408">SUSE bug 936408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592963" comment="libmysql55client18-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592964" comment="libmysql55client18-32bit-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592965" comment="libmysql55client_r18-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592966" comment="libmysql55client_r18-32bit-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590297" comment="libmysqlclient15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590298" comment="libmysqlclient15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590299" comment="libmysqlclient_r15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590300" comment="libmysqlclient_r15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592967" comment="mysql-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592968" comment="mysql-client-5.5.43-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0503</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0503" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0503" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0503" ref_url="https://www.suse.com/security/cve/CVE-2015-0503" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.23 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Partition.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0503/">CVE-2015-0503</cve>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592963" comment="libmysql55client18-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592964" comment="libmysql55client18-32bit-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592965" comment="libmysql55client_r18-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592966" comment="libmysql55client_r18-32bit-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590297" comment="libmysqlclient15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590298" comment="libmysqlclient15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590299" comment="libmysqlclient_r15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590300" comment="libmysqlclient_r15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592967" comment="mysql-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592968" comment="mysql-client-5.5.43-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0505</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0505" ref_url="https://www.suse.com/security/cve/CVE-2015-0505" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via vectors related to DDL.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0505/">CVE-2015-0505</cve>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936408">SUSE bug 936408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592963" comment="libmysql55client18-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592964" comment="libmysql55client18-32bit-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592965" comment="libmysql55client_r18-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592966" comment="libmysql55client_r18-32bit-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590297" comment="libmysqlclient15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590298" comment="libmysqlclient15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590299" comment="libmysqlclient_r15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590300" comment="libmysqlclient_r15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592967" comment="mysql-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592968" comment="mysql-client-5.5.43-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0506</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0506" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0506" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0506" ref_url="https://www.suse.com/security/cve/CVE-2015-0506" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.23 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB, a different vulnerability than CVE-2015-0508.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0506/">CVE-2015-0506</cve>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592963" comment="libmysql55client18-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592964" comment="libmysql55client18-32bit-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592965" comment="libmysql55client_r18-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592966" comment="libmysql55client_r18-32bit-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590297" comment="libmysqlclient15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590298" comment="libmysqlclient15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590299" comment="libmysqlclient_r15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590300" comment="libmysqlclient_r15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592967" comment="mysql-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592968" comment="mysql-client-5.5.43-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0507</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0507" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0507" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0507" ref_url="https://www.suse.com/security/cve/CVE-2015-0507" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.23 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Memcached.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0507/">CVE-2015-0507</cve>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592963" comment="libmysql55client18-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592964" comment="libmysql55client18-32bit-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592965" comment="libmysql55client_r18-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592966" comment="libmysql55client_r18-32bit-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590297" comment="libmysqlclient15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590298" comment="libmysqlclient15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590299" comment="libmysqlclient_r15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590300" comment="libmysqlclient_r15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592967" comment="mysql-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592968" comment="mysql-client-5.5.43-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0508</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0508" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0508" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0508" ref_url="https://www.suse.com/security/cve/CVE-2015-0508" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.23 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : InnoDB, a different vulnerability than CVE-2015-0506.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0508/">CVE-2015-0508</cve>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592963" comment="libmysql55client18-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592964" comment="libmysql55client18-32bit-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592965" comment="libmysql55client_r18-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592966" comment="libmysql55client_r18-32bit-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590297" comment="libmysqlclient15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590298" comment="libmysqlclient15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590299" comment="libmysqlclient_r15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590300" comment="libmysqlclient_r15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592967" comment="mysql-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592968" comment="mysql-client-5.5.43-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0511</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0511" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0511" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0511" ref_url="https://www.suse.com/security/cve/CVE-2015-0511" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.23 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : SP.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0511/">CVE-2015-0511</cve>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592963" comment="libmysql55client18-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592964" comment="libmysql55client18-32bit-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592965" comment="libmysql55client_r18-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592966" comment="libmysql55client_r18-32bit-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590297" comment="libmysqlclient15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590298" comment="libmysqlclient15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590299" comment="libmysqlclient_r15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590300" comment="libmysqlclient_r15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592967" comment="mysql-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592968" comment="mysql-client-5.5.43-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0559</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0559" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0559" ref_url="https://www.suse.com/security/cve/CVE-2015-0559" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001267.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0113-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00053.html" source="SUSE-SU"/>
    <description>
    Multiple use-after-free vulnerabilities in epan/dissectors/packet-wccp.c in the WCCP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 allow remote attackers to cause a denial of service (application crash) via a crafted packet, related to the use of packet-scope memory instead of pinfo-scope memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0559/">CVE-2015-0559</cve>
	<bugzilla href="https://bugzilla.suse.com/912365">SUSE bug 912365</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593881" comment="wireshark-1.10.12-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0560</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0560" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0560" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0560" ref_url="https://www.suse.com/security/cve/CVE-2015-0560" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001267.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0113-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00053.html" source="SUSE-SU"/>
    <description>
    The dissect_wccp2r1_address_table_info function in epan/dissectors/packet-wccp.c in the WCCP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 does not initialize certain data structures, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0560/">CVE-2015-0560</cve>
	<bugzilla href="https://bugzilla.suse.com/912365">SUSE bug 912365</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593881" comment="wireshark-1.10.12-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0561</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0561" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0561" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0561" ref_url="https://www.suse.com/security/cve/CVE-2015-0561" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001267.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0113-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00053.html" source="SUSE-SU"/>
    <description>
    asn1/lpp/lpp.cnf in the LPP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 does not validate a certain index value, which allows remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0561/">CVE-2015-0561</cve>
	<bugzilla href="https://bugzilla.suse.com/912368">SUSE bug 912368</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593881" comment="wireshark-1.10.12-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0562</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0562" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0562" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0562" ref_url="https://www.suse.com/security/cve/CVE-2015-0562" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001267.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0113-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00053.html" source="SUSE-SU"/>
    <description>
    Multiple use-after-free vulnerabilities in epan/dissectors/packet-dec-dnart.c in the DEC DNA Routing Protocol dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 allow remote attackers to cause a denial of service (application crash) via a crafted packet, related to the use of packet-scope memory instead of pinfo-scope memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0562/">CVE-2015-0562</cve>
	<bugzilla href="https://bugzilla.suse.com/912369">SUSE bug 912369</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593881" comment="wireshark-1.10.12-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0563</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0563" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0563" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0563" ref_url="https://www.suse.com/security/cve/CVE-2015-0563" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001267.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0113-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00053.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-smtp.c in the SMTP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 uses an incorrect length value for certain string-append operations, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0563/">CVE-2015-0563</cve>
	<bugzilla href="https://bugzilla.suse.com/912370">SUSE bug 912370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593881" comment="wireshark-1.10.12-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0564</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0564" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0564" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0564" ref_url="https://www.suse.com/security/cve/CVE-2015-0564" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001267.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0113-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00053.html" source="SUSE-SU"/>
    <description>
    Buffer underflow in the ssl_decrypt_record function in epan/dissectors/packet-ssl-utils.c in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 allows remote attackers to cause a denial of service (application crash) via a crafted packet that is improperly handled during decryption of an SSL session.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0564/">CVE-2015-0564</cve>
	<bugzilla href="https://bugzilla.suse.com/912372">SUSE bug 912372</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593881" comment="wireshark-1.10.12-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0777</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0777" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0777" ref_url="https://www.suse.com/security/cve/CVE-2015-0777" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1478-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1611-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001611.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0713-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
    <description>
    drivers/xen/usbback/usbback.c in linux-2.6.18-xen-3.4.0 (aka the Xen 3.4.x support patches for the Linux kernel 2.6.18), as used in the Linux kernel 2.6.x and 3.x in SUSE Linux distributions, allows guest OS users to obtain sensitive information from uninitialized locations in host OS kernel memory via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-14"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0777/">CVE-2015-0777</cve>
	<bugzilla href="https://bugzilla.suse.com/917830">SUSE bug 917830</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566727" comment="kernel-bigsmp-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566728" comment="kernel-default-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566729" comment="kernel-default-base-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566730" comment="kernel-default-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566731" comment="kernel-default-extra-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566732" comment="kernel-pae-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566733" comment="kernel-pae-base-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566734" comment="kernel-pae-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566735" comment="kernel-pae-extra-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566736" comment="kernel-source-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566737" comment="kernel-syms-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566738" comment="kernel-trace-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566739" comment="kernel-xen-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566740" comment="kernel-xen-base-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566741" comment="kernel-xen-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566742" comment="kernel-xen-extra-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590534" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590535" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567338" comment="kernel-default-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567339" comment="kernel-default-base-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567340" comment="kernel-default-devel-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567341" comment="kernel-default-extra-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567342" comment="kernel-pae-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567343" comment="kernel-pae-base-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567344" comment="kernel-pae-devel-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567345" comment="kernel-pae-extra-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567346" comment="kernel-source-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567347" comment="kernel-syms-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567348" comment="kernel-trace-devel-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567349" comment="kernel-xen-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567350" comment="kernel-xen-base-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567351" comment="kernel-xen-devel-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567352" comment="kernel-xen-extra-3.0.101-65.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0797</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0797" ref_url="https://www.suse.com/security/cve/CVE-2015-0797" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0921-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0960-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0978-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0935-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00037.html" source="SUSE-SU"/>
    <description>
    GStreamer before 1.4.5, as used in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 on Linux, allows remote attackers to cause a denial of service (buffer over-read and application crash) or possibly execute arbitrary code via crafted H.264 video data in an m4v file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0797/">CVE-2015-0797</cve>
	<bugzilla href="https://bugzilla.suse.com/927559">SUSE bug 927559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930622">SUSE bug 930622</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566482" comment="MozillaFirefox-31.7.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566483" comment="MozillaFirefox-translations-31.7.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566618" comment="gstreamer-0_10-plugins-bad-0.10.22-7.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566619" comment="gstreamer-0_10-plugins-bad-lang-0.10.22-7.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566620" comment="libgstbasecamerabinsrc-0_10-0-0.10.22-7.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566621" comment="libgstbasecamerabinsrc-0_10-0-32bit-0.10.22-7.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566622" comment="libgstbasevideo-0_10-0-0.10.22-7.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566623" comment="libgstbasevideo-0_10-0-32bit-0.10.22-7.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566624" comment="libgstphotography-0_10-0-0.10.22-7.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566625" comment="libgstphotography-0_10-0-32bit-0.10.22-7.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566626" comment="libgstsignalprocessor-0_10-0-0.10.22-7.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566627" comment="libgstsignalprocessor-0_10-0-32bit-0.10.22-7.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566628" comment="libgstvdp-0_10-0-0.10.22-7.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566629" comment="libgstvdp-0_10-0-32bit-0.10.22-7.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0799</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0799" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0799" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0799" ref_url="https://www.suse.com/security/cve/CVE-2015-0799" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00003.html" source="SUSE-SU"/>
    <description>
    The HTTP Alternative Services feature in Mozilla Firefox before 37.0.1 allows man-in-the-middle attackers to bypass an intended X.509 certificate-verification step for an SSL server by specifying that server in the uri-host field of an Alt-Svc HTTP/2 response header.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0799/">CVE-2015-0799</cve>
	<bugzilla href="https://bugzilla.suse.com/925368">SUSE bug 925368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926166">SUSE bug 926166</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0800</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0800" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0800" ref_url="https://www.suse.com/security/cve/CVE-2015-0800" source="SUSE CVE"/>
    <description>
    The PRNG implementation in the DNS resolver in Mozilla Firefox (aka Fennec) before 37.0 on Android does not properly generate random numbers for query ID values and UDP source ports, which makes it easier for remote attackers to spoof DNS responses by guessing these numbers, a related issue to CVE-2012-2808.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0800/">CVE-2015-0800</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0801</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0801" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0801" ref_url="https://www.suse.com/security/cve/CVE-2015-0801" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0704-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0704-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001346.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0892-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 allow remote attackers to bypass the Same Origin Policy and execute arbitrary JavaScript code with chrome privileges via vectors involving anchor navigation, a similar issue to CVE-2015-0818.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0801/">CVE-2015-0801</cve>
	<bugzilla href="https://bugzilla.suse.com/925368">SUSE bug 925368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925401">SUSE bug 925401</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566336" comment="MozillaFirefox-31.6.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566337" comment="MozillaFirefox-translations-31.6.0esr-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0802</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0802" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0802" ref_url="https://www.suse.com/security/cve/CVE-2015-0802" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00003.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 37.0 relies on docshell type information instead of page principal information for Window.webidl access control, which might allow remote attackers to execute arbitrary JavaScript code with chrome privileges via certain content navigation that leverages the reachability of a privileged window with an unintended persistence of access to restricted internal methods.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0802/">CVE-2015-0802</cve>
	<bugzilla href="https://bugzilla.suse.com/925368">SUSE bug 925368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925402">SUSE bug 925402</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0803</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0803" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0803" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0803" ref_url="https://www.suse.com/security/cve/CVE-2015-0803" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00003.html" source="SUSE-SU"/>
    <description>
    The HTMLSourceElement::AfterSetAttr function in Mozilla Firefox before 37.0 does not properly constrain the original data type of a casted value during the setting of a SOURCE element's attributes, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via a crafted HTML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0803/">CVE-2015-0803</cve>
	<bugzilla href="https://bugzilla.suse.com/925368">SUSE bug 925368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925400">SUSE bug 925400</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0804</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0804" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0804" ref_url="https://www.suse.com/security/cve/CVE-2015-0804" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00003.html" source="SUSE-SU"/>
    <description>
    The HTMLSourceElement::BindToTree function in Mozilla Firefox before 37.0 does not properly constrain a data type after omitting namespace validation during certain tree-binding operations, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via a crafted HTML document containing a SOURCE element.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0804/">CVE-2015-0804</cve>
	<bugzilla href="https://bugzilla.suse.com/925368">SUSE bug 925368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925400">SUSE bug 925400</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0805</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0805" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0805" ref_url="https://www.suse.com/security/cve/CVE-2015-0805" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00003.html" source="SUSE-SU"/>
    <description>
    The Off Main Thread Compositing (OMTC) implementation in Mozilla Firefox before 37.0 makes an incorrect memset call during interaction with the mozilla::layers::BufferTextureClient::AllocateForSurface function, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors that trigger rendering of 2D graphics content.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0805/">CVE-2015-0805</cve>
	<bugzilla href="https://bugzilla.suse.com/925368">SUSE bug 925368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925399">SUSE bug 925399</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0806</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0806" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0806" ref_url="https://www.suse.com/security/cve/CVE-2015-0806" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00003.html" source="SUSE-SU"/>
    <description>
    The Off Main Thread Compositing (OMTC) implementation in Mozilla Firefox before 37.0 attempts to use memset for a memory region of negative length during interaction with the mozilla::layers::BufferTextureClient::AllocateForSurface function, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors that trigger rendering of 2D graphics content.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0806/">CVE-2015-0806</cve>
	<bugzilla href="https://bugzilla.suse.com/925368">SUSE bug 925368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925399">SUSE bug 925399</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0807</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0807" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0807" ref_url="https://www.suse.com/security/cve/CVE-2015-0807" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0704-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0704-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001346.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0892-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    The navigator.sendBeacon implementation in Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 processes HTTP 30x status codes for redirects after a preflight request has occurred, which allows remote attackers to bypass intended CORS access-control checks and conduct cross-site request forgery (CSRF) attacks via a crafted web site, a similar issue to CVE-2014-8638.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0807/">CVE-2015-0807</cve>
	<bugzilla href="https://bugzilla.suse.com/913068">SUSE bug 913068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925368">SUSE bug 925368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925398">SUSE bug 925398</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566336" comment="MozillaFirefox-31.6.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566337" comment="MozillaFirefox-translations-31.6.0esr-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0808</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0808" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0808" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0808" ref_url="https://www.suse.com/security/cve/CVE-2015-0808" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00003.html" source="SUSE-SU"/>
    <description>
    The webrtc::VPMContentAnalysis::Release function in the WebRTC implementation in Mozilla Firefox before 37.0 uses incompatible approaches to the deallocation of memory for simple-type arrays, which might allow remote attackers to cause a denial of service (memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0808/">CVE-2015-0808</cve>
	<bugzilla href="https://bugzilla.suse.com/925368">SUSE bug 925368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925397">SUSE bug 925397</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0810</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0810" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0810" ref_url="https://www.suse.com/security/cve/CVE-2015-0810" source="SUSE CVE"/>
    <description>
    Mozilla Firefox before 37.0 on OS X does not ensure that the cursor is visible, which allows remote attackers to conduct clickjacking attacks via a Flash object in conjunction with DIV elements associated with layered presentation, and crafted JavaScript code that interacts with an IMG element.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0810/">CVE-2015-0810</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0811</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0811" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0811" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0811" ref_url="https://www.suse.com/security/cve/CVE-2015-0811" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00003.html" source="SUSE-SU"/>
    <description>
    The QCMS implementation in Mozilla Firefox before 37.0 allows remote attackers to obtain sensitive information from process heap memory or cause a denial of service (out-of-bounds read) via an image that is improperly handled during transformation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0811/">CVE-2015-0811</cve>
	<bugzilla href="https://bugzilla.suse.com/925368">SUSE bug 925368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925396">SUSE bug 925396</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0812</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0812" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0812" ref_url="https://www.suse.com/security/cve/CVE-2015-0812" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00003.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 37.0 does not require an HTTPS session for lightweight theme add-on installations, which allows man-in-the-middle attackers to bypass an intended user-confirmation requirement by deploying a crafted web site and conducting a DNS spoofing attack against a mozilla.org subdomain.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0812/">CVE-2015-0812</cve>
	<bugzilla href="https://bugzilla.suse.com/925368">SUSE bug 925368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925394">SUSE bug 925394</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0813</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0813" ref_url="https://www.suse.com/security/cve/CVE-2015-0813" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0704-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0704-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001346.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0892-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the AppendElements function in Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 on Linux, when the Fluendo MP3 plugin for GStreamer is used, allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted MP3 file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0813/">CVE-2015-0813</cve>
	<bugzilla href="https://bugzilla.suse.com/925368">SUSE bug 925368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925393">SUSE bug 925393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566336" comment="MozillaFirefox-31.6.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566337" comment="MozillaFirefox-translations-31.6.0esr-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0814</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0814" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0814" ref_url="https://www.suse.com/security/cve/CVE-2015-0814" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0704-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0704-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001346.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00003.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 37.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0814/">CVE-2015-0814</cve>
	<bugzilla href="https://bugzilla.suse.com/925368">SUSE bug 925368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925392">SUSE bug 925392</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566336" comment="MozillaFirefox-31.6.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566337" comment="MozillaFirefox-translations-31.6.0esr-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0816</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0816" ref_url="https://www.suse.com/security/cve/CVE-2015-0816" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0704-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0704-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001346.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0892-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 do not properly restrict resource: URLs, which makes it easier for remote attackers to execute arbitrary JavaScript code with chrome privileges by leveraging the ability to bypass the Same Origin Policy, as demonstrated by the resource: URL associated with PDF.js.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0816/">CVE-2015-0816</cve>
	<bugzilla href="https://bugzilla.suse.com/925368">SUSE bug 925368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925395">SUSE bug 925395</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566336" comment="MozillaFirefox-31.6.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566337" comment="MozillaFirefox-translations-31.6.0esr-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0817</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0817" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0817" ref_url="https://www.suse.com/security/cve/CVE-2015-0817" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0593-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0593-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0567-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0607-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0636-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00096.html" source="SUSE-SU"/>
    <description>
    The asm.js implementation in Mozilla Firefox before 36.0.3, Firefox ESR 31.x before 31.5.2, and SeaMonkey before 2.33.1 does not properly determine the cases in which bounds checking may be safely skipped during JIT compilation and heap access, which allows remote attackers to read or write to unintended memory locations, and consequently execute arbitrary code, via crafted JavaScript.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0817/">CVE-2015-0817</cve>
	<bugzilla href="https://bugzilla.suse.com/923495">SUSE bug 923495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923534">SUSE bug 923534</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566480" comment="MozillaFirefox-31.5.3esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566481" comment="MozillaFirefox-translations-31.5.3esr-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0818</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0818" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0818" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0818" ref_url="https://www.suse.com/security/cve/CVE-2015-0818" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0593-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0593-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0567-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0607-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0636-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00096.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 36.0.4, Firefox ESR 31.x before 31.5.3, and SeaMonkey before 2.33.1 allow remote attackers to bypass the Same Origin Policy and execute arbitrary JavaScript code with chrome privileges via vectors involving SVG hash navigation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0818/">CVE-2015-0818</cve>
	<bugzilla href="https://bugzilla.suse.com/923495">SUSE bug 923495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923534">SUSE bug 923534</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566480" comment="MozillaFirefox-31.5.3esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566481" comment="MozillaFirefox-translations-31.5.3esr-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0822</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0822" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0822" ref_url="https://www.suse.com/security/cve/CVE-2015-0822" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0448-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0567-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    The Form Autocompletion feature in Mozilla Firefox before 36.0, Firefox ESR 31.x before 31.5, and Thunderbird before 31.5 allows remote attackers to read arbitrary files via crafted JavaScript code.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0822/">CVE-2015-0822</cve>
	<bugzilla href="https://bugzilla.suse.com/910669">SUSE bug 910669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917597">SUSE bug 917597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923534">SUSE bug 923534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924515">SUSE bug 924515</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593884" comment="MozillaFirefox-31.5.0esr-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593885" comment="MozillaFirefox-translations-31.5.0esr-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150827" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0827</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0827" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0827" ref_url="https://www.suse.com/security/cve/CVE-2015-0827" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0448-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0567-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the mozilla::gfx::CopyRect function in Mozilla Firefox before 36.0, Firefox ESR 31.x before 31.5, and Thunderbird before 31.5 allows remote attackers to obtain sensitive information from uninitialized process memory via a malformed SVG graphic.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0827/">CVE-2015-0827</cve>
	<bugzilla href="https://bugzilla.suse.com/910669">SUSE bug 910669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917597">SUSE bug 917597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923534">SUSE bug 923534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924515">SUSE bug 924515</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593884" comment="MozillaFirefox-31.5.0esr-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593885" comment="MozillaFirefox-translations-31.5.0esr-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0831</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0831" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0831" ref_url="https://www.suse.com/security/cve/CVE-2015-0831" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0448-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0567-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the mozilla::dom::IndexedDB::IDBObjectStore::CreateIndex function in Mozilla Firefox before 36.0, Firefox ESR 31.x before 31.5, and Thunderbird before 31.5 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via crafted content that is improperly handled during IndexedDB index creation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0831/">CVE-2015-0831</cve>
	<bugzilla href="https://bugzilla.suse.com/910669">SUSE bug 910669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917597">SUSE bug 917597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923534">SUSE bug 923534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924515">SUSE bug 924515</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593884" comment="MozillaFirefox-31.5.0esr-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593885" comment="MozillaFirefox-translations-31.5.0esr-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0836</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0836" ref_url="https://www.suse.com/security/cve/CVE-2015-0836" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0448-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0567-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 36.0, Firefox ESR 31.x before 31.5, and Thunderbird before 31.5 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0836/">CVE-2015-0836</cve>
	<bugzilla href="https://bugzilla.suse.com/910669">SUSE bug 910669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917597">SUSE bug 917597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923534">SUSE bug 923534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924515">SUSE bug 924515</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593884" comment="MozillaFirefox-31.5.0esr-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593885" comment="MozillaFirefox-translations-31.5.0esr-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0837</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0837" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0837" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0837" ref_url="https://www.suse.com/security/cve/CVE-2015-0837" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001602.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1503-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-09/msg00005.html" source="SUSE-SU"/>
    <description>
    The mpi_powm function in Libgcrypt before 1.6.3 and GnuPG before 1.4.19 allows attackers to obtain sensitive information by leveraging timing differences when accessing a pre-computed table during modular exponentiation, related to a "Last-Level Cache Side-Channel Attack."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0837/">CVE-2015-0837</cve>
	<bugzilla href="https://bugzilla.suse.com/920057">SUSE bug 920057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566821" comment="libgcrypt11-1.5.0-0.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566822" comment="libgcrypt11-32bit-1.5.0-0.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333951" comment="gpg2 is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566821" comment="libgcrypt11-1.5.0-0.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566822" comment="libgcrypt11-32bit-1.5.0-0.19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0848</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0848" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0848" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0848" ref_url="https://www.suse.com/security/cve/CVE-2015-0848" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001569.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1132-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1134-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-06/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1212-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in libwmf 0.2.8.4 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted BMP image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0848/">CVE-2015-0848</cve>
	<bugzilla href="https://bugzilla.suse.com/933109">SUSE bug 933109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566932" comment="libwmf-0.2.8.4-206.29.29.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1196</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1196" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1196" ref_url="https://www.suse.com/security/cve/CVE-2015-1196" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001427.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00013.html" source="SUSE-SU"/>
    <description>
    GNU patch 2.7.1 allows remote attackers to write to arbitrary files via a symlink attack in a patch file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1196/">CVE-2015-1196</cve>
	<bugzilla href="https://bugzilla.suse.com/913678">SUSE bug 913678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915329">SUSE bug 915329</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333929" comment="patch is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1197</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1197" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1197" ref_url="https://www.suse.com/security/cve/CVE-2015-1197" source="SUSE CVE"/>
    <description>
    cpio 2.11, when using the --no-absolute-filenames option, allows local users to write to arbitrary files via a symlink attack on a file in an archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1197/">CVE-2015-1197</cve>
	<bugzilla href="https://bugzilla.suse.com/1077990">SUSE bug 1077990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913677">SUSE bug 913677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338991" comment="cpio is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1322</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1322" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1322" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1322" ref_url="https://www.suse.com/security/cve/CVE-2015-1322" source="SUSE CVE"/>
    <description>
    Directory traversal vulnerability in the Ubuntu network-manager package for Ubuntu (vivid) before 0.9.10.0-4ubuntu15.1, Ubuntu 14.10 before 0.9.8.8-0ubuntu28.1, and Ubuntu 14.04 LTS before 0.9.8.8-0ubuntu7.1 allows local users to change the modem device configuration or read arbitrary files via a .. (dot dot) in the file name in a request to read modem device contexts (com.canonical.NMOfono.ReadImsiContexts).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1322/">CVE-2015-1322</cve>
	<bugzilla href="https://bugzilla.suse.com/928972">SUSE bug 928972</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333999" comment="NetworkManager is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151328" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1328</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1328" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1328" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1328" ref_url="https://www.suse.com/security/cve/CVE-2015-1328" source="SUSE CVE"/>
    <description>
    The overlayfs implementation in the linux (aka Linux kernel) package before 3.19.0-21.21 in Ubuntu through 15.04 does not properly check permissions for file creation in the upper filesystem directory, which allows local users to obtain root access by leveraging a configuration in which overlayfs is permitted in an arbitrary mount namespace.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1328/">CVE-2015-1328</cve>
	<bugzilla href="https://bugzilla.suse.com/934950">SUSE bug 934950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935081">SUSE bug 935081</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151331" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1331</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1331" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1331" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1331" ref_url="https://www.suse.com/security/cve/CVE-2015-1331" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:1315-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00073.html" source="SUSE-SU"/>
    <description>
    lxclock.c in LXC 1.1.2 and earlier allows local users to create arbitrary files via a symlink attack on /run/lock/lxc/*.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1331/">CVE-2015-1331</cve>
	<bugzilla href="https://bugzilla.suse.com/938522">SUSE bug 938522</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339306" comment="lxc is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151333" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1333</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1333" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1333" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1333" ref_url="https://www.suse.com/security/cve/CVE-2015-1333" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:1842-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00024.html" source="SUSE-SU"/>
    <description>
    Memory leak in the __key_link_end function in security/keys/keyring.c in the Linux kernel before 4.1.4 allows local users to cause a denial of service (memory consumption) via many add_key system calls that refer to existing keys.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1333/">CVE-2015-1333</cve>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185451">SUSE bug 1185451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938645">SUSE bug 938645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151334" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1334</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1334" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1334" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1334" ref_url="https://www.suse.com/security/cve/CVE-2015-1334" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:1315-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1317-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00073.html" source="SUSE-SU"/>
    <description>
    attach.c in LXC 1.1.2 and earlier uses the proc filesystem in a container, which allows local container users to escape AppArmor or SELinux confinement by mounting a proc filesystem with a crafted (1) AppArmor profile or (2) SELinux label.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1334/">CVE-2015-1334</cve>
	<bugzilla href="https://bugzilla.suse.com/938523">SUSE bug 938523</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339306" comment="lxc is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151335" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1335</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1335" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1335" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1335" ref_url="https://www.suse.com/security/cve/CVE-2015-1335" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001647.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1717-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00073.html" source="SUSE-SU"/>
    <description>
    lxc-start in lxc before 1.0.8 and 1.1.x before 1.1.4 allows local container administrators to escape AppArmor confinement via a symlink attack on a (1) mount target or (2) bind mount source.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1335/">CVE-2015-1335</cve>
	<bugzilla href="https://bugzilla.suse.com/946744">SUSE bug 946744</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563696" comment="lxc-0.8.0-0.25.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1339</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1339" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1339" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1339" ref_url="https://www.suse.com/security/cve/CVE-2015-1339" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    Memory leak in the cuse_channel_release function in fs/fuse/cuse.c in the Linux kernel before 4.4 allows local users to cause a denial of service (memory consumption) or possibly have unspecified other impact by opening /dev/cuse many times.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1339/">CVE-2015-1339</cve>
	<bugzilla href="https://bugzilla.suse.com/969356">SUSE bug 969356</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1341</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1341" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1341" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1341" ref_url="https://www.suse.com/security/cve/CVE-2015-1341" source="SUSE CVE"/>
    <description>
    Any Python module in sys.path can be imported if the command line of the process triggering the coredump is Python and the first argument is -m in Apport before 2.19.2 function _python_module_path.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-10-29"/>
	<updated date="2021-10-29"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1341/">CVE-2015-1341</cve>
	<bugzilla href="https://bugzilla.suse.com/952246">SUSE bug 952246</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339307" comment="apport is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1345</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1345" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1345" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1345" ref_url="https://www.suse.com/security/cve/CVE-2015-1345" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:0243-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00037.html" source="SUSE-SU"/>
    <description>
    The bmexec_trans function in kwset.c in grep 2.19 through 2.21 allows local users to cause a denial of service (out-of-bounds heap read and crash) via crafted input when using the -F option.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1345/">CVE-2015-1345</cve>
	<bugzilla href="https://bugzilla.suse.com/914695">SUSE bug 914695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333967" comment="grep is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1349</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1349" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1349" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1349" ref_url="https://www.suse.com/security/cve/CVE-2015-1349" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1205-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1250-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1250-2" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00050.html" source="SUSE-SU"/>
    <description>
    named in ISC BIND 9.7.0 through 9.9.6 before 9.9.6-P2 and 9.10.x before 9.10.1-P2, when DNSSEC validation and the managed-keys feature are enabled, allows remote attackers to cause a denial of service (assertion failure and daemon exit, or daemon crash) by triggering an incorrect trust-anchor management scenario in which no key is ready for use.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1349/">CVE-2015-1349</cve>
	<bugzilla href="https://bugzilla.suse.com/918330">SUSE bug 918330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593894" comment="bind-libs-9.9.6P1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593895" comment="bind-libs-32bit-9.9.6P1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593896" comment="bind-utils-9.9.6P1-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151396" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1396</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1396" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1396" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1396" ref_url="https://www.suse.com/security/cve/CVE-2015-1396" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001427.html" source="SUSE-SU"/>
    <description>
    A Directory Traversal vulnerability exists in the GNU patch before 2.7.4. A remote attacker can write to arbitrary files via a symlink attack in a patch file. NOTE: this issue exists because of an incomplete fix for CVE-2015-1196.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1396/">CVE-2015-1396</cve>
	<bugzilla href="https://bugzilla.suse.com/915329">SUSE bug 915329</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333929" comment="patch is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1420</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1420" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1420" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1420" ref_url="https://www.suse.com/security/cve/CVE-2015-1420" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1478-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1611-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001706.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Race condition in the handle_to_path function in fs/fhandle.c in the Linux kernel through 3.19.1 allows local users to bypass intended size restrictions and trigger read operations on additional memory locations by changing the handle_bytes value of a file handle during the execution of this function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1420/">CVE-2015-1420</cve>
	<bugzilla href="https://bugzilla.suse.com/915517">SUSE bug 915517</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566727" comment="kernel-bigsmp-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566728" comment="kernel-default-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566729" comment="kernel-default-base-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566730" comment="kernel-default-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566731" comment="kernel-default-extra-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566732" comment="kernel-pae-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566733" comment="kernel-pae-base-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566734" comment="kernel-pae-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566735" comment="kernel-pae-extra-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566736" comment="kernel-source-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566737" comment="kernel-syms-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566738" comment="kernel-trace-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566739" comment="kernel-xen-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566740" comment="kernel-xen-base-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566741" comment="kernel-xen-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566742" comment="kernel-xen-extra-3.0.101-0.47.67.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567338" comment="kernel-default-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567339" comment="kernel-default-base-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567340" comment="kernel-default-devel-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567341" comment="kernel-default-extra-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567342" comment="kernel-pae-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567343" comment="kernel-pae-base-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567344" comment="kernel-pae-devel-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567345" comment="kernel-pae-extra-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567346" comment="kernel-source-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567347" comment="kernel-syms-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567348" comment="kernel-trace-devel-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567349" comment="kernel-xen-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567350" comment="kernel-xen-base-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567351" comment="kernel-xen-devel-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567352" comment="kernel-xen-extra-3.0.101-65.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1421</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1421" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1421" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1421" ref_url="https://www.suse.com/security/cve/CVE-2015-1421" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0832-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1478-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0713-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the sctp_assoc_update function in net/sctp/associola.c in the Linux kernel before 3.18.8 allows remote attackers to cause a denial of service (slab corruption and panic) or possibly have unspecified other impact by triggering an INIT collision that leads to improper handling of shared-key data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1421/">CVE-2015-1421</cve>
	<bugzilla href="https://bugzilla.suse.com/915577">SUSE bug 915577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922004">SUSE bug 922004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939261">SUSE bug 939261</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593262" comment="kernel-default-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593263" comment="kernel-default-base-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593264" comment="kernel-default-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593265" comment="kernel-default-extra-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593266" comment="kernel-pae-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593267" comment="kernel-pae-base-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593268" comment="kernel-pae-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593269" comment="kernel-pae-extra-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593270" comment="kernel-source-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593271" comment="kernel-syms-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593272" comment="kernel-trace-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593273" comment="kernel-xen-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593274" comment="kernel-xen-base-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593275" comment="kernel-xen-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593276" comment="kernel-xen-extra-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590534" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590535" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1461</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1461" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1461" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1461" ref_url="https://www.suse.com/security/cve/CVE-2015-1461" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0285-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00014.html" source="SUSE-SU"/>
    <description>
    ClamAV before 0.98.6 allows remote attackers to have unspecified impact via a crafted (1) Yoda's crypter or (2) mew packer file, related to a "heap out of bounds condition."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1461/">CVE-2015-1461</cve>
	<bugzilla href="https://bugzilla.suse.com/1040662">SUSE bug 1040662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916217">SUSE bug 916217</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593584" comment="clamav-0.98.6-0.6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1462</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1462" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1462" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1462" ref_url="https://www.suse.com/security/cve/CVE-2015-1462" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0285-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00014.html" source="SUSE-SU"/>
    <description>
    ClamAV before 0.98.6 allows remote attackers to have unspecified impact via a crafted upx packer file, related to a "heap out of bounds condition."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1462/">CVE-2015-1462</cve>
	<bugzilla href="https://bugzilla.suse.com/1040662">SUSE bug 1040662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916214">SUSE bug 916214</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593584" comment="clamav-0.98.6-0.6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1463</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1463" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1463" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1463" ref_url="https://www.suse.com/security/cve/CVE-2015-1463" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0285-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00014.html" source="SUSE-SU"/>
    <description>
    ClamAV before 0.98.6 allows remote attackers to cause a denial of service (crash) via a crafted petite packer file, related to an "incorrect compiler optimization."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1463/">CVE-2015-1463</cve>
	<bugzilla href="https://bugzilla.suse.com/1040662">SUSE bug 1040662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916215">SUSE bug 916215</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593584" comment="clamav-0.98.6-0.6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1472</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1472" ref_url="https://www.suse.com/security/cve/CVE-2015-1472" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001305.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0351-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00089.html" source="SUSE-SU"/>
    <description>
    The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka glibc or libc6) before 2.21 does not properly consider data-type size during memory allocation, which allows context-dependent attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a long line containing wide characters that are improperly handled in a wscanf call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1472/">CVE-2015-1472</cve>
	<bugzilla href="https://bugzilla.suse.com/916222">SUSE bug 916222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920341">SUSE bug 920341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922243">SUSE bug 922243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592352" comment="glibc-2.11.3-17.82.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592353" comment="glibc-32bit-2.11.3-17.82.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592354" comment="glibc-devel-2.11.3-17.82.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592355" comment="glibc-devel-32bit-2.11.3-17.82.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592356" comment="glibc-i18ndata-2.11.3-17.82.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592357" comment="glibc-locale-2.11.3-17.82.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592358" comment="glibc-locale-32bit-2.11.3-17.82.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592359" comment="nscd-2.11.3-17.82.11 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1545</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1545" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1545" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1545" ref_url="https://www.suse.com/security/cve/CVE-2015-1545" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001443.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1325-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00069.html" source="SUSE-SU"/>
    <description>
    The deref_parseCtrl function in servers/slapd/overlays/deref.c in OpenLDAP 2.4.13 through 2.4.40 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via an empty attribute list in a deref control in a search request.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1545/">CVE-2015-1545</cve>
	<bugzilla href="https://bugzilla.suse.com/846389">SUSE bug 846389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916897">SUSE bug 916897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916914">SUSE bug 916914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567007" comment="libldap-2_4-2-2.4.26-0.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567008" comment="libldap-2_4-2-32bit-2.4.26-0.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567009" comment="openldap2-client-2.4.26-0.30.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1546</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1546" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1546" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1546" ref_url="https://www.suse.com/security/cve/CVE-2015-1546" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001443.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1325-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00069.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in the get_vrFilter function in servers/slapd/filter.c in OpenLDAP 2.4.40 allows remote attackers to cause a denial of service (crash) via a crafted search query with a matched values control.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1546/">CVE-2015-1546</cve>
	<bugzilla href="https://bugzilla.suse.com/916914">SUSE bug 916914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567007" comment="libldap-2_4-2-2.4.26-0.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567008" comment="libldap-2_4-2-32bit-2.4.26-0.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567009" comment="openldap2-client-2.4.26-0.30.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1572</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1572" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1572" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1572" ref_url="https://www.suse.com/security/cve/CVE-2015-1572" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004281.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1002-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-06/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1006-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-06/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2133-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00050.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in closefs.c in the libext2fs library in e2fsprogs before 1.42.12 allows local users to execute arbitrary code by causing a crafted block group descriptor to be marked as dirty. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-0247.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-1572/">CVE-2015-1572</cve>
	<bugzilla href="https://bugzilla.suse.com/1123790">SUSE bug 1123790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915402">SUSE bug 915402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918346">SUSE bug 918346</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566399" comment="e2fsprogs-1.41.9-2.10.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566400" comment="libblkid1-2.19.1-6.62.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009440332" comment="libblkid1-32bit-2.19.1-6.62.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566401" comment="libcom_err2-1.41.9-2.10.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566402" comment="libcom_err2-32bit-1.41.9-2.10.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566403" comment="libext2fs2-1.41.9-2.10.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566404" comment="libuuid-devel-2.19.1-6.62.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566405" comment="libuuid1-2.19.1-6.62.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009440334" comment="libuuid1-32bit-2.19.1-6.62.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566406" comment="uuid-runtime-2.19.1-6.62.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1573</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1573" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1573" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1573" ref_url="https://www.suse.com/security/cve/CVE-2015-1573" source="SUSE CVE"/>
    <description>
    The nft_flush_table function in net/netfilter/nf_tables_api.c in the Linux kernel before 3.18.5 mishandles the interaction between cross-chain jumps and ruleset flushes, which allows local users to cause a denial of service (panic) by leveraging the CAP_NET_ADMIN capability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1573/">CVE-2015-1573</cve>
	<bugzilla href="https://bugzilla.suse.com/917274">SUSE bug 917274</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1593</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1593" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1593" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1593" ref_url="https://www.suse.com/security/cve/CVE-2015-1593" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0713-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.html" source="SUSE-SU"/>
    <description>
    The stack randomization feature in the Linux kernel before 3.19.1 on 64-bit platforms uses incorrect data types for the results of bitwise left-shift operations, which makes it easier for attackers to bypass the ASLR protection mechanism by predicting the address of the top of the stack, related to the randomize_stack_top function in fs/binfmt_elf.c and the stack_maxrandom_size function in arch/x86/mm/mmap.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-11"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1593/">CVE-2015-1593</cve>
	<bugzilla href="https://bugzilla.suse.com/1044934">SUSE bug 1044934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917839">SUSE bug 917839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592521" comment="kernel-bigsmp-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592285" comment="kernel-default-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592286" comment="kernel-default-base-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592287" comment="kernel-default-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592288" comment="kernel-default-extra-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592289" comment="kernel-pae-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592290" comment="kernel-pae-base-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592291" comment="kernel-pae-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592292" comment="kernel-pae-extra-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592293" comment="kernel-source-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592294" comment="kernel-syms-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592295" comment="kernel-trace-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592296" comment="kernel-xen-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592297" comment="kernel-xen-base-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592298" comment="kernel-xen-devel-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592299" comment="kernel-xen-extra-3.0.101-0.47.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592300" comment="xen-kmp-default-4.2.5_04_3.0.101_0.47.50-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592301" comment="xen-kmp-pae-4.2.5_04_3.0.101_0.47.50-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151606" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1606</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1606" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1606" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1606" ref_url="https://www.suse.com/security/cve/CVE-2015-1606" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2171-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001753.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2153-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00171.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2241-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00045.html" source="SUSE-SU"/>
    <description>
    The keyring DB in GnuPG before 2.1.2 does not properly handle invalid packets, which allows remote attackers to cause a denial of service (invalid read and use-after-free) via a crafted keyring file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1606/">CVE-2015-1606</cve>
	<bugzilla href="https://bugzilla.suse.com/918089">SUSE bug 918089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566612" comment="gpg2-2.0.9-25.33.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566613" comment="gpg2-lang-2.0.9-25.33.41.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1607</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1607" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1607" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1607" ref_url="https://www.suse.com/security/cve/CVE-2015-1607" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2171-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001753.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2153-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00171.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2241-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00045.html" source="SUSE-SU"/>
    <description>
    kbx/keybox-search.c in GnuPG before 1.4.19, 2.0.x before 2.0.27, and 2.1.x before 2.1.2 does not properly handle bitwise left-shifts, which allows remote attackers to cause a denial of service (invalid read operation) via a crafted keyring file, related to sign extensions and "memcpy with overlapping ranges."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1607/">CVE-2015-1607</cve>
	<bugzilla href="https://bugzilla.suse.com/918090">SUSE bug 918090</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566612" comment="gpg2-2.0.9-25.33.41.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566613" comment="gpg2-lang-2.0.9-25.33.41.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1779</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1779" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1779" ref_url="https://www.suse.com/security/cve/CVE-2015-1779" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0870-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
    <description>
    The VNC websocket frame decoder in QEMU allows remote attackers to cause a denial of service (memory and CPU consumption) via a large (1) websocket payload or (2) HTTP headers section.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1779/">CVE-2015-1779</cve>
	<bugzilla href="https://bugzilla.suse.com/924018">SUSE bug 924018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962632">SUSE bug 962632</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593907" comment="kvm-1.4.2-0.22.25.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567467" comment="xen-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567468" comment="xen-doc-html-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567469" comment="xen-kmp-default-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567470" comment="xen-kmp-pae-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567471" comment="xen-libs-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567472" comment="xen-libs-32bit-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567473" comment="xen-tools-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567474" comment="xen-tools-domU-4.4.4_02-32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1781</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1781" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1781" ref_url="https://www.suse.com/security/cve/CVE-2015-1781" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0955-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00084.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the gethostbyname_r and other unspecified NSS functions in the GNU C Library (aka glibc or libc6) before 2.22 allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response, which triggers a call with a misaligned buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-11"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1781/">CVE-2015-1781</cve>
	<bugzilla href="https://bugzilla.suse.com/927080">SUSE bug 927080</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566585" comment="glibc-2.11.3-17.87.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566586" comment="glibc-32bit-2.11.3-17.87.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566587" comment="glibc-devel-2.11.3-17.87.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566588" comment="glibc-devel-32bit-2.11.3-17.87.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566589" comment="glibc-i18ndata-2.11.3-17.87.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566590" comment="glibc-locale-2.11.3-17.87.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566591" comment="glibc-locale-32bit-2.11.3-17.87.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566592" comment="nscd-2.11.3-17.87.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1782</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1782" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1782" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1782" ref_url="https://www.suse.com/security/cve/CVE-2015-1782" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001334.html" source="SUSE-SU"/>
		<reference ref_id="TID7021300" ref_url="https://www.suse.com/support/kb/doc/?id=7021300" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0534-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00057.html" source="SUSE-SU"/>
    <description>
    The kex_agree_methods function in libssh2 before 1.5.0 allows remote servers to cause a denial of service (crash) or have other unspecified impact via crafted length values in an SSH_MSG_KEXINIT packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1782/">CVE-2015-1782</cve>
	<bugzilla href="https://bugzilla.suse.com/921070">SUSE bug 921070</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563663" comment="libssh2-1-1.2.9-4.2.4.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1787</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1787" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1787" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1787" ref_url="https://www.suse.com/security/cve/CVE-2015-1787" source="SUSE CVE"/>
		<reference ref_id="TID7016336" ref_url="https://www.suse.com/support/kb/doc/?id=7016336" source="SUSE-SU"/>
    <description>
    The ssl3_get_client_key_exchange function in s3_srvr.c in OpenSSL 1.0.2 before 1.0.2a, when client authentication and an ephemeral Diffie-Hellman ciphersuite are enabled, allows remote attackers to cause a denial of service (daemon crash) via a ClientKeyExchange message with a length of zero.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1787/">CVE-2015-1787</cve>
	<bugzilla href="https://bugzilla.suse.com/922503">SUSE bug 922503</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1788</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1788" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1788" ref_url="https://www.suse.com/security/cve/CVE-2015-1788" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1143-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1150-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1181-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1182-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1184-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1185-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="TID7016539" ref_url="https://www.suse.com/support/kb/doc/?id=7016539" source="SUSE-SU"/>
		<reference ref_id="TID7016602" ref_url="https://www.suse.com/support/kb/doc/?id=7016602" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1139-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    The BN_GF2m_mod_inv function in crypto/bn/bn_gf2m.c in OpenSSL before 0.9.8s, 1.0.0 before 1.0.0e, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b does not properly handle ECParameters structures in which the curve is over a malformed binary polynomial field, which allows remote attackers to cause a denial of service (infinite loop) via a session that uses an Elliptic Curve algorithm, as demonstrated by an attack against a server that supports client authentication.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1788/">CVE-2015-1788</cve>
	<bugzilla href="https://bugzilla.suse.com/934487">SUSE bug 934487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936586">SUSE bug 936586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938432">SUSE bug 938432</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593909" comment="libopenssl0_9_8-0.9.8j-0.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593910" comment="libopenssl0_9_8-32bit-0.9.8j-0.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593911" comment="openssl-0.9.8j-0.72.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1789</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1789" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1789" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1789" ref_url="https://www.suse.com/security/cve/CVE-2015-1789" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1143-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1150-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1181-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1182-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1183-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1184-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1185-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7016539" ref_url="https://www.suse.com/support/kb/doc/?id=7016539" source="SUSE-SU"/>
		<reference ref_id="TID7016602" ref_url="https://www.suse.com/support/kb/doc/?id=7016602" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1139-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    The X509_cmp_time function in crypto/x509/x509_vfy.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted length field in ASN1_TIME data, as demonstrated by an attack against a server that supports client authentication with a custom verification callback.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1789/">CVE-2015-1789</cve>
	<bugzilla href="https://bugzilla.suse.com/934489">SUSE bug 934489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936586">SUSE bug 936586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938432">SUSE bug 938432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566371" comment="compat-openssl097g-0.9.7g-146.22.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566372" comment="compat-openssl097g-32bit-0.9.7g-146.22.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566978" comment="libmysql55client18-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566979" comment="libmysql55client18-32bit-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566980" comment="libmysql55client_r18-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566981" comment="libmysql55client_r18-32bit-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593909" comment="libopenssl0_9_8-0.9.8j-0.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593910" comment="libopenssl0_9_8-32bit-0.9.8j-0.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566982" comment="mysql-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566983" comment="mysql-client-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593911" comment="openssl-0.9.8j-0.72.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566978" comment="libmysql55client18-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566979" comment="libmysql55client18-32bit-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566980" comment="libmysql55client_r18-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566981" comment="libmysql55client_r18-32bit-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566982" comment="mysql-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566983" comment="mysql-client-5.5.46-0.14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1790</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1790" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1790" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1790" ref_url="https://www.suse.com/security/cve/CVE-2015-1790" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1143-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1150-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1181-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1182-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1183-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1184-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1185-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7016539" ref_url="https://www.suse.com/support/kb/doc/?id=7016539" source="SUSE-SU"/>
		<reference ref_id="TID7016602" ref_url="https://www.suse.com/support/kb/doc/?id=7016602" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1139-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    The PKCS7_dataDecodefunction in crypto/pkcs7/pk7_doit.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a PKCS#7 blob that uses ASN.1 encoding and lacks inner EncryptedContent data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1790/">CVE-2015-1790</cve>
	<bugzilla href="https://bugzilla.suse.com/934491">SUSE bug 934491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936586">SUSE bug 936586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938432">SUSE bug 938432</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566371" comment="compat-openssl097g-0.9.7g-146.22.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566372" comment="compat-openssl097g-32bit-0.9.7g-146.22.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593909" comment="libopenssl0_9_8-0.9.8j-0.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593910" comment="libopenssl0_9_8-32bit-0.9.8j-0.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593911" comment="openssl-0.9.8j-0.72.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1791</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1791" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1791" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1791" ref_url="https://www.suse.com/security/cve/CVE-2015-1791" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1143-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1150-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1182-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1184-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1185-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="TID7016539" ref_url="https://www.suse.com/support/kb/doc/?id=7016539" source="SUSE-SU"/>
		<reference ref_id="TID7016602" ref_url="https://www.suse.com/support/kb/doc/?id=7016602" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1139-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    Race condition in the ssl3_get_new_session_ticket function in ssl/s3_clnt.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b, when used for a multi-threaded client, allows remote attackers to cause a denial of service (double free and application crash) or possibly have unspecified other impact by providing a NewSessionTicket during an attempt to reuse a ticket that had been obtained earlier.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1791/">CVE-2015-1791</cve>
	<bugzilla href="https://bugzilla.suse.com/933911">SUSE bug 933911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986238">SUSE bug 986238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989464">SUSE bug 989464</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593909" comment="libopenssl0_9_8-0.9.8j-0.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593910" comment="libopenssl0_9_8-32bit-0.9.8j-0.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593911" comment="openssl-0.9.8j-0.72.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1792</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1792" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1792" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1792" ref_url="https://www.suse.com/security/cve/CVE-2015-1792" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1143-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1150-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1182-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1184-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1185-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="TID7016539" ref_url="https://www.suse.com/support/kb/doc/?id=7016539" source="SUSE-SU"/>
		<reference ref_id="TID7016602" ref_url="https://www.suse.com/support/kb/doc/?id=7016602" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1139-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    The do_free_upto function in crypto/cms/cms_smime.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (infinite loop) via vectors that trigger a NULL value of a BIO data structure, as demonstrated by an unrecognized X.660 OID for a hash function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1792/">CVE-2015-1792</cve>
	<bugzilla href="https://bugzilla.suse.com/934493">SUSE bug 934493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986238">SUSE bug 986238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593909" comment="libopenssl0_9_8-0.9.8j-0.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593910" comment="libopenssl0_9_8-32bit-0.9.8j-0.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593911" comment="openssl-0.9.8j-0.72.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1793</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1793" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1793" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1793" ref_url="https://www.suse.com/security/cve/CVE-2015-1793" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="TID7016662" ref_url="https://www.suse.com/support/kb/doc/?id=7016662" source="SUSE-SU"/>
		<reference ref_id="TID7016686" ref_url="https://www.suse.com/support/kb/doc/?id=7016686" source="SUSE-SU"/>
		<reference ref_id="TID7016693" ref_url="https://www.suse.com/support/kb/doc/?id=7016693" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
    <description>
    The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certificate verifications via a valid leaf certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1793/">CVE-2015-1793</cve>
	<bugzilla href="https://bugzilla.suse.com/936746">SUSE bug 936746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937637">SUSE bug 937637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334233" comment="compat-openssl097g is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566978" comment="libmysql55client18-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566979" comment="libmysql55client18-32bit-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566980" comment="libmysql55client_r18-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566981" comment="libmysql55client_r18-32bit-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566982" comment="mysql-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566983" comment="mysql-client-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334233" comment="compat-openssl097g is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1799</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1799" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1799" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1799" ref_url="https://www.suse.com/security/cve/CVE-2015-1799" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1173-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0775-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-04/msg00052.html" source="SUSE-SU"/>
    <description>
    The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP 3.x and 4.x before 4.2.8p2 performs state-variable updates upon receiving certain invalid packets, which makes it easier for man-in-the-middle attackers to cause a denial of service (synchronization loss) by spoofing the source IP address of a peer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-14"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1799/">CVE-2015-1799</cve>
	<bugzilla href="https://bugzilla.suse.com/924202">SUSE bug 924202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927497">SUSE bug 927497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928321">SUSE bug 928321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936327">SUSE bug 936327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943565">SUSE bug 943565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957163">SUSE bug 957163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962624">SUSE bug 962624</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593919" comment="ntp-4.2.4p8-1.29.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593920" comment="ntp-doc-4.2.4p8-1.29.36.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1802</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1802" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1802" ref_url="https://www.suse.com/security/cve/CVE-2015-1802" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0674-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0702-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="TID7021676" ref_url="https://www.suse.com/support/kb/doc/?id=7021676" source="SUSE-SU"/>
		<reference ref_id="TID7021743" ref_url="https://www.suse.com/support/kb/doc/?id=7021743" source="SUSE-SU"/>
		<reference ref_id="TID7021744" ref_url="https://www.suse.com/support/kb/doc/?id=7021744" source="SUSE-SU"/>
		<reference ref_id="TID7021823" ref_url="https://www.suse.com/support/kb/doc/?id=7021823" source="SUSE-SU"/>
		<reference ref_id="TID7021836" ref_url="https://www.suse.com/support/kb/doc/?id=7021836" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00032.html" source="SUSE-SU"/>
    <description>
    The bdfReadProperties function in bitmap/bdfread.c in X.Org libXfont before 1.4.9 and 1.5.x before 1.5.1 allows remote authenticated users to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a (1) negative or (2) large property count in a BDF font file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1802/">CVE-2015-1802</cve>
	<bugzilla href="https://bugzilla.suse.com/921978">SUSE bug 921978</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593923" comment="xorg-x11-libs-7.4-8.26.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593924" comment="xorg-x11-libs-32bit-7.4-8.26.44.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1803</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1803" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1803" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1803" ref_url="https://www.suse.com/security/cve/CVE-2015-1803" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0674-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0702-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="TID7021676" ref_url="https://www.suse.com/support/kb/doc/?id=7021676" source="SUSE-SU"/>
		<reference ref_id="TID7021743" ref_url="https://www.suse.com/support/kb/doc/?id=7021743" source="SUSE-SU"/>
		<reference ref_id="TID7021744" ref_url="https://www.suse.com/support/kb/doc/?id=7021744" source="SUSE-SU"/>
		<reference ref_id="TID7021823" ref_url="https://www.suse.com/support/kb/doc/?id=7021823" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00032.html" source="SUSE-SU"/>
    <description>
    The bdfReadCharacters function in bitmap/bdfread.c in X.Org libXfont before 1.4.9 and 1.5.x before 1.5.1 does not properly handle character bitmaps it cannot read, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and crash) and possibly execute arbitrary code via a crafted BDF font file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1803/">CVE-2015-1803</cve>
	<bugzilla href="https://bugzilla.suse.com/921978">SUSE bug 921978</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593923" comment="xorg-x11-libs-7.4-8.26.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593924" comment="xorg-x11-libs-32bit-7.4-8.26.44.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1804</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1804" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1804" ref_url="https://www.suse.com/security/cve/CVE-2015-1804" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0674-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0702-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="TID7021676" ref_url="https://www.suse.com/support/kb/doc/?id=7021676" source="SUSE-SU"/>
		<reference ref_id="TID7021743" ref_url="https://www.suse.com/support/kb/doc/?id=7021743" source="SUSE-SU"/>
		<reference ref_id="TID7021744" ref_url="https://www.suse.com/support/kb/doc/?id=7021744" source="SUSE-SU"/>
		<reference ref_id="TID7021823" ref_url="https://www.suse.com/support/kb/doc/?id=7021823" source="SUSE-SU"/>
		<reference ref_id="TID7021836" ref_url="https://www.suse.com/support/kb/doc/?id=7021836" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2300-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00074.html" source="SUSE-SU"/>
    <description>
    The bdfReadCharacters function in bitmap/bdfread.c in X.Org libXfont before 1.4.9 and 1.5.x before 1.5.1 does not properly perform type conversion for metrics values, which allows remote authenticated users to cause a denial of service (out-of-bounds memory access) and possibly execute arbitrary code via a crafted BDF font file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1804/">CVE-2015-1804</cve>
	<bugzilla href="https://bugzilla.suse.com/921978">SUSE bug 921978</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593932" comment="xorg-x11-libs-7.4-8.26.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593933" comment="xorg-x11-libs-32bit-7.4-8.26.46.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1805</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1805" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1805" ref_url="https://www.suse.com/security/cve/CVE-2015-1805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1478-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1487-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1488-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1489-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1491-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1611-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001611.html" source="SUSE-SU"/>
    <description>
    The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in the Linux kernel before 3.16 do not properly consider the side effects of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls, which allows local users to cause a denial of service (system crash) or possibly gain privileges via a crafted application, aka an "I/O vector array overrun."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-11"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1805/">CVE-2015-1805</cve>
	<bugzilla href="https://bugzilla.suse.com/917839">SUSE bug 917839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933429">SUSE bug 933429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939270">SUSE bug 939270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964730">SUSE bug 964730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964732">SUSE bug 964732</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566727" comment="kernel-bigsmp-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566728" comment="kernel-default-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566729" comment="kernel-default-base-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566730" comment="kernel-default-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566731" comment="kernel-default-extra-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566732" comment="kernel-pae-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566733" comment="kernel-pae-base-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566734" comment="kernel-pae-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566735" comment="kernel-pae-extra-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566736" comment="kernel-source-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566737" comment="kernel-syms-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566738" comment="kernel-trace-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566739" comment="kernel-xen-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566740" comment="kernel-xen-base-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566741" comment="kernel-xen-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566742" comment="kernel-xen-extra-3.0.101-0.47.67.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567338" comment="kernel-default-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567339" comment="kernel-default-base-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567340" comment="kernel-default-devel-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567341" comment="kernel-default-extra-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567342" comment="kernel-pae-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567343" comment="kernel-pae-base-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567344" comment="kernel-pae-devel-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567345" comment="kernel-pae-extra-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567346" comment="kernel-source-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567347" comment="kernel-syms-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567348" comment="kernel-trace-devel-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567349" comment="kernel-xen-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567350" comment="kernel-xen-base-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567351" comment="kernel-xen-devel-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567352" comment="kernel-xen-extra-3.0.101-65.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1819</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1819" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1819" ref_url="https://www.suse.com/security/cve/CVE-2015-1819" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2372-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0106-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html" source="SUSE-SU"/>
    <description>
    The xmlreader in libxml allows remote attackers to cause a denial of service (memory consumption) via crafted XML data, related to an XML Entity Expansion (XEE) attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-10"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1819/">CVE-2015-1819</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928193">SUSE bug 928193</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566939" comment="libxml2-2.7.6-0.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566940" comment="libxml2-32bit-2.7.6-0.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566941" comment="libxml2-python-2.7.6-0.34.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1858</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1858" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1858" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1858" ref_url="https://www.suse.com/security/cve/CVE-2015-1858" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001540.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in gui/image/qbmphandler.cpp in the QtBase module in Qt before 4.8.7 and 5.x before 5.4.2 allow remote attackers to cause a denial of service (segmentation fault and crash) and possibly execute arbitrary code via a crafted BMP image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1858/">CVE-2015-1858</cve>
	<bugzilla href="https://bugzilla.suse.com/921999">SUSE bug 921999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927806">SUSE bug 927806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927807">SUSE bug 927807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927808">SUSE bug 927808</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566891" comment="libQtWebKit4-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566892" comment="libQtWebKit4-32bit-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566893" comment="libqt4-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566894" comment="libqt4-32bit-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566895" comment="libqt4-qt3support-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566896" comment="libqt4-qt3support-32bit-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566897" comment="libqt4-sql-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566898" comment="libqt4-sql-32bit-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566899" comment="libqt4-sql-mysql-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566900" comment="libqt4-sql-mysql-32bit-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566901" comment="libqt4-sql-postgresql-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566902" comment="libqt4-sql-postgresql-32bit-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566903" comment="libqt4-sql-sqlite-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566904" comment="libqt4-sql-sqlite-32bit-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566905" comment="libqt4-sql-unixODBC-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566906" comment="libqt4-sql-unixODBC-32bit-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566907" comment="libqt4-x11-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566908" comment="libqt4-x11-32bit-4.6.3-5.34.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151859" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1859</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1859" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1859" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1859" ref_url="https://www.suse.com/security/cve/CVE-2015-1859" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001540.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in plugins/imageformats/ico/qicohandler.cpp in the QtBase module in Qt before 4.8.7 and 5.x before 5.4.2 allow remote attackers to cause a denial of service (segmentation fault and crash) and possibly execute arbitrary code via a crafted ICO image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1859/">CVE-2015-1859</cve>
	<bugzilla href="https://bugzilla.suse.com/921999">SUSE bug 921999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927806">SUSE bug 927806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927807">SUSE bug 927807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927808">SUSE bug 927808</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566891" comment="libQtWebKit4-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566892" comment="libQtWebKit4-32bit-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566893" comment="libqt4-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566894" comment="libqt4-32bit-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566895" comment="libqt4-qt3support-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566896" comment="libqt4-qt3support-32bit-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566897" comment="libqt4-sql-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566898" comment="libqt4-sql-32bit-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566899" comment="libqt4-sql-mysql-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566900" comment="libqt4-sql-mysql-32bit-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566901" comment="libqt4-sql-postgresql-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566902" comment="libqt4-sql-postgresql-32bit-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566903" comment="libqt4-sql-sqlite-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566904" comment="libqt4-sql-sqlite-32bit-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566905" comment="libqt4-sql-unixODBC-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566906" comment="libqt4-sql-unixODBC-32bit-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566907" comment="libqt4-x11-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566908" comment="libqt4-x11-32bit-4.6.3-5.34.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1860</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1860" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1860" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1860" ref_url="https://www.suse.com/security/cve/CVE-2015-1860" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001540.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in gui/image/qgifhandler.cpp in the QtBase module in Qt before 4.8.7 and 5.x before 5.4.2 allow remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a crafted GIF image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1860/">CVE-2015-1860</cve>
	<bugzilla href="https://bugzilla.suse.com/921999">SUSE bug 921999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927806">SUSE bug 927806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927807">SUSE bug 927807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927808">SUSE bug 927808</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566891" comment="libQtWebKit4-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566892" comment="libQtWebKit4-32bit-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566893" comment="libqt4-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566894" comment="libqt4-32bit-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566895" comment="libqt4-qt3support-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566896" comment="libqt4-qt3support-32bit-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566897" comment="libqt4-sql-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566898" comment="libqt4-sql-32bit-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566899" comment="libqt4-sql-mysql-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566900" comment="libqt4-sql-mysql-32bit-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566901" comment="libqt4-sql-postgresql-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566902" comment="libqt4-sql-postgresql-32bit-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566903" comment="libqt4-sql-sqlite-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566904" comment="libqt4-sql-sqlite-32bit-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566905" comment="libqt4-sql-unixODBC-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566906" comment="libqt4-sql-unixODBC-32bit-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566907" comment="libqt4-x11-4.6.3-5.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566908" comment="libqt4-x11-32bit-4.6.3-5.34.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1863</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1863" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1863" ref_url="https://www.suse.com/security/cve/CVE-2015-1863" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001423.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0813-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00083.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in wpa_supplicant 1.0 through 2.4 allows remote attackers to cause a denial of service (crash), read memory, or possibly execute arbitrary code via crafted SSID information in a management frame when creating or updating P2P entries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1863/">CVE-2015-1863</cve>
	<bugzilla href="https://bugzilla.suse.com/915323">SUSE bug 915323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927558">SUSE bug 927558</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334146" comment="wpa_supplicant is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151865" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1865</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1865" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1865" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1865" ref_url="https://www.suse.com/security/cve/CVE-2015-1865" source="SUSE CVE"/>
    <description>
    fts.c in coreutils 8.4 allows local users to delete arbitrary files.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1865/">CVE-2015-1865</cve>
	<bugzilla href="https://bugzilla.suse.com/927949">SUSE bug 927949</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333935" comment="coreutils is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151877" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1877</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1877" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1877" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1877" ref_url="https://www.suse.com/security/cve/CVE-2015-1877" source="SUSE CVE"/>
    <description>
    The open_generic_xdg_mime function in xdg-open in xdg-utils 1.1.0 rc1 in Debian, when using dash, does not properly handle local variables, which allows remote attackers to execute arbitrary commands via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-03"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1877/">CVE-2015-1877</cve>
	<bugzilla href="https://bugzilla.suse.com/918836">SUSE bug 918836</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334243" comment="xdg-utils is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2041</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2041" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2041" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2041" ref_url="https://www.suse.com/security/cve/CVE-2015-2041" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1478-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
    <description>
    net/llc/sysctl_net_llc.c in the Linux kernel before 3.19 uses an incorrect data type in a sysctl table, which allows local users to obtain potentially sensitive information from kernel memory or possibly have unspecified other impact by accessing a sysctl entry.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2041/">CVE-2015-2041</cve>
	<bugzilla href="https://bugzilla.suse.com/903967">SUSE bug 903967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919007">SUSE bug 919007</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593262" comment="kernel-default-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593263" comment="kernel-default-base-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593264" comment="kernel-default-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593265" comment="kernel-default-extra-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593266" comment="kernel-pae-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593267" comment="kernel-pae-base-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593268" comment="kernel-pae-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593269" comment="kernel-pae-extra-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593270" comment="kernel-source-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593271" comment="kernel-syms-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593272" comment="kernel-trace-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593273" comment="kernel-xen-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593274" comment="kernel-xen-base-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593275" comment="kernel-xen-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593276" comment="kernel-xen-extra-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590534" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590535" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2042</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2042" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2042" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2042" ref_url="https://www.suse.com/security/cve/CVE-2015-2042" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1478-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
    <description>
    net/rds/sysctl.c in the Linux kernel before 3.19 uses an incorrect data type in a sysctl table, which allows local users to obtain potentially sensitive information from kernel memory or possibly have unspecified other impact by accessing a sysctl entry.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2042/">CVE-2015-2042</cve>
	<bugzilla href="https://bugzilla.suse.com/903967">SUSE bug 903967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919018">SUSE bug 919018</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593262" comment="kernel-default-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593263" comment="kernel-default-base-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593264" comment="kernel-default-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593265" comment="kernel-default-extra-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593266" comment="kernel-pae-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593267" comment="kernel-pae-base-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593268" comment="kernel-pae-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593269" comment="kernel-pae-extra-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593270" comment="kernel-source-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593271" comment="kernel-syms-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593272" comment="kernel-trace-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593273" comment="kernel-xen-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593274" comment="kernel-xen-base-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593275" comment="kernel-xen-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593276" comment="kernel-xen-extra-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590534" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590535" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2044</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2044" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2044" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2044" ref_url="https://www.suse.com/security/cve/CVE-2015-2044" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0613-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001357.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0732-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1092-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00016.html" source="SUSE-SU"/>
    <description>
    The emulation routines for unspecified X86 devices in Xen 3.2.x through 4.5.x does not properly initialize data, which allow local HVM guest users to obtain sensitive information via vectors involving an unsupported access size.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2044/">CVE-2015-2044</cve>
	<bugzilla href="https://bugzilla.suse.com/918995">SUSE bug 918995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918998">SUSE bug 918998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567243" comment="xen-4.2.5_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567244" comment="xen-doc-html-4.2.5_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567245" comment="xen-doc-pdf-4.2.5_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567246" comment="xen-kmp-default-4.2.5_04_3.0.101_0.47.52-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567247" comment="xen-kmp-pae-4.2.5_04_3.0.101_0.47.52-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567248" comment="xen-libs-4.2.5_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567249" comment="xen-libs-32bit-4.2.5_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567250" comment="xen-tools-4.2.5_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567251" comment="xen-tools-domU-4.2.5_04-0.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152045" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2045</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2045" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2045" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2045" ref_url="https://www.suse.com/security/cve/CVE-2015-2045" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0613-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001357.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0732-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1092-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00016.html" source="SUSE-SU"/>
    <description>
    The HYPERVISOR_xen_version hypercall in Xen 3.2.x through 4.5.x does not properly initialize data structures, which allows local guest users to obtain sensitive information via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2045/">CVE-2015-2045</cve>
	<bugzilla href="https://bugzilla.suse.com/918998">SUSE bug 918998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567243" comment="xen-4.2.5_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567244" comment="xen-doc-html-4.2.5_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567245" comment="xen-doc-pdf-4.2.5_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567246" comment="xen-kmp-default-4.2.5_04_3.0.101_0.47.52-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567247" comment="xen-kmp-pae-4.2.5_04_3.0.101_0.47.52-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567248" comment="xen-libs-4.2.5_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567249" comment="xen-libs-32bit-4.2.5_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567250" comment="xen-tools-4.2.5_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567251" comment="xen-tools-domU-4.2.5_04-0.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2150</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2150" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2150" ref_url="https://www.suse.com/security/cve/CVE-2015-2150" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1478-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1611-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001611.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0713-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Xen 3.3.x through 4.5.x and the Linux kernel through 3.19.1 do not properly restrict access to PCI command registers, which might allow local guest OS users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2150/">CVE-2015-2150</cve>
	<bugzilla href="https://bugzilla.suse.com/800280">SUSE bug 800280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903967">SUSE bug 903967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919463">SUSE bug 919463</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566727" comment="kernel-bigsmp-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566728" comment="kernel-default-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566729" comment="kernel-default-base-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566730" comment="kernel-default-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566731" comment="kernel-default-extra-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566732" comment="kernel-pae-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566733" comment="kernel-pae-base-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566734" comment="kernel-pae-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566735" comment="kernel-pae-extra-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566736" comment="kernel-source-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566737" comment="kernel-syms-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566738" comment="kernel-trace-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566739" comment="kernel-xen-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566740" comment="kernel-xen-base-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566741" comment="kernel-xen-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566742" comment="kernel-xen-extra-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590534" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590535" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567338" comment="kernel-default-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567339" comment="kernel-default-base-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567340" comment="kernel-default-devel-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567341" comment="kernel-default-extra-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567342" comment="kernel-pae-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567343" comment="kernel-pae-base-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567344" comment="kernel-pae-devel-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567345" comment="kernel-pae-extra-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567346" comment="kernel-source-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567347" comment="kernel-syms-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567348" comment="kernel-trace-devel-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567349" comment="kernel-xen-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567350" comment="kernel-xen-base-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567351" comment="kernel-xen-devel-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567352" comment="kernel-xen-extra-3.0.101-65.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2151</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2151" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2151" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2151" ref_url="https://www.suse.com/security/cve/CVE-2015-2151" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0613-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001357.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0732-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1092-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00016.html" source="SUSE-SU"/>
    <description>
    The x86 emulator in Xen 3.2.x through 4.5.x does not properly ignore segment overrides for instructions with register operands, which allows local guest users to obtain sensitive information, cause a denial of service (memory corruption), or possibly execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2151/">CVE-2015-2151</cve>
	<bugzilla href="https://bugzilla.suse.com/918998">SUSE bug 918998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919464">SUSE bug 919464</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567243" comment="xen-4.2.5_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567244" comment="xen-doc-html-4.2.5_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567245" comment="xen-doc-pdf-4.2.5_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567246" comment="xen-kmp-default-4.2.5_04_3.0.101_0.47.52-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567247" comment="xen-kmp-pae-4.2.5_04_3.0.101_0.47.52-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567248" comment="xen-libs-4.2.5_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567249" comment="xen-libs-32bit-4.2.5_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567250" comment="xen-tools-4.2.5_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567251" comment="xen-tools-domU-4.2.5_04-0.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2153</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2153" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2153" ref_url="https://www.suse.com/security/cve/CVE-2015-2153" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0616-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The rpki_rtr_pdu_print function in print-rpki-rtr.c in the TCP printer in tcpdump before 4.7.2 allows remote attackers to cause a denial of service (out-of-bounds read or write and crash) via a crafted header length in an RPKI-RTR Protocol Data Unit (PDU).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2153/">CVE-2015-2153</cve>
	<bugzilla href="https://bugzilla.suse.com/922221">SUSE bug 922221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922222">SUSE bug 922222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922223">SUSE bug 922223</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333975" comment="tcpdump is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2154</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2154" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2154" ref_url="https://www.suse.com/security/cve/CVE-2015-2154" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0616-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The osi_print_cksum function in print-isoclns.c in the ethernet printer in tcpdump before 4.7.2 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted (1) length, (2) offset, or (3) base pointer checksum value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2154/">CVE-2015-2154</cve>
	<bugzilla href="https://bugzilla.suse.com/922222">SUSE bug 922222</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567151" comment="tcpdump-3.9.8-1.27.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2155</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2155" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2155" ref_url="https://www.suse.com/security/cve/CVE-2015-2155" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0616-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The force printer in tcpdump before 4.7.2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2155/">CVE-2015-2155</cve>
	<bugzilla href="https://bugzilla.suse.com/922220">SUSE bug 922220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922221">SUSE bug 922221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922222">SUSE bug 922222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922223">SUSE bug 922223</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333975" comment="tcpdump is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2170</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2170" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2170" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2170" ref_url="https://www.suse.com/security/cve/CVE-2015-2170" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0882-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001386.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0906-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00024.html" source="SUSE-SU"/>
    <description>
    The upx decoder in ClamAV before 0.98.7 allows remote attackers to cause a denial of service (crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2170/">CVE-2015-2170</cve>
	<bugzilla href="https://bugzilla.suse.com/1040662">SUSE bug 1040662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921950">SUSE bug 921950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922560">SUSE bug 922560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929192">SUSE bug 929192</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593948" comment="clamav-0.98.7-0.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2187</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2187" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2187" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2187" ref_url="https://www.suse.com/security/cve/CVE-2015-2187" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:0489-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00038.html" source="SUSE-SU"/>
    <description>
    The dissect_atn_cpdlc_heur function in asn1/atn-cpdlc/packet-atn-cpdlc-template.c in the ATN-CPDLC dissector in Wireshark 1.12.x before 1.12.4 does not properly follow the TRY/ENDTRY code requirements, which allows remote attackers to cause a denial of service (stack memory corruption and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2187/">CVE-2015-2187</cve>
	<bugzilla href="https://bugzilla.suse.com/920695">SUSE bug 920695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333947" comment="wireshark is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2188</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2188" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2188" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2188" ref_url="https://www.suse.com/security/cve/CVE-2015-2188" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0657-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001325.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0489-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00038.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-wcp.c in the WCP dissector in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 does not properly initialize a data structure, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet that is improperly handled during decompression.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2188/">CVE-2015-2188</cve>
	<bugzilla href="https://bugzilla.suse.com/920696">SUSE bug 920696</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593950" comment="wireshark-1.10.13-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2189</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2189" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2189" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2189" ref_url="https://www.suse.com/security/cve/CVE-2015-2189" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0657-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001325.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0489-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00038.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in the pcapng_read function in wiretap/pcapng.c in the pcapng file parser in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via an invalid Interface Statistics Block (ISB) interface ID in a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2189/">CVE-2015-2189</cve>
	<bugzilla href="https://bugzilla.suse.com/920697">SUSE bug 920697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593950" comment="wireshark-1.10.13-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2190</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2190" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2190" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2190" ref_url="https://www.suse.com/security/cve/CVE-2015-2190" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:0489-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00038.html" source="SUSE-SU"/>
    <description>
    epan/proto.c in Wireshark 1.12.x before 1.12.4 does not properly handle integer data types greater than 32 bits in size, which allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted packet that is improperly handled by the LLDP dissector.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2190/">CVE-2015-2190</cve>
	<bugzilla href="https://bugzilla.suse.com/920698">SUSE bug 920698</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333947" comment="wireshark is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2191</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2191" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2191" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2191" ref_url="https://www.suse.com/security/cve/CVE-2015-2191" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0657-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001325.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0489-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00038.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the dissect_tnef function in epan/dissectors/packet-tnef.c in the TNEF dissector in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 allows remote attackers to cause a denial of service (infinite loop) via a crafted length field in a packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2191/">CVE-2015-2191</cve>
	<bugzilla href="https://bugzilla.suse.com/920699">SUSE bug 920699</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593950" comment="wireshark-1.10.13-0.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2192</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2192" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2192" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2192" ref_url="https://www.suse.com/security/cve/CVE-2015-2192" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:0489-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00038.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the dissect_osd2_cdb_continuation function in epan/dissectors/packet-scsi-osd.c in the SCSI OSD dissector in Wireshark 1.12.x before 1.12.4 allows remote attackers to cause a denial of service (infinite loop) via a crafted length field in a packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2192/">CVE-2015-2192</cve>
	<bugzilla href="https://bugzilla.suse.com/920700">SUSE bug 920700</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333947" comment="wireshark is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2221</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2221" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2221" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2221" ref_url="https://www.suse.com/security/cve/CVE-2015-2221" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0882-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001386.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0906-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00024.html" source="SUSE-SU"/>
    <description>
    ClamAV before 0.98.7 allows remote attackers to cause a denial of service (infinite loop) via a crafted y0da cryptor file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2221/">CVE-2015-2221</cve>
	<bugzilla href="https://bugzilla.suse.com/1040662">SUSE bug 1040662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921950">SUSE bug 921950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922560">SUSE bug 922560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929192">SUSE bug 929192</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593948" comment="clamav-0.98.7-0.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2222</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2222" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2222" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2222" ref_url="https://www.suse.com/security/cve/CVE-2015-2222" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0882-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001386.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0906-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00024.html" source="SUSE-SU"/>
    <description>
    ClamAV before 0.98.7 allows remote attackers to cause a denial of service (crash) via a crafted petite packed file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2222/">CVE-2015-2222</cve>
	<bugzilla href="https://bugzilla.suse.com/1040662">SUSE bug 1040662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921950">SUSE bug 921950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922560">SUSE bug 922560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929192">SUSE bug 929192</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593948" comment="clamav-0.98.7-0.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2305</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2305" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2305" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2305" ref_url="https://www.suse.com/security/cve/CVE-2015-2305" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0868-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0882-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1638-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0644-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0906-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00024.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the regcomp implementation in the Henry Spencer BSD regex library (aka rxspencer) alpha3.8.g5 on 32-bit platforms, as used in NetBSD through 6.1.5 and other products, might allow context-dependent attackers to execute arbitrary code via a large regular expression that leads to a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2305/">CVE-2015-2305</cve>
	<bugzilla href="https://bugzilla.suse.com/1040662">SUSE bug 1040662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921950">SUSE bug 921950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922022">SUSE bug 922022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922028">SUSE bug 922028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922030">SUSE bug 922030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922043">SUSE bug 922043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922560">SUSE bug 922560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922567">SUSE bug 922567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929192">SUSE bug 929192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593948" comment="clamav-0.98.7-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592963" comment="libmysql55client18-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592964" comment="libmysql55client18-32bit-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592965" comment="libmysql55client_r18-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592966" comment="libmysql55client_r18-32bit-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590297" comment="libmysqlclient15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590298" comment="libmysqlclient15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590299" comment="libmysqlclient_r15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590300" comment="libmysqlclient_r15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592967" comment="mysql-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592968" comment="mysql-client-5.5.43-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2318</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2318" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2318" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2318" ref_url="https://www.suse.com/security/cve/CVE-2015-2318" source="SUSE CVE"/>
    <description>
    The TLS stack in Mono before 3.12.1 allows man-in-the-middle attackers to conduct message skipping attacks and consequently impersonate clients by leveraging missing handshake state validation, aka a "SMACK SKIP-TLS" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2318/">CVE-2015-2318</cve>
	<bugzilla href="https://bugzilla.suse.com/921312">SUSE bug 921312</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593953" comment="bytefx-data-mysql-2.6.7-0.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593954" comment="ibm-data-db2-2.6.7-0.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593955" comment="mono-core-2.6.7-0.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593956" comment="mono-data-2.6.7-0.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593957" comment="mono-data-firebird-2.6.7-0.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593958" comment="mono-data-oracle-2.6.7-0.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593959" comment="mono-data-postgresql-2.6.7-0.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593960" comment="mono-data-sqlite-2.6.7-0.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593961" comment="mono-data-sybase-2.6.7-0.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593962" comment="mono-devel-2.6.7-0.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593963" comment="mono-extras-2.6.7-0.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593964" comment="mono-jscript-2.6.7-0.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593965" comment="mono-locale-extras-2.6.7-0.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593966" comment="mono-nunit-2.6.7-0.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593967" comment="mono-wcf-2.6.7-0.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593968" comment="mono-web-2.6.7-0.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593969" comment="mono-winforms-2.6.7-0.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593970" comment="monodoc-core-2.6.7-0.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152319" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2319</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2319" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2319" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2319" ref_url="https://www.suse.com/security/cve/CVE-2015-2319" source="SUSE CVE"/>
    <description>
    The TLS stack in Mono before 3.12.1 makes it easier for remote attackers to conduct cipher-downgrade attacks to EXPORT_RSA ciphers via crafted TLS traffic, related to the "FREAK" issue, a different vulnerability than CVE-2015-0204.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2319/">CVE-2015-2319</cve>
	<bugzilla href="https://bugzilla.suse.com/921312">SUSE bug 921312</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593953" comment="bytefx-data-mysql-2.6.7-0.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593954" comment="ibm-data-db2-2.6.7-0.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593955" comment="mono-core-2.6.7-0.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593956" comment="mono-data-2.6.7-0.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593957" comment="mono-data-firebird-2.6.7-0.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593958" comment="mono-data-oracle-2.6.7-0.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593959" comment="mono-data-postgresql-2.6.7-0.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593960" comment="mono-data-sqlite-2.6.7-0.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593961" comment="mono-data-sybase-2.6.7-0.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593962" comment="mono-devel-2.6.7-0.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593963" comment="mono-extras-2.6.7-0.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593964" comment="mono-jscript-2.6.7-0.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593965" comment="mono-locale-extras-2.6.7-0.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593966" comment="mono-nunit-2.6.7-0.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593967" comment="mono-wcf-2.6.7-0.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593968" comment="mono-web-2.6.7-0.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593969" comment="mono-winforms-2.6.7-0.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593970" comment="monodoc-core-2.6.7-0.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152320" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2320</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2320" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2320" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2320" ref_url="https://www.suse.com/security/cve/CVE-2015-2320" source="SUSE CVE"/>
    <description>
    The TLS stack in Mono before 3.12.1 allows remote attackers to have unspecified impact via vectors related to client-side SSLv2 fallback.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2320/">CVE-2015-2320</cve>
	<bugzilla href="https://bugzilla.suse.com/921312">SUSE bug 921312</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593953" comment="bytefx-data-mysql-2.6.7-0.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593954" comment="ibm-data-db2-2.6.7-0.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593955" comment="mono-core-2.6.7-0.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593956" comment="mono-data-2.6.7-0.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593957" comment="mono-data-firebird-2.6.7-0.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593958" comment="mono-data-oracle-2.6.7-0.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593959" comment="mono-data-postgresql-2.6.7-0.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593960" comment="mono-data-sqlite-2.6.7-0.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593961" comment="mono-data-sybase-2.6.7-0.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593962" comment="mono-devel-2.6.7-0.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593963" comment="mono-extras-2.6.7-0.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593964" comment="mono-jscript-2.6.7-0.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593965" comment="mono-locale-extras-2.6.7-0.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593966" comment="mono-nunit-2.6.7-0.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593967" comment="mono-wcf-2.6.7-0.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593968" comment="mono-web-2.6.7-0.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593969" comment="mono-winforms-2.6.7-0.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593970" comment="monodoc-core-2.6.7-0.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152325" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2325</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2325" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2325" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2325" ref_url="https://www.suse.com/security/cve/CVE-2015-2325" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0858-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00076.html" source="SUSE-SU"/>
    <description>
    The compile_branch function in PCRE before 8.37 allows context-dependent attackers to compile incorrect code, cause a denial of service (out-of-bounds heap read and crash), or possibly have other unspecified impact via a regular expression with a group containing a forward reference repeated a large number of times within a repeated outer group that has a zero minimum quantifier.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2325/">CVE-2015-2325</cve>
	<bugzilla href="https://bugzilla.suse.com/924960">SUSE bug 924960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933288">SUSE bug 933288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936408">SUSE bug 936408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958373">SUSE bug 958373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334068" comment="pcre is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152326" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2326</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2326" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2326" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2326" ref_url="https://www.suse.com/security/cve/CVE-2015-2326" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0858-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    The pcre_compile2 function in PCRE before 8.37 allows context-dependent attackers to compile incorrect code and cause a denial of service (out-of-bounds read) via regular expression with a group containing both a forward referencing subroutine call and a recursive back reference, as demonstrated by "((?+1)(\1))/".
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2326/">CVE-2015-2326</cve>
	<bugzilla href="https://bugzilla.suse.com/924960">SUSE bug 924960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924961">SUSE bug 924961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933288">SUSE bug 933288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936408">SUSE bug 936408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958373">SUSE bug 958373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334068" comment="pcre is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2327</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2327" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2327" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2327" ref_url="https://www.suse.com/security/cve/CVE-2015-2327" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00076.html" source="SUSE-SU"/>
    <description>
    PCRE before 8.36 mishandles the /(((a\2)|(a*)\g&lt;-1&gt;))*/ pattern and related patterns with certain internal recursive back references, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2327/">CVE-2015-2327</cve>
	<bugzilla href="https://bugzilla.suse.com/906574">SUSE bug 906574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957567">SUSE bug 957567</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334068" comment="pcre is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152328" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2328</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2328" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2328" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2328" ref_url="https://www.suse.com/security/cve/CVE-2015-2328" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00076.html" source="SUSE-SU"/>
    <description>
    PCRE before 8.36 mishandles the /((?(R)a|(?1)))+/ pattern and related patterns with certain recursion, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2328/">CVE-2015-2328</cve>
	<bugzilla href="https://bugzilla.suse.com/906574">SUSE bug 906574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957600">SUSE bug 957600</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334068" comment="pcre is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152331" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2331</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2331" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2331" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2331" ref_url="https://www.suse.com/security/cve/CVE-2015-2331" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001329.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0615-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0644-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-04/msg00002.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the _zip_cdir_new function in zip_dirent.c in libzip 0.11.2 and earlier, as used in the ZIP extension in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 and other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a ZIP archive that contains many entries, leading to a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2331/">CVE-2015-2331</cve>
	<bugzilla href="https://bugzilla.suse.com/922894">SUSE bug 922894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923240">SUSE bug 923240</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334250" comment="libzip1 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2566</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2566" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2566" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2566" ref_url="https://www.suse.com/security/cve/CVE-2015-2566" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.22 and earlier allows remote authenticated users to affect availability via vectors related to DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2566/">CVE-2015-2566</cve>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592963" comment="libmysql55client18-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592964" comment="libmysql55client18-32bit-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592965" comment="libmysql55client_r18-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592966" comment="libmysql55client_r18-32bit-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590297" comment="libmysqlclient15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590298" comment="libmysqlclient15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590299" comment="libmysqlclient_r15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590300" comment="libmysqlclient_r15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592967" comment="mysql-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592968" comment="mysql-client-5.5.43-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2567</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2567" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2567" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2567" ref_url="https://www.suse.com/security/cve/CVE-2015-2567" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.23 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Security : Privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2567/">CVE-2015-2567</cve>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592963" comment="libmysql55client18-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592964" comment="libmysql55client18-32bit-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592965" comment="libmysql55client_r18-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592966" comment="libmysql55client_r18-32bit-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590297" comment="libmysqlclient15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590298" comment="libmysqlclient15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590299" comment="libmysqlclient_r15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590300" comment="libmysqlclient_r15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592967" comment="mysql-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592968" comment="mysql-client-5.5.43-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2568</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2568" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2568" ref_url="https://www.suse.com/security/cve/CVE-2015-2568" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote attackers to affect availability via unknown vectors related to Server : Security : Privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2568/">CVE-2015-2568</cve>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936409">SUSE bug 936409</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592963" comment="libmysql55client18-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592964" comment="libmysql55client18-32bit-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592965" comment="libmysql55client_r18-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592966" comment="libmysql55client_r18-32bit-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590297" comment="libmysqlclient15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590298" comment="libmysqlclient15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590299" comment="libmysqlclient_r15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590300" comment="libmysqlclient_r15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592967" comment="mysql-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592968" comment="mysql-client-5.5.43-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2571</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2571" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2571" ref_url="https://www.suse.com/security/cve/CVE-2015-2571" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Optimizer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2571/">CVE-2015-2571</cve>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936408">SUSE bug 936408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592963" comment="libmysql55client18-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592964" comment="libmysql55client18-32bit-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592965" comment="libmysql55client_r18-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592966" comment="libmysql55client_r18-32bit-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590297" comment="libmysqlclient15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590298" comment="libmysqlclient15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590299" comment="libmysqlclient_r15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590300" comment="libmysqlclient_r15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592967" comment="mysql-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592968" comment="mysql-client-5.5.43-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2573</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2573" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2573" ref_url="https://www.suse.com/security/cve/CVE-2015-2573" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote authenticated users to affect availability via vectors related to DDL.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2573/">CVE-2015-2573</cve>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936409">SUSE bug 936409</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592963" comment="libmysql55client18-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592964" comment="libmysql55client18-32bit-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592965" comment="libmysql55client_r18-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592966" comment="libmysql55client_r18-32bit-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590297" comment="libmysqlclient15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590298" comment="libmysqlclient15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590299" comment="libmysqlclient_r15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590300" comment="libmysqlclient_r15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592967" comment="mysql-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592968" comment="mysql-client-5.5.43-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2576</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2576" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2576" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2576" ref_url="https://www.suse.com/security/cve/CVE-2015-2576" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the MySQL Utilities component in Oracle MySQL 1.5.1 and earlier, when running on Windows, allows local users to affect integrity via unknown vectors related to Installation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2576/">CVE-2015-2576</cve>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009592963" comment="libmysql55client18-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592964" comment="libmysql55client18-32bit-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592965" comment="libmysql55client_r18-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592966" comment="libmysql55client_r18-32bit-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590297" comment="libmysqlclient15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590298" comment="libmysqlclient15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590299" comment="libmysqlclient_r15-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590300" comment="libmysqlclient_r15-32bit-5.0.96-0.6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592967" comment="mysql-5.5.43-0.7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009592968" comment="mysql-client-5.5.43-0.7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2582</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2582" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2582" ref_url="https://www.suse.com/security/cve/CVE-2015-2582" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001639.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1629-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect availability via vectors related to GIS.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2582/">CVE-2015-2582</cve>
	<bugzilla href="https://bugzilla.suse.com/938412">SUSE bug 938412</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566972" comment="libmysql55client18-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566973" comment="libmysql55client18-32bit-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566974" comment="libmysql55client_r18-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566975" comment="libmysql55client_r18-32bit-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566976" comment="mysql-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566977" comment="mysql-client-5.5.45-0.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2590</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2590" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2590" ref_url="https://www.suse.com/security/cve/CVE-2015-2590" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2015-4732.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2590/">CVE-2015-2590</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566643" comment="java-1_7_0-openjdk-1.7.0.85-0.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566644" comment="java-1_7_0-openjdk-demo-1.7.0.85-0.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566645" comment="java-1_7_0-openjdk-devel-1.7.0.85-0.11.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2596</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2596" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2596" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2596" ref_url="https://www.suse.com/security/cve/CVE-2015-2596" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u80 allows remote attackers to affect integrity via unknown vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2596/">CVE-2015-2596</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566643" comment="java-1_7_0-openjdk-1.7.0.85-0.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566644" comment="java-1_7_0-openjdk-demo-1.7.0.85-0.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566645" comment="java-1_7_0-openjdk-devel-1.7.0.85-0.11.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2597</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2597" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2597" ref_url="https://www.suse.com/security/cve/CVE-2015-2597" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u80 and 8u45 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Install.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2597/">CVE-2015-2597</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566643" comment="java-1_7_0-openjdk-1.7.0.85-0.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566644" comment="java-1_7_0-openjdk-demo-1.7.0.85-0.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566645" comment="java-1_7_0-openjdk-devel-1.7.0.85-0.11.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2601</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2601" ref_url="https://www.suse.com/security/cve/CVE-2015-2601" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="TID7016694" ref_url="https://www.suse.com/support/kb/doc/?id=7016694" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, JRockit R28.3.6, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality via vectors related to JCE.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2601/">CVE-2015-2601</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566643" comment="java-1_7_0-openjdk-1.7.0.85-0.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566644" comment="java-1_7_0-openjdk-demo-1.7.0.85-0.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566645" comment="java-1_7_0-openjdk-devel-1.7.0.85-0.11.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2611</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2611" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2611" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2611" ref_url="https://www.suse.com/security/cve/CVE-2015-2611" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001639.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1629-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.24 and earlier allows remote authenticated users to affect availability via vectors related to DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2611/">CVE-2015-2611</cve>
	<bugzilla href="https://bugzilla.suse.com/938412">SUSE bug 938412</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566972" comment="libmysql55client18-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566973" comment="libmysql55client18-32bit-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566974" comment="libmysql55client_r18-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566975" comment="libmysql55client_r18-32bit-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566976" comment="mysql-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566977" comment="mysql-client-5.5.45-0.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2613</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2613" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2613" ref_url="https://www.suse.com/security/cve/CVE-2015-2613" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u80 and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality via vectors related to JCE.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2613/">CVE-2015-2613</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951727">SUSE bug 951727</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566643" comment="java-1_7_0-openjdk-1.7.0.85-0.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566644" comment="java-1_7_0-openjdk-demo-1.7.0.85-0.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566645" comment="java-1_7_0-openjdk-devel-1.7.0.85-0.11.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2617</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2617" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2617" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2617" ref_url="https://www.suse.com/security/cve/CVE-2015-2617" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001639.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1629-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.24 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to Partition.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2617/">CVE-2015-2617</cve>
	<bugzilla href="https://bugzilla.suse.com/938412">SUSE bug 938412</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566972" comment="libmysql55client18-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566973" comment="libmysql55client18-32bit-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566974" comment="libmysql55client_r18-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566975" comment="libmysql55client_r18-32bit-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566976" comment="mysql-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566977" comment="mysql-client-5.5.45-0.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2619</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2619" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2619" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2619" ref_url="https://www.suse.com/security/cve/CVE-2015-2619" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u80 and 8u45, JavaFX 2.2.80, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2619/">CVE-2015-2619</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566643" comment="java-1_7_0-openjdk-1.7.0.85-0.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566644" comment="java-1_7_0-openjdk-demo-1.7.0.85-0.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566645" comment="java-1_7_0-openjdk-devel-1.7.0.85-0.11.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2620</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2620" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2620" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2620" ref_url="https://www.suse.com/security/cve/CVE-2015-2620" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001639.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1629-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.23 and earlier allows remote authenticated users to affect confidentiality via unknown vectors related to Server : Security : Privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-2620/">CVE-2015-2620</cve>
	<bugzilla href="https://bugzilla.suse.com/938412">SUSE bug 938412</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566972" comment="libmysql55client18-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566973" comment="libmysql55client18-32bit-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566974" comment="libmysql55client_r18-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566975" comment="libmysql55client_r18-32bit-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566976" comment="mysql-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566977" comment="mysql-client-5.5.45-0.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2621</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2621" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2621" ref_url="https://www.suse.com/security/cve/CVE-2015-2621" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33, allows remote attackers to affect confidentiality via vectors related to JMX.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2621/">CVE-2015-2621</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566643" comment="java-1_7_0-openjdk-1.7.0.85-0.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566644" comment="java-1_7_0-openjdk-demo-1.7.0.85-0.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566645" comment="java-1_7_0-openjdk-devel-1.7.0.85-0.11.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2625</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2625" ref_url="https://www.suse.com/security/cve/CVE-2015-2625" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="TID7016694" ref_url="https://www.suse.com/support/kb/doc/?id=7016694" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JRockit R28.3.6; and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality via vectors related to JSSE.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2625/">CVE-2015-2625</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566643" comment="java-1_7_0-openjdk-1.7.0.85-0.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566644" comment="java-1_7_0-openjdk-demo-1.7.0.85-0.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566645" comment="java-1_7_0-openjdk-devel-1.7.0.85-0.11.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2627</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2627" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2627" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2627" ref_url="https://www.suse.com/security/cve/CVE-2015-2627" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45 allows remote attackers to affect confidentiality via unknown vectors related to installation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2627/">CVE-2015-2627</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566643" comment="java-1_7_0-openjdk-1.7.0.85-0.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566644" comment="java-1_7_0-openjdk-demo-1.7.0.85-0.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566645" comment="java-1_7_0-openjdk-devel-1.7.0.85-0.11.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2628</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2628" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2628" ref_url="https://www.suse.com/security/cve/CVE-2015-2628" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2628/">CVE-2015-2628</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566643" comment="java-1_7_0-openjdk-1.7.0.85-0.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566644" comment="java-1_7_0-openjdk-demo-1.7.0.85-0.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566645" comment="java-1_7_0-openjdk-devel-1.7.0.85-0.11.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2632</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2632" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2632" ref_url="https://www.suse.com/security/cve/CVE-2015-2632" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45 allows remote attackers to affect confidentiality via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2632/">CVE-2015-2632</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566643" comment="java-1_7_0-openjdk-1.7.0.85-0.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566644" comment="java-1_7_0-openjdk-demo-1.7.0.85-0.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566645" comment="java-1_7_0-openjdk-devel-1.7.0.85-0.11.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2637</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2637" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2637" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2637" ref_url="https://www.suse.com/security/cve/CVE-2015-2637" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JavaFX 2.2.80; and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2637/">CVE-2015-2637</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566643" comment="java-1_7_0-openjdk-1.7.0.85-0.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566644" comment="java-1_7_0-openjdk-demo-1.7.0.85-0.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566645" comment="java-1_7_0-openjdk-devel-1.7.0.85-0.11.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2638</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2638" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2638" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2638" ref_url="https://www.suse.com/security/cve/CVE-2015-2638" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JavaFX 2.2.80; and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2638/">CVE-2015-2638</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566643" comment="java-1_7_0-openjdk-1.7.0.85-0.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566644" comment="java-1_7_0-openjdk-demo-1.7.0.85-0.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566645" comment="java-1_7_0-openjdk-devel-1.7.0.85-0.11.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2639</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2639" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2639" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2639" ref_url="https://www.suse.com/security/cve/CVE-2015-2639" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001639.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1629-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.24 and earlier allows remote authenticated users to affect integrity via unknown vectors related to Server : Security : Firewall.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2639/">CVE-2015-2639</cve>
	<bugzilla href="https://bugzilla.suse.com/938412">SUSE bug 938412</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566972" comment="libmysql55client18-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566973" comment="libmysql55client18-32bit-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566974" comment="libmysql55client_r18-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566975" comment="libmysql55client_r18-32bit-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566976" comment="mysql-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566977" comment="mysql-client-5.5.45-0.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2641</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2641" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2641" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2641" ref_url="https://www.suse.com/security/cve/CVE-2015-2641" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001639.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1629-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.24 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Security : Privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2641/">CVE-2015-2641</cve>
	<bugzilla href="https://bugzilla.suse.com/938412">SUSE bug 938412</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566972" comment="libmysql55client18-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566973" comment="libmysql55client18-32bit-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566974" comment="libmysql55client_r18-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566975" comment="libmysql55client_r18-32bit-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566976" comment="mysql-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566977" comment="mysql-client-5.5.45-0.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2643</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2643" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2643" ref_url="https://www.suse.com/security/cve/CVE-2015-2643" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001639.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1629-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Optimizer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2643/">CVE-2015-2643</cve>
	<bugzilla href="https://bugzilla.suse.com/938412">SUSE bug 938412</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566972" comment="libmysql55client18-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566973" comment="libmysql55client18-32bit-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566974" comment="libmysql55client_r18-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566975" comment="libmysql55client_r18-32bit-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566976" comment="mysql-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566977" comment="mysql-client-5.5.45-0.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2648</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2648" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2648" ref_url="https://www.suse.com/security/cve/CVE-2015-2648" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001639.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1629-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect availability via vectors related to DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2648/">CVE-2015-2648</cve>
	<bugzilla href="https://bugzilla.suse.com/938412">SUSE bug 938412</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566972" comment="libmysql55client18-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566973" comment="libmysql55client18-32bit-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566974" comment="libmysql55client_r18-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566975" comment="libmysql55client_r18-32bit-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566976" comment="mysql-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566977" comment="mysql-client-5.5.45-0.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2661</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2661" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2661" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2661" ref_url="https://www.suse.com/security/cve/CVE-2015-2661" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001639.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1629-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.24 and earlier allows local users to affect availability via unknown vectors related to Client.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2661/">CVE-2015-2661</cve>
	<bugzilla href="https://bugzilla.suse.com/938412">SUSE bug 938412</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566972" comment="libmysql55client18-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566973" comment="libmysql55client18-32bit-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566974" comment="libmysql55client_r18-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566975" comment="libmysql55client_r18-32bit-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566976" comment="mysql-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566977" comment="mysql-client-5.5.45-0.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2664</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2664" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2664" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2664" ref_url="https://www.suse.com/security/cve/CVE-2015-2664" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2664/">CVE-2015-2664</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566643" comment="java-1_7_0-openjdk-1.7.0.85-0.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566644" comment="java-1_7_0-openjdk-demo-1.7.0.85-0.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566645" comment="java-1_7_0-openjdk-devel-1.7.0.85-0.11.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2668</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2668" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2668" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2668" ref_url="https://www.suse.com/security/cve/CVE-2015-2668" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0882-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001386.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0906-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00024.html" source="SUSE-SU"/>
    <description>
    ClamAV before 0.98.7 allows remote attackers to cause a denial of service (infinite loop) via a crafted xz archive file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2668/">CVE-2015-2668</cve>
	<bugzilla href="https://bugzilla.suse.com/1040662">SUSE bug 1040662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921950">SUSE bug 921950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922560">SUSE bug 922560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929192">SUSE bug 929192</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593948" comment="clamav-0.98.7-0.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2672</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2672" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2672" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2672" ref_url="https://www.suse.com/security/cve/CVE-2015-2672" source="SUSE CVE"/>
    <description>
    The xsave/xrstor implementation in arch/x86/include/asm/xsave.h in the Linux kernel before 3.19.2 creates certain .altinstr_replacement pointers and consequently does not provide any protection against instruction faulting, which allows local users to cause a denial of service (panic) by triggering a fault, as demonstrated by an unaligned memory operand or a non-canonical address memory operand.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2672/">CVE-2015-2672</cve>
	<bugzilla href="https://bugzilla.suse.com/921027">SUSE bug 921027</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2686</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2686" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2686" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2686" ref_url="https://www.suse.com/security/cve/CVE-2015-2686" source="SUSE CVE"/>
    <description>
    net/socket.c in the Linux kernel 3.19 before 3.19.3 does not validate certain range data for (1) sendto and (2) recvfrom system calls, which allows local users to gain privileges by leveraging a subsystem that uses the copy_from_iter function in the iov_iter interface, as demonstrated by the Bluetooth subsystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2686/">CVE-2015-2686</cve>
	<bugzilla href="https://bugzilla.suse.com/923924">SUSE bug 923924</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2694</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2694" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2694" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2694" ref_url="https://www.suse.com/security/cve/CVE-2015-2694" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001505.html" source="SUSE-SU"/>
    <description>
    The kdcpreauth modules in MIT Kerberos 5 (aka krb5) 1.12.x and 1.13.x before 1.13.2 do not properly track whether a client's request has been validated, which allows remote attackers to bypass an intended preauthentication requirement by providing (1) zero bytes of data or (2) an arbitrary realm name, related to plugins/preauth/otp/main.c and plugins/preauth/pkinit/pkinit_srv.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2694/">CVE-2015-2694</cve>
	<bugzilla href="https://bugzilla.suse.com/928978">SUSE bug 928978</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333953" comment="krb5 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2695</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2695" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2695" ref_url="https://www.suse.com/security/cve/CVE-2015-2695" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1897-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1898-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1898-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001737.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1928-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1997-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00022.html" source="SUSE-SU"/>
    <description>
    lib/gssapi/spnego/spnego_mech.c in MIT Kerberos 5 (aka krb5) before 1.14 relies on an inappropriate context handle, which allows remote attackers to cause a denial of service (incorrect pointer read and process crash) via a crafted SPNEGO packet that is mishandled during a gss_inquire_context call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2695/">CVE-2015-2695</cve>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952188">SUSE bug 952188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969771">SUSE bug 969771</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566766" comment="krb5-1.6.3-133.49.103.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566767" comment="krb5-32bit-1.6.3-133.49.103.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566768" comment="krb5-client-1.6.3-133.49.103.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2696</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2696" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2696" ref_url="https://www.suse.com/security/cve/CVE-2015-2696" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1897-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1928-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1997-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00022.html" source="SUSE-SU"/>
    <description>
    lib/gssapi/krb5/iakerb.c in MIT Kerberos 5 (aka krb5) before 1.14 relies on an inappropriate context handle, which allows remote attackers to cause a denial of service (incorrect pointer read and process crash) via a crafted IAKERB packet that is mishandled during a gss_inquire_context call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2696/">CVE-2015-2696</cve>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952189">SUSE bug 952189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954204">SUSE bug 954204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333953" comment="krb5 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2697</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2697" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2697" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2697" ref_url="https://www.suse.com/security/cve/CVE-2015-2697" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1897-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1928-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1997-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00022.html" source="SUSE-SU"/>
    <description>
    The build_principal_va function in lib/krb5/krb/bld_princ.c in MIT Kerberos 5 (aka krb5) before 1.14 allows remote authenticated users to cause a denial of service (out-of-bounds read and KDC crash) via an initial '\0' character in a long realm field within a TGS request.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2697/">CVE-2015-2697</cve>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952190">SUSE bug 952190</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333953" comment="krb5 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2698</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2698" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2698" ref_url="https://www.suse.com/security/cve/CVE-2015-2698" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001738.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2055-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00116.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2376-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00124.html" source="SUSE-SU"/>
    <description>
    The iakerb_gss_export_sec_context function in lib/gssapi/krb5/iakerb.c in MIT Kerberos 5 (aka krb5) 1.14 pre-release 2015-09-14 improperly accesses a certain pointer, which allows remote authenticated users to cause a denial of service (memory corruption) or possibly have unspecified other impact by interacting with an application that calls the gss_export_sec_context function.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2015-2696.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2698/">CVE-2015-2698</cve>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954204">SUSE bug 954204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333953" comment="krb5 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2706</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2706" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2706" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2706" ref_url="https://www.suse.com/security/cve/CVE-2015-2706" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:0763-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-04/msg00046.html" source="SUSE-SU"/>
    <description>
    Race condition in the AsyncPaintWaitEvent::AsyncPaintWaitEvent function in Mozilla Firefox before 37.0.2 allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via a crafted plugin that does not properly complete initialization.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2706/">CVE-2015-2706</cve>
	<bugzilla href="https://bugzilla.suse.com/928116">SUSE bug 928116</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2708</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2708" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2708" ref_url="https://www.suse.com/security/cve/CVE-2015-2708" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0960-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0978-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0892-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0934-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0935-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2708/">CVE-2015-2708</cve>
	<bugzilla href="https://bugzilla.suse.com/930622">SUSE bug 930622</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566482" comment="MozillaFirefox-31.7.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566483" comment="MozillaFirefox-translations-31.7.0esr-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2709</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2709" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2709" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2709" ref_url="https://www.suse.com/security/cve/CVE-2015-2709" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0960-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0978-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0934-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00036.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 38.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2709/">CVE-2015-2709</cve>
	<bugzilla href="https://bugzilla.suse.com/930622">SUSE bug 930622</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566482" comment="MozillaFirefox-31.7.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566483" comment="MozillaFirefox-translations-31.7.0esr-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2710</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2710" ref_url="https://www.suse.com/security/cve/CVE-2015-2710" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0960-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0978-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0892-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0934-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0935-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the SVGTextFrame class in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 allows remote attackers to execute arbitrary code via crafted SVG graphics data in conjunction with a crafted Cascading Style Sheets (CSS) token sequence.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2710/">CVE-2015-2710</cve>
	<bugzilla href="https://bugzilla.suse.com/930622">SUSE bug 930622</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566482" comment="MozillaFirefox-31.7.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566483" comment="MozillaFirefox-translations-31.7.0esr-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2713</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2713" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2713" ref_url="https://www.suse.com/security/cve/CVE-2015-2713" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0960-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0978-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0892-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0934-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0935-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the SetBreaks function in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a document containing crafted text in conjunction with a Cascading Style Sheets (CSS) token sequence containing properties related to vertical text.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2713/">CVE-2015-2713</cve>
	<bugzilla href="https://bugzilla.suse.com/930622">SUSE bug 930622</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566482" comment="MozillaFirefox-31.7.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566483" comment="MozillaFirefox-translations-31.7.0esr-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152716" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2716</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2716" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2716" ref_url="https://www.suse.com/security/cve/CVE-2015-2716" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0960-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0978-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0892-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0934-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0935-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the XML parser in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 allows remote attackers to execute arbitrary code by providing a large amount of compressed XML data, a related issue to CVE-2015-1283.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2716/">CVE-2015-2716</cve>
	<bugzilla href="https://bugzilla.suse.com/930622">SUSE bug 930622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939077">SUSE bug 939077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980391">SUSE bug 980391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983985">SUSE bug 983985</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566482" comment="MozillaFirefox-31.7.0esr-0.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566483" comment="MozillaFirefox-translations-31.7.0esr-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2721</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2721" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2721" ref_url="https://www.suse.com/security/cve/CVE-2015-2721" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Mozilla Network Security Services (NSS) before 3.19, as used in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, Thunderbird before 38.1, and other products, does not properly determine state transitions for the TLS state machine, which allows man-in-the-middle attackers to defeat cryptographic protection mechanisms by blocking messages, as demonstrated by removing a forward-secrecy property by blocking a ServerKeyExchange message, aka a "SMACK SKIP-TLS" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2721/">CVE-2015-2721</cve>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566338" comment="MozillaFirefox-31.8.0esr-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566339" comment="MozillaFirefox-translations-31.8.0esr-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566340" comment="libfreebl3-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566341" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566342" comment="libsoftokn3-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566343" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566344" comment="mozilla-nspr-4.10.8-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566345" comment="mozilla-nspr-32bit-4.10.8-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566346" comment="mozilla-nss-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566347" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566348" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2722</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2722" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2722" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2722" ref_url="https://www.suse.com/security/cve/CVE-2015-2722" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the CanonicalizeXPCOMParticipant function in Mozilla Firefox before 39.0 and Firefox ESR 31.x before 31.8 and 38.x before 38.1 allows remote attackers to execute arbitrary code via vectors involving attachment of an XMLHttpRequest object to a shared worker.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2722/">CVE-2015-2722</cve>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566338" comment="MozillaFirefox-31.8.0esr-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566339" comment="MozillaFirefox-translations-31.8.0esr-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566340" comment="libfreebl3-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566341" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566342" comment="libsoftokn3-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566343" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566344" comment="mozilla-nspr-4.10.8-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566345" comment="mozilla-nspr-32bit-4.10.8-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566346" comment="mozilla-nss-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566347" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566348" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152724" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2724</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2724" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2724" ref_url="https://www.suse.com/security/cve/CVE-2015-2724" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2724/">CVE-2015-2724</cve>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566338" comment="MozillaFirefox-31.8.0esr-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566339" comment="MozillaFirefox-translations-31.8.0esr-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566340" comment="libfreebl3-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566341" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566342" comment="libsoftokn3-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566343" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566344" comment="mozilla-nspr-4.10.8-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566345" comment="mozilla-nspr-32bit-4.10.8-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566346" comment="mozilla-nss-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566347" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566348" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2725</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2725" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2725" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2725" ref_url="https://www.suse.com/security/cve/CVE-2015-2725" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 39.0, Firefox ESR 38.x before 38.1, and Thunderbird before 38.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2725/">CVE-2015-2725</cve>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566338" comment="MozillaFirefox-31.8.0esr-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566339" comment="MozillaFirefox-translations-31.8.0esr-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566340" comment="libfreebl3-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566341" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566342" comment="libsoftokn3-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566343" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566344" comment="mozilla-nspr-4.10.8-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566345" comment="mozilla-nspr-32bit-4.10.8-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566346" comment="mozilla-nss-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566347" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566348" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2726</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2726" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2726" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2726" ref_url="https://www.suse.com/security/cve/CVE-2015-2726" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 39.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2726/">CVE-2015-2726</cve>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566338" comment="MozillaFirefox-31.8.0esr-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566339" comment="MozillaFirefox-translations-31.8.0esr-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566340" comment="libfreebl3-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566341" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566342" comment="libsoftokn3-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566343" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566344" comment="mozilla-nspr-4.10.8-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566345" comment="mozilla-nspr-32bit-4.10.8-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566346" comment="mozilla-nss-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566347" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566348" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2728</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2728" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2728" ref_url="https://www.suse.com/security/cve/CVE-2015-2728" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    The IndexedDatabaseManager class in the IndexedDB implementation in Mozilla Firefox before 39.0 and Firefox ESR 31.x before 31.8 and 38.x before 38.1 misinterprets an unspecified IDBDatabase field as a pointer, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via unspecified vectors, related to a "type confusion" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2728/">CVE-2015-2728</cve>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566338" comment="MozillaFirefox-31.8.0esr-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566339" comment="MozillaFirefox-translations-31.8.0esr-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566340" comment="libfreebl3-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566341" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566342" comment="libsoftokn3-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566343" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566344" comment="mozilla-nspr-4.10.8-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566345" comment="mozilla-nspr-32bit-4.10.8-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566346" comment="mozilla-nss-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566347" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566348" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2730</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2730" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2730" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2730" ref_url="https://www.suse.com/security/cve/CVE-2015-2730" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Mozilla Network Security Services (NSS) before 3.19.1, as used in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and other products, does not properly perform Elliptical Curve Cryptography (ECC) multiplications, which makes it easier for remote attackers to spoof ECDSA signatures via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2730/">CVE-2015-2730</cve>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566338" comment="MozillaFirefox-31.8.0esr-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566339" comment="MozillaFirefox-translations-31.8.0esr-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566340" comment="libfreebl3-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566341" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566342" comment="libsoftokn3-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566343" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566344" comment="mozilla-nspr-4.10.8-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566345" comment="mozilla-nspr-32bit-4.10.8-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566346" comment="mozilla-nss-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566347" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566348" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2733</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2733" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2733" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2733" ref_url="https://www.suse.com/security/cve/CVE-2015-2733" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the CanonicalizeXPCOMParticipant function in Mozilla Firefox before 39.0 and Firefox ESR 31.x before 31.8 and 38.x before 38.1 allows remote attackers to execute arbitrary code via vectors involving attachment of an XMLHttpRequest object to a dedicated worker.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2733/">CVE-2015-2733</cve>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566338" comment="MozillaFirefox-31.8.0esr-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566339" comment="MozillaFirefox-translations-31.8.0esr-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566340" comment="libfreebl3-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566341" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566342" comment="libsoftokn3-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566343" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566344" comment="mozilla-nspr-4.10.8-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566345" comment="mozilla-nspr-32bit-4.10.8-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566346" comment="mozilla-nss-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566347" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566348" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152734" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2734</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2734" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2734" ref_url="https://www.suse.com/security/cve/CVE-2015-2734" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    The CairoTextureClientD3D9::BorrowDrawTarget function in the Direct3D 9 implementation in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 reads data from uninitialized memory locations, which has unspecified impact and attack vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2734/">CVE-2015-2734</cve>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566338" comment="MozillaFirefox-31.8.0esr-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566339" comment="MozillaFirefox-translations-31.8.0esr-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566340" comment="libfreebl3-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566341" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566342" comment="libsoftokn3-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566343" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566344" comment="mozilla-nspr-4.10.8-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566345" comment="mozilla-nspr-32bit-4.10.8-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566346" comment="mozilla-nss-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566347" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566348" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2735</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2735" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2735" ref_url="https://www.suse.com/security/cve/CVE-2015-2735" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    nsZipArchive.cpp in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 accesses unintended memory locations, which allows remote attackers to have an unspecified impact via a crafted ZIP archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2735/">CVE-2015-2735</cve>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566338" comment="MozillaFirefox-31.8.0esr-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566339" comment="MozillaFirefox-translations-31.8.0esr-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566340" comment="libfreebl3-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566341" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566342" comment="libsoftokn3-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566343" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566344" comment="mozilla-nspr-4.10.8-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566345" comment="mozilla-nspr-32bit-4.10.8-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566346" comment="mozilla-nss-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566347" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566348" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2736</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2736" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2736" ref_url="https://www.suse.com/security/cve/CVE-2015-2736" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    The nsZipArchive::BuildFileList function in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 accesses unintended memory locations, which allows remote attackers to have an unspecified impact via a crafted ZIP archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2736/">CVE-2015-2736</cve>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566338" comment="MozillaFirefox-31.8.0esr-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566339" comment="MozillaFirefox-translations-31.8.0esr-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566340" comment="libfreebl3-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566341" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566342" comment="libsoftokn3-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566343" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566344" comment="mozilla-nspr-4.10.8-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566345" comment="mozilla-nspr-32bit-4.10.8-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566346" comment="mozilla-nss-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566347" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566348" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2737</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2737" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2737" ref_url="https://www.suse.com/security/cve/CVE-2015-2737" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    The rx::d3d11::SetBufferData function in the Direct3D 11 implementation in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 reads data from uninitialized memory locations, which has unspecified impact and attack vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2737/">CVE-2015-2737</cve>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566338" comment="MozillaFirefox-31.8.0esr-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566339" comment="MozillaFirefox-translations-31.8.0esr-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566340" comment="libfreebl3-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566341" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566342" comment="libsoftokn3-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566343" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566344" comment="mozilla-nspr-4.10.8-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566345" comment="mozilla-nspr-32bit-4.10.8-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566346" comment="mozilla-nss-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566347" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566348" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2738</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2738" ref_url="https://www.suse.com/security/cve/CVE-2015-2738" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    The YCbCrImageDataDeserializer::ToDataSourceSurface function in the YCbCr implementation in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 reads data from uninitialized memory locations, which has unspecified impact and attack vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2738/">CVE-2015-2738</cve>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566338" comment="MozillaFirefox-31.8.0esr-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566339" comment="MozillaFirefox-translations-31.8.0esr-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566340" comment="libfreebl3-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566341" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566342" comment="libsoftokn3-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566343" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566344" comment="mozilla-nspr-4.10.8-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566345" comment="mozilla-nspr-32bit-4.10.8-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566346" comment="mozilla-nss-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566347" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566348" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2739</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2739" ref_url="https://www.suse.com/security/cve/CVE-2015-2739" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    The ArrayBufferBuilder::append function in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 accesses unintended memory locations, which has unspecified impact and attack vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2739/">CVE-2015-2739</cve>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566338" comment="MozillaFirefox-31.8.0esr-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566339" comment="MozillaFirefox-translations-31.8.0esr-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566340" comment="libfreebl3-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566341" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566342" comment="libsoftokn3-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566343" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566344" comment="mozilla-nspr-4.10.8-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566345" comment="mozilla-nspr-32bit-4.10.8-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566346" comment="mozilla-nss-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566347" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566348" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2740</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2740" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2740" ref_url="https://www.suse.com/security/cve/CVE-2015-2740" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the nsXMLHttpRequest::AppendToResponseText function in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 might allow remote attackers to cause a denial of service or have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2740/">CVE-2015-2740</cve>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566338" comment="MozillaFirefox-31.8.0esr-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566339" comment="MozillaFirefox-translations-31.8.0esr-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566340" comment="libfreebl3-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566341" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566342" comment="libsoftokn3-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566343" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566344" comment="mozilla-nspr-4.10.8-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566345" comment="mozilla-nspr-32bit-4.10.8-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566346" comment="mozilla-nss-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566347" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566348" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2743</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2743" ref_url="https://www.suse.com/security/cve/CVE-2015-2743" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    PDF.js in Mozilla Firefox before 39.0 and Firefox ESR 31.x before 31.8 and 38.x before 38.1 enables excessive privileges for internal Workers, which might allow remote attackers to execute arbitrary code by leveraging a Same Origin Policy bypass.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2743/">CVE-2015-2743</cve>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566338" comment="MozillaFirefox-31.8.0esr-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566339" comment="MozillaFirefox-translations-31.8.0esr-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566340" comment="libfreebl3-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566341" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566342" comment="libsoftokn3-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566343" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566344" comment="mozilla-nspr-4.10.8-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566345" comment="mozilla-nspr-32bit-4.10.8-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566346" comment="mozilla-nss-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566347" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566348" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2751</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2751" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2751" ref_url="https://www.suse.com/security/cve/CVE-2015-2751" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0923-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1479-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1092-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00017.html" source="SUSE-SU"/>
    <description>
    Xen 4.3.x, 4.4.x, and 4.5.x, when using toolstack disaggregation, allows remote domains with partial management control to cause a denial of service (host lock) via unspecified domctl operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-2751/">CVE-2015-2751</cve>
	<bugzilla href="https://bugzilla.suse.com/922709">SUSE bug 922709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567180" comment="xen-4.2.5_12-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567181" comment="xen-doc-html-4.2.5_12-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567182" comment="xen-doc-pdf-4.2.5_12-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567183" comment="xen-kmp-default-4.2.5_12_3.0.101_0.47.55-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567184" comment="xen-kmp-pae-4.2.5_12_3.0.101_0.47.55-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567185" comment="xen-libs-4.2.5_12-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567186" comment="xen-libs-32bit-4.2.5_12-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567187" comment="xen-tools-4.2.5_12-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567188" comment="xen-tools-domU-4.2.5_12-15.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2756</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2756" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2756" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2756" ref_url="https://www.suse.com/security/cve/CVE-2015-2756" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001357.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0732-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1092-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00016.html" source="SUSE-SU"/>
    <description>
    QEMU, as used in Xen 3.3.x through 4.5.x, does not properly restrict access to PCI command registers, which might allow local HVM guest users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2756/">CVE-2015-2756</cve>
	<bugzilla href="https://bugzilla.suse.com/922706">SUSE bug 922706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567243" comment="xen-4.2.5_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567244" comment="xen-doc-html-4.2.5_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567245" comment="xen-doc-pdf-4.2.5_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567246" comment="xen-kmp-default-4.2.5_04_3.0.101_0.47.52-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567247" comment="xen-kmp-pae-4.2.5_04_3.0.101_0.47.52-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567248" comment="xen-libs-4.2.5_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567249" comment="xen-libs-32bit-4.2.5_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567250" comment="xen-tools-4.2.5_04-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567251" comment="xen-tools-domU-4.2.5_04-0.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2806</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2806" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2806" ref_url="https://www.suse.com/security/cve/CVE-2015-2806" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001791.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0854-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00010.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in asn1_der_decoding in libtasn1 before 4.4 allows remote attackers to have unspecified impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-13"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2806/">CVE-2015-2806</cve>
	<bugzilla href="https://bugzilla.suse.com/924828">SUSE bug 924828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929414">SUSE bug 929414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961491">SUSE bug 961491</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566607" comment="gnutls-2.4.1-24.39.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566608" comment="libgnutls26-2.4.1-24.39.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566609" comment="libgnutls26-32bit-2.4.1-24.39.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594005" comment="libtasn1-1.5-1.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594006" comment="libtasn1-3-1.5-1.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594007" comment="libtasn1-3-32bit-1.5-1.30.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566607" comment="gnutls-2.4.1-24.39.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566608" comment="libgnutls26-2.4.1-24.39.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566609" comment="libgnutls26-32bit-2.4.1-24.39.60.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2808</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2808" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2808" ref_url="https://www.suse.com/security/cve/CVE-2015-2808" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1073-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-4" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1161-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="TID7016694" ref_url="https://www.suse.com/support/kb/doc/?id=7016694" source="SUSE-SU"/>
		<reference ref_id="TID7017143" ref_url="https://www.suse.com/support/kb/doc/?id=7017143" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the "Bar Mitzvah" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2808/">CVE-2015-2808</cve>
	<bugzilla href="https://bugzilla.suse.com/925378">SUSE bug 925378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952088">SUSE bug 952088</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566643" comment="java-1_7_0-openjdk-1.7.0.85-0.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566644" comment="java-1_7_0-openjdk-demo-1.7.0.85-0.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566645" comment="java-1_7_0-openjdk-devel-1.7.0.85-0.11.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2830</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2830" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2830" ref_url="https://www.suse.com/security/cve/CVE-2015-2830" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1478-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1611-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001611.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
    <description>
    arch/x86/kernel/entry_64.S in the Linux kernel before 3.19.2 does not prevent the TS_COMPAT flag from reaching a user-mode task, which might allow local users to bypass the seccomp or audit protection mechanism via a crafted application that uses the (1) fork or (2) close system call, as demonstrated by an attack against seccomp before 3.16.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2830/">CVE-2015-2830</cve>
	<bugzilla href="https://bugzilla.suse.com/903967">SUSE bug 903967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926240">SUSE bug 926240</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566727" comment="kernel-bigsmp-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566728" comment="kernel-default-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566729" comment="kernel-default-base-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566730" comment="kernel-default-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566731" comment="kernel-default-extra-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566732" comment="kernel-pae-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566733" comment="kernel-pae-base-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566734" comment="kernel-pae-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566735" comment="kernel-pae-extra-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566736" comment="kernel-source-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566737" comment="kernel-syms-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566738" comment="kernel-trace-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566739" comment="kernel-xen-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566740" comment="kernel-xen-base-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566741" comment="kernel-xen-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566742" comment="kernel-xen-extra-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590534" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590535" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567338" comment="kernel-default-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567339" comment="kernel-default-base-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567340" comment="kernel-default-devel-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567341" comment="kernel-default-extra-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567342" comment="kernel-pae-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567343" comment="kernel-pae-base-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567344" comment="kernel-pae-devel-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567345" comment="kernel-pae-extra-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567346" comment="kernel-source-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567347" comment="kernel-syms-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567348" comment="kernel-trace-devel-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567349" comment="kernel-xen-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567350" comment="kernel-xen-base-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567351" comment="kernel-xen-devel-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567352" comment="kernel-xen-extra-3.0.101-65.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2922</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2922" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2922" ref_url="https://www.suse.com/security/cve/CVE-2015-2922" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1478-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
    <description>
    The ndisc_router_discovery function in net/ipv6/ndisc.c in the Neighbor Discovery (ND) protocol implementation in the IPv6 stack in the Linux kernel before 3.19.6 allows remote attackers to reconfigure a hop-limit setting via a small hop_limit value in a Router Advertisement (RA) message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2922/">CVE-2015-2922</cve>
	<bugzilla href="https://bugzilla.suse.com/903967">SUSE bug 903967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922583">SUSE bug 922583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926223">SUSE bug 926223</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593262" comment="kernel-default-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593263" comment="kernel-default-base-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593264" comment="kernel-default-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593265" comment="kernel-default-extra-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593266" comment="kernel-pae-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593267" comment="kernel-pae-base-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593268" comment="kernel-pae-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593269" comment="kernel-pae-extra-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593270" comment="kernel-source-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593271" comment="kernel-syms-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593272" comment="kernel-trace-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593273" comment="kernel-xen-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593274" comment="kernel-xen-base-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593275" comment="kernel-xen-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593276" comment="kernel-xen-extra-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590534" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590535" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2924</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2924" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2924" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2924" ref_url="https://www.suse.com/security/cve/CVE-2015-2924" source="SUSE CVE"/>
    <description>
    The receive_ra function in rdisc/nm-lndp-rdisc.c in the Neighbor Discovery (ND) protocol implementation in the IPv6 stack in NetworkManager 1.x allows remote attackers to reconfigure a hop-limit setting via a small hop_limit value in a Router Advertisement (RA) message, a similar issue to CVE-2015-2922.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2924/">CVE-2015-2924</cve>
	<bugzilla href="https://bugzilla.suse.com/926223">SUSE bug 926223</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333999" comment="NetworkManager is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2925</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2925" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2925" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2925" ref_url="https://www.suse.com/security/cve/CVE-2015-2925" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2194-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2292-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0335-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0337-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0380-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0381-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0383-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0384-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0434-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1842-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
    <description>
    The prepend_path function in fs/dcache.c in the Linux kernel before 4.2.4 does not properly handle rename actions inside a bind mount, which allows local users to bypass an intended container protection mechanism by renaming a directory, related to a "double-chroot attack."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2925/">CVE-2015-2925</cve>
	<bugzilla href="https://bugzilla.suse.com/926238">SUSE bug 926238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951625">SUSE bug 951625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951638">SUSE bug 951638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963994">SUSE bug 963994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3038</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3038" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3038" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3038" ref_url="https://www.suse.com/security/cve/CVE-2015-3038" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0722-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0723-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0347, CVE-2015-0350, CVE-2015-0352, CVE-2015-0353, CVE-2015-0354, CVE-2015-0355, CVE-2015-0360, CVE-2015-3041, CVE-2015-3042, and CVE-2015-3043.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3038/">CVE-2015-3038</cve>
	<bugzilla href="https://bugzilla.suse.com/927089">SUSE bug 927089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593875" comment="flash-player-11.2.202.457-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593876" comment="flash-player-gnome-11.2.202.457-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593877" comment="flash-player-kde4-11.2.202.457-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3039</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3039" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3039" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3039" ref_url="https://www.suse.com/security/cve/CVE-2015-3039" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0722-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0723-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0349, CVE-2015-0351, and CVE-2015-0358.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3039/">CVE-2015-3039</cve>
	<bugzilla href="https://bugzilla.suse.com/927089">SUSE bug 927089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593875" comment="flash-player-11.2.202.457-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593876" comment="flash-player-gnome-11.2.202.457-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593877" comment="flash-player-kde4-11.2.202.457-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3040</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3040" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3040" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3040" ref_url="https://www.suse.com/security/cve/CVE-2015-3040" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0722-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0723-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux does not properly restrict discovery of memory addresses, which allows attackers to bypass the ASLR protection mechanism via unspecified vectors, a different vulnerability than CVE-2015-0357.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3040/">CVE-2015-3040</cve>
	<bugzilla href="https://bugzilla.suse.com/927089">SUSE bug 927089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593875" comment="flash-player-11.2.202.457-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593876" comment="flash-player-gnome-11.2.202.457-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593877" comment="flash-player-kde4-11.2.202.457-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3041</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3041" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3041" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3041" ref_url="https://www.suse.com/security/cve/CVE-2015-3041" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0722-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0723-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0347, CVE-2015-0350, CVE-2015-0352, CVE-2015-0353, CVE-2015-0354, CVE-2015-0355, CVE-2015-0360, CVE-2015-3038, CVE-2015-3042, and CVE-2015-3043.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3041/">CVE-2015-3041</cve>
	<bugzilla href="https://bugzilla.suse.com/927089">SUSE bug 927089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593875" comment="flash-player-11.2.202.457-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593876" comment="flash-player-gnome-11.2.202.457-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593877" comment="flash-player-kde4-11.2.202.457-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3042</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3042" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3042" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3042" ref_url="https://www.suse.com/security/cve/CVE-2015-3042" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0722-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0723-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0347, CVE-2015-0350, CVE-2015-0352, CVE-2015-0353, CVE-2015-0354, CVE-2015-0355, CVE-2015-0360, CVE-2015-3038, CVE-2015-3041, and CVE-2015-3043.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3042/">CVE-2015-3042</cve>
	<bugzilla href="https://bugzilla.suse.com/927089">SUSE bug 927089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593875" comment="flash-player-11.2.202.457-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593876" comment="flash-player-gnome-11.2.202.457-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593877" comment="flash-player-kde4-11.2.202.457-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153043" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3043</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3043" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3043" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3043" ref_url="https://www.suse.com/security/cve/CVE-2015-3043" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0722-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0723-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, as exploited in the wild in April 2015, a different vulnerability than CVE-2015-0347, CVE-2015-0350, CVE-2015-0352, CVE-2015-0353, CVE-2015-0354, CVE-2015-0355, CVE-2015-0360, CVE-2015-3038, CVE-2015-3041, and CVE-2015-3042.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3043/">CVE-2015-3043</cve>
	<bugzilla href="https://bugzilla.suse.com/927089">SUSE bug 927089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593875" comment="flash-player-11.2.202.457-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593876" comment="flash-player-gnome-11.2.202.457-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593877" comment="flash-player-kde4-11.2.202.457-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3044</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3044" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3044" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3044" ref_url="https://www.suse.com/security/cve/CVE-2015-3044" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0722-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0723-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0878-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001384.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0890-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3044/">CVE-2015-3044</cve>
	<bugzilla href="https://bugzilla.suse.com/927089">SUSE bug 927089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930677">SUSE bug 930677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594015" comment="flash-player-11.2.202.460-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594016" comment="flash-player-gnome-11.2.202.460-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594017" comment="flash-player-kde4-11.2.202.460-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3077</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3077" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3077" ref_url="https://www.suse.com/security/cve/CVE-2015-3077" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0878-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001384.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0890-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK &amp; Compiler before 17.0.0.172 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2015-3084 and CVE-2015-3086.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3077/">CVE-2015-3077</cve>
	<bugzilla href="https://bugzilla.suse.com/930677">SUSE bug 930677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594015" comment="flash-player-11.2.202.460-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594016" comment="flash-player-gnome-11.2.202.460-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594017" comment="flash-player-kde4-11.2.202.460-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3078</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3078" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3078" ref_url="https://www.suse.com/security/cve/CVE-2015-3078" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0878-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001384.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0890-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK &amp; Compiler before 17.0.0.172 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-3089, CVE-2015-3090, and CVE-2015-3093.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3078/">CVE-2015-3078</cve>
	<bugzilla href="https://bugzilla.suse.com/930677">SUSE bug 930677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594015" comment="flash-player-11.2.202.460-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594016" comment="flash-player-gnome-11.2.202.460-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594017" comment="flash-player-kde4-11.2.202.460-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3079</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3079" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3079" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3079" ref_url="https://www.suse.com/security/cve/CVE-2015-3079" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0878-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001384.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0890-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK &amp; Compiler before 17.0.0.172 allow attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3079/">CVE-2015-3079</cve>
	<bugzilla href="https://bugzilla.suse.com/930677">SUSE bug 930677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594015" comment="flash-player-11.2.202.460-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594016" comment="flash-player-gnome-11.2.202.460-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594017" comment="flash-player-kde4-11.2.202.460-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3080</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3080" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3080" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3080" ref_url="https://www.suse.com/security/cve/CVE-2015-3080" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0878-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001384.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0890-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00016.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK &amp; Compiler before 17.0.0.172 allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3080/">CVE-2015-3080</cve>
	<bugzilla href="https://bugzilla.suse.com/930677">SUSE bug 930677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594015" comment="flash-player-11.2.202.460-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594016" comment="flash-player-gnome-11.2.202.460-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594017" comment="flash-player-kde4-11.2.202.460-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3081</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3081" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3081" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3081" ref_url="https://www.suse.com/security/cve/CVE-2015-3081" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0878-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001384.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0890-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00016.html" source="SUSE-SU"/>
    <description>
    Race condition in Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK &amp; Compiler before 17.0.0.172 allows attackers to bypass the Internet Explorer Protected Mode protection mechanism via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3081/">CVE-2015-3081</cve>
	<bugzilla href="https://bugzilla.suse.com/930677">SUSE bug 930677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594015" comment="flash-player-11.2.202.460-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594016" comment="flash-player-gnome-11.2.202.460-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594017" comment="flash-player-kde4-11.2.202.460-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153082" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3082</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3082" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3082" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3082" ref_url="https://www.suse.com/security/cve/CVE-2015-3082" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0878-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001384.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0890-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK &amp; Compiler before 17.0.0.172 allow remote attackers to bypass intended restrictions on filesystem write operations via unspecified vectors, a different vulnerability than CVE-2015-3083 and CVE-2015-3085.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3082/">CVE-2015-3082</cve>
	<bugzilla href="https://bugzilla.suse.com/930677">SUSE bug 930677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594015" comment="flash-player-11.2.202.460-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594016" comment="flash-player-gnome-11.2.202.460-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594017" comment="flash-player-kde4-11.2.202.460-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3083</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3083" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3083" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3083" ref_url="https://www.suse.com/security/cve/CVE-2015-3083" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0878-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001384.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0890-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK &amp; Compiler before 17.0.0.172 allow remote attackers to bypass intended restrictions on filesystem write operations via unspecified vectors, a different vulnerability than CVE-2015-3082 and CVE-2015-3085.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3083/">CVE-2015-3083</cve>
	<bugzilla href="https://bugzilla.suse.com/930677">SUSE bug 930677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594015" comment="flash-player-11.2.202.460-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594016" comment="flash-player-gnome-11.2.202.460-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594017" comment="flash-player-kde4-11.2.202.460-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153084" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3084</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3084" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3084" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3084" ref_url="https://www.suse.com/security/cve/CVE-2015-3084" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0878-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001384.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0890-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK &amp; Compiler before 17.0.0.172 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2015-3077 and CVE-2015-3086.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3084/">CVE-2015-3084</cve>
	<bugzilla href="https://bugzilla.suse.com/930677">SUSE bug 930677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594015" comment="flash-player-11.2.202.460-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594016" comment="flash-player-gnome-11.2.202.460-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594017" comment="flash-player-kde4-11.2.202.460-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3085</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3085" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3085" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3085" ref_url="https://www.suse.com/security/cve/CVE-2015-3085" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0878-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001384.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0890-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK &amp; Compiler before 17.0.0.172 allow remote attackers to bypass intended restrictions on filesystem write operations via unspecified vectors, a different vulnerability than CVE-2015-3082 and CVE-2015-3083.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3085/">CVE-2015-3085</cve>
	<bugzilla href="https://bugzilla.suse.com/930677">SUSE bug 930677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594015" comment="flash-player-11.2.202.460-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594016" comment="flash-player-gnome-11.2.202.460-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594017" comment="flash-player-kde4-11.2.202.460-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3086</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3086" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3086" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3086" ref_url="https://www.suse.com/security/cve/CVE-2015-3086" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0878-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001384.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0890-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK &amp; Compiler before 17.0.0.172 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2015-3077 and CVE-2015-3084.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3086/">CVE-2015-3086</cve>
	<bugzilla href="https://bugzilla.suse.com/930677">SUSE bug 930677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594015" comment="flash-player-11.2.202.460-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594016" comment="flash-player-gnome-11.2.202.460-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594017" comment="flash-player-kde4-11.2.202.460-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3087</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3087" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3087" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3087" ref_url="https://www.suse.com/security/cve/CVE-2015-3087" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0878-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001384.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0890-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00016.html" source="SUSE-SU"/>
    <description>
    Integer overflow in Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK &amp; Compiler before 17.0.0.172 allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3087/">CVE-2015-3087</cve>
	<bugzilla href="https://bugzilla.suse.com/930677">SUSE bug 930677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594015" comment="flash-player-11.2.202.460-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594016" comment="flash-player-gnome-11.2.202.460-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594017" comment="flash-player-kde4-11.2.202.460-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3088</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3088" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3088" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3088" ref_url="https://www.suse.com/security/cve/CVE-2015-3088" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0878-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001384.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0890-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00016.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK &amp; Compiler before 17.0.0.172 allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3088/">CVE-2015-3088</cve>
	<bugzilla href="https://bugzilla.suse.com/930677">SUSE bug 930677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594015" comment="flash-player-11.2.202.460-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594016" comment="flash-player-gnome-11.2.202.460-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594017" comment="flash-player-kde4-11.2.202.460-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3089</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3089" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3089" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3089" ref_url="https://www.suse.com/security/cve/CVE-2015-3089" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0878-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001384.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0890-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK &amp; Compiler before 17.0.0.172 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-3078, CVE-2015-3090, and CVE-2015-3093.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3089/">CVE-2015-3089</cve>
	<bugzilla href="https://bugzilla.suse.com/930677">SUSE bug 930677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594015" comment="flash-player-11.2.202.460-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594016" comment="flash-player-gnome-11.2.202.460-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594017" comment="flash-player-kde4-11.2.202.460-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3090</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3090" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3090" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3090" ref_url="https://www.suse.com/security/cve/CVE-2015-3090" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0878-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001384.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0890-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK &amp; Compiler before 17.0.0.172 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-3078, CVE-2015-3089, and CVE-2015-3093.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3090/">CVE-2015-3090</cve>
	<bugzilla href="https://bugzilla.suse.com/930677">SUSE bug 930677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594015" comment="flash-player-11.2.202.460-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594016" comment="flash-player-gnome-11.2.202.460-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594017" comment="flash-player-kde4-11.2.202.460-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3091</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3091" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3091" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3091" ref_url="https://www.suse.com/security/cve/CVE-2015-3091" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0878-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001384.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0890-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK &amp; Compiler before 17.0.0.172 do not properly restrict discovery of memory addresses, which allows attackers to bypass the ASLR protection mechanism via unspecified vectors, a different vulnerability than CVE-2015-3092.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3091/">CVE-2015-3091</cve>
	<bugzilla href="https://bugzilla.suse.com/930677">SUSE bug 930677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594015" comment="flash-player-11.2.202.460-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594016" comment="flash-player-gnome-11.2.202.460-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594017" comment="flash-player-kde4-11.2.202.460-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3092</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3092" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3092" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3092" ref_url="https://www.suse.com/security/cve/CVE-2015-3092" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0878-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001384.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0890-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK &amp; Compiler before 17.0.0.172 do not properly restrict discovery of memory addresses, which allows attackers to bypass the ASLR protection mechanism via unspecified vectors, a different vulnerability than CVE-2015-3091.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3092/">CVE-2015-3092</cve>
	<bugzilla href="https://bugzilla.suse.com/930677">SUSE bug 930677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594015" comment="flash-player-11.2.202.460-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594016" comment="flash-player-gnome-11.2.202.460-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594017" comment="flash-player-kde4-11.2.202.460-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3093</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3093" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3093" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3093" ref_url="https://www.suse.com/security/cve/CVE-2015-3093" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0878-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001384.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0890-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00016.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK &amp; Compiler before 17.0.0.172 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-3078, CVE-2015-3089, and CVE-2015-3090.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3093/">CVE-2015-3093</cve>
	<bugzilla href="https://bugzilla.suse.com/930677">SUSE bug 930677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594015" comment="flash-player-11.2.202.460-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594016" comment="flash-player-gnome-11.2.202.460-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594017" comment="flash-player-kde4-11.2.202.460-0.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3096</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3096" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3096" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3096" ref_url="https://www.suse.com/security/cve/CVE-2015-3096" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001440.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1047-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00011.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.292 and 14.x through 18.x before 18.0.0.160 on Windows and OS X and before 11.2.202.466 on Linux, Adobe AIR before 18.0.0.144 on Windows and before 18.0.0.143 on OS X and Android, Adobe AIR SDK before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, and Adobe AIR SDK &amp; Compiler before 18.0.0.144 on Windows and before 18.0.0.143 on OS X allow remote attackers to bypass a CVE-2014-5333 protection mechanism via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3096/">CVE-2015-3096</cve>
	<bugzilla href="https://bugzilla.suse.com/934088">SUSE bug 934088</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594018" comment="flash-player-11.2.202.466-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594019" comment="flash-player-gnome-11.2.202.466-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594020" comment="flash-player-kde4-11.2.202.466-0.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3098</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3098" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3098" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3098" ref_url="https://www.suse.com/security/cve/CVE-2015-3098" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001440.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1047-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00011.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.292 and 14.x through 18.x before 18.0.0.160 on Windows and OS X and before 11.2.202.466 on Linux, Adobe AIR before 18.0.0.144 on Windows and before 18.0.0.143 on OS X and Android, Adobe AIR SDK before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, and Adobe AIR SDK &amp; Compiler before 18.0.0.144 on Windows and before 18.0.0.143 on OS X allow remote attackers to bypass the Same Origin Policy via unspecified vectors, a different vulnerability than CVE-2015-3099 and CVE-2015-3102.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3098/">CVE-2015-3098</cve>
	<bugzilla href="https://bugzilla.suse.com/934088">SUSE bug 934088</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594018" comment="flash-player-11.2.202.466-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594019" comment="flash-player-gnome-11.2.202.466-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594020" comment="flash-player-kde4-11.2.202.466-0.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3099</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3099" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3099" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3099" ref_url="https://www.suse.com/security/cve/CVE-2015-3099" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001440.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1047-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00011.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.292 and 14.x through 18.x before 18.0.0.160 on Windows and OS X and before 11.2.202.466 on Linux, Adobe AIR before 18.0.0.144 on Windows and before 18.0.0.143 on OS X and Android, Adobe AIR SDK before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, and Adobe AIR SDK &amp; Compiler before 18.0.0.144 on Windows and before 18.0.0.143 on OS X allow remote attackers to bypass the Same Origin Policy via unspecified vectors, a different vulnerability than CVE-2015-3098 and CVE-2015-3102.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3099/">CVE-2015-3099</cve>
	<bugzilla href="https://bugzilla.suse.com/934088">SUSE bug 934088</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594018" comment="flash-player-11.2.202.466-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594019" comment="flash-player-gnome-11.2.202.466-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594020" comment="flash-player-kde4-11.2.202.466-0.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3100</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3100" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3100" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3100" ref_url="https://www.suse.com/security/cve/CVE-2015-3100" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001440.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1047-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00011.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in Adobe Flash Player before 13.0.0.292 and 14.x through 18.x before 18.0.0.160 on Windows and OS X and before 11.2.202.466 on Linux, Adobe AIR before 18.0.0.144 on Windows and before 18.0.0.143 on OS X and Android, Adobe AIR SDK before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, and Adobe AIR SDK &amp; Compiler before 18.0.0.144 on Windows and before 18.0.0.143 on OS X allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3100/">CVE-2015-3100</cve>
	<bugzilla href="https://bugzilla.suse.com/934088">SUSE bug 934088</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594018" comment="flash-player-11.2.202.466-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594019" comment="flash-player-gnome-11.2.202.466-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594020" comment="flash-player-kde4-11.2.202.466-0.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3102</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3102" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3102" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3102" ref_url="https://www.suse.com/security/cve/CVE-2015-3102" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001440.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1047-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00011.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.292 and 14.x through 18.x before 18.0.0.160 on Windows and OS X and before 11.2.202.466 on Linux, Adobe AIR before 18.0.0.144 on Windows and before 18.0.0.143 on OS X and Android, Adobe AIR SDK before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, and Adobe AIR SDK &amp; Compiler before 18.0.0.144 on Windows and before 18.0.0.143 on OS X allow remote attackers to bypass the Same Origin Policy via unspecified vectors, a different vulnerability than CVE-2015-3098 and CVE-2015-3099.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3102/">CVE-2015-3102</cve>
	<bugzilla href="https://bugzilla.suse.com/934088">SUSE bug 934088</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594018" comment="flash-player-11.2.202.466-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594019" comment="flash-player-gnome-11.2.202.466-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594020" comment="flash-player-kde4-11.2.202.466-0.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3103</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3103" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3103" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3103" ref_url="https://www.suse.com/security/cve/CVE-2015-3103" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001440.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1047-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00011.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.292 and 14.x through 18.x before 18.0.0.160 on Windows and OS X and before 11.2.202.466 on Linux, Adobe AIR before 18.0.0.144 on Windows and before 18.0.0.143 on OS X and Android, Adobe AIR SDK before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, and Adobe AIR SDK &amp; Compiler before 18.0.0.144 on Windows and before 18.0.0.143 on OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-3106 and CVE-2015-3107.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3103/">CVE-2015-3103</cve>
	<bugzilla href="https://bugzilla.suse.com/934088">SUSE bug 934088</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594018" comment="flash-player-11.2.202.466-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594019" comment="flash-player-gnome-11.2.202.466-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594020" comment="flash-player-kde4-11.2.202.466-0.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3106</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3106" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3106" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3106" ref_url="https://www.suse.com/security/cve/CVE-2015-3106" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001440.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1047-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00011.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.292 and 14.x through 18.x before 18.0.0.160 on Windows and OS X and before 11.2.202.466 on Linux, Adobe AIR before 18.0.0.144 on Windows and before 18.0.0.143 on OS X and Android, Adobe AIR SDK before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, and Adobe AIR SDK &amp; Compiler before 18.0.0.144 on Windows and before 18.0.0.143 on OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-3103 and CVE-2015-3107.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3106/">CVE-2015-3106</cve>
	<bugzilla href="https://bugzilla.suse.com/934088">SUSE bug 934088</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594018" comment="flash-player-11.2.202.466-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594019" comment="flash-player-gnome-11.2.202.466-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594020" comment="flash-player-kde4-11.2.202.466-0.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3107</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3107" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3107" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3107" ref_url="https://www.suse.com/security/cve/CVE-2015-3107" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1047-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.292 and 14.x through 18.x before 18.0.0.160 on Windows and OS X and before 11.2.202.466 on Linux, Adobe AIR before 18.0.0.144 on Windows and before 18.0.0.143 on OS X and Android, Adobe AIR SDK before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, and Adobe AIR SDK &amp; Compiler before 18.0.0.144 on Windows and before 18.0.0.143 on OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-3103 and CVE-2015-3106.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3107/">CVE-2015-3107</cve>
	<bugzilla href="https://bugzilla.suse.com/934088">SUSE bug 934088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566544" comment="flash-player-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566545" comment="flash-player-gnome-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566546" comment="flash-player-kde4-11.2.202.508-0.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3108</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3108" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3108" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3108" ref_url="https://www.suse.com/security/cve/CVE-2015-3108" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001440.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1047-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00011.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.292 and 14.x through 18.x before 18.0.0.160 on Windows and OS X and before 11.2.202.466 on Linux, Adobe AIR before 18.0.0.144 on Windows and before 18.0.0.143 on OS X and Android, Adobe AIR SDK before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, and Adobe AIR SDK &amp; Compiler before 18.0.0.144 on Windows and before 18.0.0.143 on OS X do not properly restrict discovery of memory addresses, which allows attackers to bypass the ASLR protection mechanism via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3108/">CVE-2015-3108</cve>
	<bugzilla href="https://bugzilla.suse.com/934088">SUSE bug 934088</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594018" comment="flash-player-11.2.202.466-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594019" comment="flash-player-gnome-11.2.202.466-0.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594020" comment="flash-player-kde4-11.2.202.466-0.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3113</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3113" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3113" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3113" ref_url="https://www.suse.com/security/cve/CVE-2015-3113" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1136-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001459.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00002.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Adobe Flash Player before 13.0.0.296 and 14.x through 18.x before 18.0.0.194 on Windows and OS X and before 11.2.202.468 on Linux allows remote attackers to execute arbitrary code via unspecified vectors, as exploited in the wild in June 2015.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3113/">CVE-2015-3113</cve>
	<bugzilla href="https://bugzilla.suse.com/935701">SUSE bug 935701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594021" comment="flash-player-11.2.202.468-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594022" comment="flash-player-gnome-11.2.202.468-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594023" comment="flash-player-kde4-11.2.202.468-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3114</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3114" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3114" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3114" ref_url="https://www.suse.com/security/cve/CVE-2015-3114" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allow attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3114/">CVE-2015-3114</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566538" comment="flash-player-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566539" comment="flash-player-gnome-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566540" comment="flash-player-kde4-11.2.202.481-0.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3115</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3115" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3115" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3115" ref_url="https://www.suse.com/security/cve/CVE-2015-3115" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allow remote attackers to bypass the Same Origin Policy via unspecified vectors, a different vulnerability than CVE-2014-0578, CVE-2015-3116, CVE-2015-3125, and CVE-2015-5116.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3115/">CVE-2015-3115</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566538" comment="flash-player-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566539" comment="flash-player-gnome-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566540" comment="flash-player-kde4-11.2.202.481-0.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3116</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3116" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3116" ref_url="https://www.suse.com/security/cve/CVE-2015-3116" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allow remote attackers to bypass the Same Origin Policy via unspecified vectors, a different vulnerability than CVE-2014-0578, CVE-2015-3115, CVE-2015-3125, and CVE-2015-5116.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3116/">CVE-2015-3116</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566538" comment="flash-player-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566539" comment="flash-player-gnome-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566540" comment="flash-player-kde4-11.2.202.481-0.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3117</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3117" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3117" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3117" ref_url="https://www.suse.com/security/cve/CVE-2015-3117" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-3123, CVE-2015-3130, CVE-2015-3133, CVE-2015-3134, and CVE-2015-4431.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3117/">CVE-2015-3117</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566538" comment="flash-player-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566539" comment="flash-player-gnome-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566540" comment="flash-player-kde4-11.2.202.481-0.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3118</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3118" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3118" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3118" ref_url="https://www.suse.com/security/cve/CVE-2015-3118" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-3124, CVE-2015-3127, CVE-2015-3128, CVE-2015-3129, CVE-2015-3131, CVE-2015-3132, CVE-2015-3136, CVE-2015-3137, CVE-2015-4428, CVE-2015-4430, and CVE-2015-5117.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3118/">CVE-2015-3118</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566538" comment="flash-player-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566539" comment="flash-player-gnome-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566540" comment="flash-player-kde4-11.2.202.481-0.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3119</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3119" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3119" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3119" ref_url="https://www.suse.com/security/cve/CVE-2015-3119" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2015-3120, CVE-2015-3121, CVE-2015-3122, and CVE-2015-4433.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3119/">CVE-2015-3119</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566538" comment="flash-player-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566539" comment="flash-player-gnome-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566540" comment="flash-player-kde4-11.2.202.481-0.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153120" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3120</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3120" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3120" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3120" ref_url="https://www.suse.com/security/cve/CVE-2015-3120" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2015-3119, CVE-2015-3121, CVE-2015-3122, and CVE-2015-4433.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3120/">CVE-2015-3120</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566538" comment="flash-player-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566539" comment="flash-player-gnome-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566540" comment="flash-player-kde4-11.2.202.481-0.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3121</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3121" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3121" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3121" ref_url="https://www.suse.com/security/cve/CVE-2015-3121" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2015-3119, CVE-2015-3120, CVE-2015-3122, and CVE-2015-4433.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3121/">CVE-2015-3121</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566538" comment="flash-player-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566539" comment="flash-player-gnome-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566540" comment="flash-player-kde4-11.2.202.481-0.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3122</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3122" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3122" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3122" ref_url="https://www.suse.com/security/cve/CVE-2015-3122" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2015-3119, CVE-2015-3120, CVE-2015-3121, and CVE-2015-4433.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3122/">CVE-2015-3122</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566538" comment="flash-player-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566539" comment="flash-player-gnome-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566540" comment="flash-player-kde4-11.2.202.481-0.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3123</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3123" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3123" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3123" ref_url="https://www.suse.com/security/cve/CVE-2015-3123" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-3117, CVE-2015-3130, CVE-2015-3133, CVE-2015-3134, and CVE-2015-4431.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3123/">CVE-2015-3123</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566538" comment="flash-player-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566539" comment="flash-player-gnome-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566540" comment="flash-player-kde4-11.2.202.481-0.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3124</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3124" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3124" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3124" ref_url="https://www.suse.com/security/cve/CVE-2015-3124" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-3118, CVE-2015-3127, CVE-2015-3128, CVE-2015-3129, CVE-2015-3131, CVE-2015-3132, CVE-2015-3136, CVE-2015-3137, CVE-2015-4428, CVE-2015-4430, and CVE-2015-5117.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3124/">CVE-2015-3124</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566538" comment="flash-player-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566539" comment="flash-player-gnome-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566540" comment="flash-player-kde4-11.2.202.481-0.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3125</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3125" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3125" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3125" ref_url="https://www.suse.com/security/cve/CVE-2015-3125" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allow remote attackers to bypass the Same Origin Policy via unspecified vectors, a different vulnerability than CVE-2014-0578, CVE-2015-3115, CVE-2015-3116, and CVE-2015-5116.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3125/">CVE-2015-3125</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566538" comment="flash-player-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566539" comment="flash-player-gnome-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566540" comment="flash-player-kde4-11.2.202.481-0.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3126</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3126" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3126" ref_url="https://www.suse.com/security/cve/CVE-2015-3126" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allow attackers to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via unknown vectors, a different vulnerability than CVE-2015-4429.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3126/">CVE-2015-3126</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566538" comment="flash-player-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566539" comment="flash-player-gnome-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566540" comment="flash-player-kde4-11.2.202.481-0.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3127</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3127" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3127" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3127" ref_url="https://www.suse.com/security/cve/CVE-2015-3127" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-3118, CVE-2015-3124, CVE-2015-3128, CVE-2015-3129, CVE-2015-3131, CVE-2015-3132, CVE-2015-3136, CVE-2015-3137, CVE-2015-4428, CVE-2015-4430, and CVE-2015-5117.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3127/">CVE-2015-3127</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566538" comment="flash-player-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566539" comment="flash-player-gnome-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566540" comment="flash-player-kde4-11.2.202.481-0.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3128</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3128" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3128" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3128" ref_url="https://www.suse.com/security/cve/CVE-2015-3128" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-3118, CVE-2015-3124, CVE-2015-3127, CVE-2015-3129, CVE-2015-3131, CVE-2015-3132, CVE-2015-3136, CVE-2015-3137, CVE-2015-4428, CVE-2015-4430, and CVE-2015-5117.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3128/">CVE-2015-3128</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566538" comment="flash-player-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566539" comment="flash-player-gnome-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566540" comment="flash-player-kde4-11.2.202.481-0.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3129</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3129" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3129" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3129" ref_url="https://www.suse.com/security/cve/CVE-2015-3129" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-3118, CVE-2015-3124, CVE-2015-3127, CVE-2015-3128, CVE-2015-3131, CVE-2015-3132, CVE-2015-3136, CVE-2015-3137, CVE-2015-4428, CVE-2015-4430, and CVE-2015-5117.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3129/">CVE-2015-3129</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566538" comment="flash-player-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566539" comment="flash-player-gnome-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566540" comment="flash-player-kde4-11.2.202.481-0.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3130</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3130" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3130" ref_url="https://www.suse.com/security/cve/CVE-2015-3130" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-3117, CVE-2015-3123, CVE-2015-3133, CVE-2015-3134, and CVE-2015-4431.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3130/">CVE-2015-3130</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566538" comment="flash-player-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566539" comment="flash-player-gnome-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566540" comment="flash-player-kde4-11.2.202.481-0.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3131</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3131" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3131" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3131" ref_url="https://www.suse.com/security/cve/CVE-2015-3131" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-3118, CVE-2015-3124, CVE-2015-3127, CVE-2015-3128, CVE-2015-3129, CVE-2015-3132, CVE-2015-3136, CVE-2015-3137, CVE-2015-4428, CVE-2015-4430, and CVE-2015-5117.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3131/">CVE-2015-3131</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566538" comment="flash-player-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566539" comment="flash-player-gnome-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566540" comment="flash-player-kde4-11.2.202.481-0.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3132</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3132" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3132" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3132" ref_url="https://www.suse.com/security/cve/CVE-2015-3132" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-3118, CVE-2015-3124, CVE-2015-3127, CVE-2015-3128, CVE-2015-3129, CVE-2015-3131, CVE-2015-3136, CVE-2015-3137, CVE-2015-4428, CVE-2015-4430, and CVE-2015-5117.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3132/">CVE-2015-3132</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566538" comment="flash-player-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566539" comment="flash-player-gnome-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566540" comment="flash-player-kde4-11.2.202.481-0.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3133</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3133" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3133" ref_url="https://www.suse.com/security/cve/CVE-2015-3133" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-3117, CVE-2015-3123, CVE-2015-3130, CVE-2015-3134, and CVE-2015-4431.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3133/">CVE-2015-3133</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566538" comment="flash-player-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566539" comment="flash-player-gnome-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566540" comment="flash-player-kde4-11.2.202.481-0.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3134</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3134" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3134" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3134" ref_url="https://www.suse.com/security/cve/CVE-2015-3134" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-3117, CVE-2015-3123, CVE-2015-3130, CVE-2015-3133, and CVE-2015-4431.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3134/">CVE-2015-3134</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566538" comment="flash-player-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566539" comment="flash-player-gnome-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566540" comment="flash-player-kde4-11.2.202.481-0.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3135</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3135" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3135" ref_url="https://www.suse.com/security/cve/CVE-2015-3135" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-4432 and CVE-2015-5118.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3135/">CVE-2015-3135</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566538" comment="flash-player-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566539" comment="flash-player-gnome-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566540" comment="flash-player-kde4-11.2.202.481-0.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3136</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3136" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3136" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3136" ref_url="https://www.suse.com/security/cve/CVE-2015-3136" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-3118, CVE-2015-3124, CVE-2015-3127, CVE-2015-3128, CVE-2015-3129, CVE-2015-3131, CVE-2015-3132, CVE-2015-3137, CVE-2015-4428, CVE-2015-4430, and CVE-2015-5117.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3136/">CVE-2015-3136</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566538" comment="flash-player-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566539" comment="flash-player-gnome-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566540" comment="flash-player-kde4-11.2.202.481-0.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3137</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3137" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3137" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3137" ref_url="https://www.suse.com/security/cve/CVE-2015-3137" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-3118, CVE-2015-3124, CVE-2015-3127, CVE-2015-3128, CVE-2015-3129, CVE-2015-3131, CVE-2015-3132, CVE-2015-3136, CVE-2015-4428, CVE-2015-4430, and CVE-2015-5117.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3137/">CVE-2015-3137</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566538" comment="flash-player-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566539" comment="flash-player-gnome-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566540" comment="flash-player-kde4-11.2.202.481-0.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3138</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3138" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3138" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3138" ref_url="https://www.suse.com/security/cve/CVE-2015-3138" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    print-wb.c in tcpdump before 4.7.4 allows remote attackers to cause a denial of service (segmentation fault and process crash).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3138/">CVE-2015-3138</cve>
	<bugzilla href="https://bugzilla.suse.com/927637">SUSE bug 927637</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333975" comment="tcpdump is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3143</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3143" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3143" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3143" ref_url="https://www.suse.com/security/cve/CVE-2015-3143" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001421.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0799-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-04/msg00057.html" source="SUSE-SU"/>
    <description>
    cURL and libcurl 7.10.6 through 7.41.0 does not properly re-use NTLM connections, which allows remote attackers to connect as other users via an unauthenticated request, a similar issue to CVE-2014-0015.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3143/">CVE-2015-3143</cve>
	<bugzilla href="https://bugzilla.suse.com/927556">SUSE bug 927556</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594024" comment="curl-7.19.7-1.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594025" comment="libcurl4-7.19.7-1.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594026" comment="libcurl4-32bit-7.19.7-1.42.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3144</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3144" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3144" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3144" ref_url="https://www.suse.com/security/cve/CVE-2015-3144" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001421.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0799-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-04/msg00057.html" source="SUSE-SU"/>
    <description>
    The fix_hostname function in cURL and libcurl 7.37.0 through 7.41.0 does not properly calculate an index, which allows remote attackers to cause a denial of service (out-of-bounds read or write and crash) or possibly have other unspecified impact via a zero-length host name, as demonstrated by "http://:80" and ":80."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3144/">CVE-2015-3144</cve>
	<bugzilla href="https://bugzilla.suse.com/927608">SUSE bug 927608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333977" comment="curl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3145</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3145" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3145" ref_url="https://www.suse.com/security/cve/CVE-2015-3145" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001421.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0799-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-04/msg00057.html" source="SUSE-SU"/>
    <description>
    The sanitize_cookie_path function in cURL and libcurl 7.31.0 through 7.41.0 does not properly calculate an index, which allows remote attackers to cause a denial of service (out-of-bounds write and crash) or possibly have other unspecified impact via a cookie path containing only a double-quote character.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3145/">CVE-2015-3145</cve>
	<bugzilla href="https://bugzilla.suse.com/927607">SUSE bug 927607</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333977" comment="curl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3146</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3146" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3146" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3146" ref_url="https://www.suse.com/security/cve/CVE-2015-3146" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1707-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001624.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0860-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00016.html" source="SUSE-SU"/>
    <description>
    The (1) SSH_MSG_NEWKEYS and (2) SSH_MSG_KEXDH_REPLY packet handlers in package_cb.c in libssh before 0.6.5 do not properly validate state, which allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted SSH packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3146/">CVE-2015-3146</cve>
	<bugzilla href="https://bugzilla.suse.com/928323">SUSE bug 928323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334173" comment="libssh is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3148</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3148" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3148" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3148" ref_url="https://www.suse.com/security/cve/CVE-2015-3148" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001421.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0799-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-04/msg00057.html" source="SUSE-SU"/>
    <description>
    cURL and libcurl 7.10.6 through 7.41.0 do not properly re-use authenticated Negotiate connections, which allows remote attackers to connect as other users via a request.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3148/">CVE-2015-3148</cve>
	<bugzilla href="https://bugzilla.suse.com/1092962">SUSE bug 1092962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927746">SUSE bug 927746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594024" comment="curl-7.19.7-1.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594025" comment="libcurl4-7.19.7-1.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594026" comment="libcurl4-32bit-7.19.7-1.42.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3152</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3152" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3152" ref_url="https://www.suse.com/security/cve/CVE-2015-3152" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1638-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
    <description>
    Oracle MySQL before 5.7.3, Oracle MySQL Connector/C (aka libmysqlclient) before 6.1.3, and MariaDB before 5.5.44 use the --ssl option to mean that SSL is optional, which allows man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack, aka a "BACKRONYM" attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3152/">CVE-2015-3152</cve>
	<bugzilla href="https://bugzilla.suse.com/1037590">SUSE bug 1037590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047059">SUSE bug 1047059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088681">SUSE bug 1088681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924663">SUSE bug 924663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928962">SUSE bug 928962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936407">SUSE bug 936407</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566972" comment="libmysql55client18-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566973" comment="libmysql55client18-32bit-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566974" comment="libmysql55client_r18-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566975" comment="libmysql55client_r18-32bit-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566976" comment="mysql-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566977" comment="mysql-client-5.5.45-0.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3153</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3153" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3153" ref_url="https://www.suse.com/security/cve/CVE-2015-3153" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001421.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0861-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00017.html" source="SUSE-SU"/>
    <description>
    The default configuration for cURL and libcurl before 7.42.1 sends custom HTTP headers to both the proxy and destination server, which might allow remote proxy servers to obtain sensitive information by reading the header contents.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3153/">CVE-2015-3153</cve>
	<bugzilla href="https://bugzilla.suse.com/928533">SUSE bug 928533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594024" comment="curl-7.19.7-1.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594025" comment="libcurl4-7.19.7-1.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594026" comment="libcurl4-32bit-7.19.7-1.42.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3165</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3165" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3165" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3165" ref_url="https://www.suse.com/security/cve/CVE-2015-3165" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001499.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in PostgreSQL before 9.0.20, 9.1.x before 9.1.16, 9.2.x before 9.2.11, 9.3.x before 9.3.7, and 9.4.x before 9.4.2 allows remote attackers to cause a denial of service (crash) by closing an SSL session at a time when the authentication timeout will expire during the session shutdown sequence.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3165/">CVE-2015-3165</cve>
	<bugzilla href="https://bugzilla.suse.com/931972">SUSE bug 931972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931973">SUSE bug 931973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931974">SUSE bug 931974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932040">SUSE bug 932040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567054" comment="postgresql91-9.1.18-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567055" comment="postgresql91-docs-9.1.18-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334044" comment="postgresql94 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3166</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3166" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3166" ref_url="https://www.suse.com/security/cve/CVE-2015-3166" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001499.html" source="SUSE-SU"/>
    <description>
    The snprintf implementation in PostgreSQL before 9.0.20, 9.1.x before 9.1.16, 9.2.x before 9.2.11, 9.3.x before 9.3.7, and 9.4.x before 9.4.2 does not properly handle system-call errors, which allows attackers to obtain sensitive information or have other unspecified impact via unknown vectors, as demonstrated by an out-of-memory error.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3166/">CVE-2015-3166</cve>
	<bugzilla href="https://bugzilla.suse.com/931972">SUSE bug 931972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931973">SUSE bug 931973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931974">SUSE bug 931974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932040">SUSE bug 932040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334044" comment="postgresql94 is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567054" comment="postgresql91-9.1.18-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567055" comment="postgresql91-docs-9.1.18-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334044" comment="postgresql94 is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3167</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3167" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3167" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3167" ref_url="https://www.suse.com/security/cve/CVE-2015-3167" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001499.html" source="SUSE-SU"/>
    <description>
    contrib/pgcrypto in PostgreSQL before 9.0.20, 9.1.x before 9.1.16, 9.2.x before 9.2.11, 9.3.x before 9.3.7, and 9.4.x before 9.4.2 uses different error responses when an incorrect key is used, which makes it easier for attackers to obtain the key via a brute force attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3167/">CVE-2015-3167</cve>
	<bugzilla href="https://bugzilla.suse.com/931972">SUSE bug 931972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931973">SUSE bug 931973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931974">SUSE bug 931974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932040">SUSE bug 932040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334044" comment="postgresql94 is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567054" comment="postgresql91-9.1.18-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567055" comment="postgresql91-docs-9.1.18-0.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334044" comment="postgresql94 is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3193</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3193" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3193" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3193" ref_url="https://www.suse.com/security/cve/CVE-2015-3193" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
    <description>
    The Montgomery squaring implementation in crypto/bn/asm/x86_64-mont5.pl in OpenSSL 1.0.2 before 1.0.2e on the x86_64 platform, as used by the BN_mod_exp function, mishandles carry propagation and produces incorrect output, which makes it easier for remote attackers to obtain sensitive private-key information via an attack against use of a (1) Diffie-Hellman (DH) or (2) Diffie-Hellman Ephemeral (DHE) ciphersuite.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3193/">CVE-2015-3193</cve>
	<bugzilla href="https://bugzilla.suse.com/1022086">SUSE bug 1022086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066242">SUSE bug 1066242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071906">SUSE bug 1071906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957814">SUSE bug 957814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960151">SUSE bug 960151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990370">SUSE bug 990370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3194</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3194" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3194" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3194" ref_url="https://www.suse.com/security/cve/CVE-2015-3194" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="TID7017046" ref_url="https://www.suse.com/support/kb/doc/?id=7017046" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2289-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2318-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0637-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1327-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1332-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html" source="SUSE-SU"/>
    <description>
    crypto/rsa/rsa_ameth.c in OpenSSL 1.0.1 before 1.0.1q and 1.0.2 before 1.0.2e allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an RSA PSS ASN.1 signature that lacks a mask generation function parameter.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3194/">CVE-2015-3194</cve>
	<bugzilla href="https://bugzilla.suse.com/957812">SUSE bug 957812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957815">SUSE bug 957815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958768">SUSE bug 958768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990370">SUSE bug 990370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3195</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3195" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3195" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3195" ref_url="https://www.suse.com/security/cve/CVE-2015-3195" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7014420" ref_url="https://www.suse.com/support/kb/doc/?id=7014420" source="SUSE-SU"/>
		<reference ref_id="TID7016875" ref_url="https://www.suse.com/support/kb/doc/?id=7016875" source="SUSE-SU"/>
		<reference ref_id="TID7017047" ref_url="https://www.suse.com/support/kb/doc/?id=7017047" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2289-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2318-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2349-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00103.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0637-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1327-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00073.html" source="SUSE-SU"/>
    <description>
    The ASN1_TFLG_COMBINE implementation in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zh, 1.0.0 before 1.0.0t, 1.0.1 before 1.0.1q, and 1.0.2 before 1.0.2e mishandles errors caused by malformed X509_ATTRIBUTE data, which allows remote attackers to obtain sensitive information from process memory by triggering a decoding failure in a PKCS#7 or CMS application.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3195/">CVE-2015-3195</cve>
	<bugzilla href="https://bugzilla.suse.com/923755">SUSE bug 923755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957812">SUSE bug 957812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957815">SUSE bug 957815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958768">SUSE bug 958768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963977">SUSE bug 963977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986238">SUSE bug 986238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566373" comment="compat-openssl097g-0.9.7g-146.22.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566374" comment="compat-openssl097g-32bit-0.9.7g-146.22.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567024" comment="libopenssl0_9_8-0.9.8j-0.80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567025" comment="libopenssl0_9_8-32bit-0.9.8j-0.80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567026" comment="openssl-0.9.8j-0.80.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3196</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3196" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3196" ref_url="https://www.suse.com/security/cve/CVE-2015-3196" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2289-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00071.html" source="SUSE-SU"/>
    <description>
    ssl/s3_clnt.c in OpenSSL 1.0.0 before 1.0.0t, 1.0.1 before 1.0.1p, and 1.0.2 before 1.0.2d, when used for a multi-threaded client, writes the PSK identity hint to an incorrect data structure, which allows remote servers to cause a denial of service (race condition and double free) via a crafted ServerKeyExchange message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3196/">CVE-2015-3196</cve>
	<bugzilla href="https://bugzilla.suse.com/957813">SUSE bug 957813</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3197</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3197" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3197" ref_url="https://www.suse.com/security/cve/CVE-2015-3197" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0617-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0624-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0631-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0641-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1057-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7017297" ref_url="https://www.suse.com/support/kb/doc?id=7017297" source="SUSE-SU"/>
		<reference ref_id="TID7017315" ref_url="https://www.suse.com/support/kb/doc/?id=7017315" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0362-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0442-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0628-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0637-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0720-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html" source="SUSE-SU"/>
    <description>
    ssl/s2_srvr.c in OpenSSL 1.0.1 before 1.0.1r and 1.0.2 before 1.0.2f does not prevent use of disabled ciphers, which makes it easier for man-in-the-middle attackers to defeat cryptographic protection mechanisms by performing computations on SSLv2 traffic, related to the get_client_master_key and get_client_hello functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3197/">CVE-2015-3197</cve>
	<bugzilla href="https://bugzilla.suse.com/963410">SUSE bug 963410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963415">SUSE bug 963415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968044">SUSE bug 968044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968046">SUSE bug 968046</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567311" comment="compat-openssl097g-0.9.7g-146.22.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567312" comment="compat-openssl097g-32bit-0.9.7g-146.22.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567420" comment="libopenssl0_9_8-0.9.8j-0.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567421" comment="libopenssl0_9_8-32bit-0.9.8j-0.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567422" comment="openssl-0.9.8j-0.89.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3202</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3202" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3202" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3202" ref_url="https://www.suse.com/security/cve/CVE-2015-3202" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001438.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0997-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-06/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1003-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-06/msg00007.html" source="SUSE-SU"/>
    <description>
    fusermount in FUSE before 2.9.3-15 does not properly clear the environment before invoking (1) mount or (2) umount as root, which allows local users to write to arbitrary files via a crafted LIBMOUNT_MTAB environment variable that is used by mount's debugging feature.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3202/">CVE-2015-3202</cve>
	<bugzilla href="https://bugzilla.suse.com/931452">SUSE bug 931452</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566569" comment="fuse-2.8.7-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566570" comment="libfuse2-2.8.7-0.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3209</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3209" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3209" ref_url="https://www.suse.com/security/cve/CVE-2015-3209" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1157-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1206-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1426-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1643-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="TID7016590" ref_url="https://www.suse.com/support/kb/doc?id=7016590" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1092-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00017.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3209/">CVE-2015-3209</cve>
	<bugzilla href="https://bugzilla.suse.com/932267">SUSE bug 932267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932770">SUSE bug 932770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932823">SUSE bug 932823</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594037" comment="kvm-1.4.2-0.22.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567252" comment="xen-4.2.5_08-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567253" comment="xen-doc-html-4.2.5_08-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567254" comment="xen-doc-pdf-4.2.5_08-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567255" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567256" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567257" comment="xen-libs-4.2.5_08-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567258" comment="xen-libs-32bit-4.2.5_08-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567259" comment="xen-tools-4.2.5_08-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567260" comment="xen-tools-domU-4.2.5_08-0.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3210</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3210" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3210" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3210" ref_url="https://www.suse.com/security/cve/CVE-2015-3210" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2805-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00076.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in PCRE 8.34 through 8.37 and PCRE2 10.10 allows remote attackers to execute arbitrary code via a crafted regular expression, as demonstrated by /^(?P=B)((?P=B)(?J:(?P&lt;B&gt;c)(?P&lt;B&gt;a(?P=B)))&gt;WGXCREDITS)/, a different vulnerability than CVE-2015-8384.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3210/">CVE-2015-3210</cve>
	<bugzilla href="https://bugzilla.suse.com/933288">SUSE bug 933288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957598">SUSE bug 957598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958373">SUSE bug 958373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334068" comment="pcre is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3213</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3213" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3213" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3213" ref_url="https://www.suse.com/security/cve/CVE-2015-3213" source="SUSE CVE"/>
    <description>
    The gesture handling code in Clutter before 1.16.2 allows physically proximate attackers to bypass the lock screen via certain (1) mouse or (2) touch gestures.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3213/">CVE-2015-3213</cve>
	<bugzilla href="https://bugzilla.suse.com/933927">SUSE bug 933927</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339308" comment="clutter is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3214</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3214" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3214" ref_url="https://www.suse.com/security/cve/CVE-2015-3214" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
    <description>
    The pit_ioport_read in i8254.c in the Linux kernel before 2.6.33 and QEMU before 2.3.1 does not distinguish between read lengths and write lengths, which might allow guest OS users to execute arbitrary code on the host OS by triggering use of an invalid index.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3214/">CVE-2015-3214</cve>
	<bugzilla href="https://bugzilla.suse.com/934069">SUSE bug 934069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936025">SUSE bug 936025</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334251" comment="kvm is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3216</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3216" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3216" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3216" ref_url="https://www.suse.com/security/cve/CVE-2015-3216" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1143-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1150-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1182-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1184-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1139-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html" source="SUSE-SU"/>
    <description>
    Race condition in a certain Red Hat patch to the PRNG lock implementation in the ssleay_rand_bytes function in OpenSSL, as distributed in openssl-1.0.1e-25.el7 in Red Hat Enterprise Linux (RHEL) 7 and other products, allows remote attackers to cause a denial of service (application crash) by establishing many TLS sessions to a multithreaded server, leading to use of a negative value for a certain length field.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3216/">CVE-2015-3216</cve>
	<bugzilla href="https://bugzilla.suse.com/933898">SUSE bug 933898</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593909" comment="libopenssl0_9_8-0.9.8j-0.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593910" comment="libopenssl0_9_8-32bit-0.9.8j-0.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593911" comment="openssl-0.9.8j-0.72.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3223</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3223" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3223" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3223" ref_url="https://www.suse.com/security/cve/CVE-2015-3223" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2354-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2356-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" source="SUSE-SU"/>
    <description>
    The ldb_wildcard_compare function in ldb_match.c in ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles certain zero values, which allows remote attackers to cause a denial of service (infinite loop) via crafted packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3223/">CVE-2015-3223</cve>
	<bugzilla href="https://bugzilla.suse.com/958581">SUSE bug 958581</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333940" comment="samba is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3236</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3236" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3236" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3236" ref_url="https://www.suse.com/security/cve/CVE-2015-3236" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:1135-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-06/msg00054.html" source="SUSE-SU"/>
    <description>
    cURL and libcurl 7.40.0 through 7.42.1 send the HTTP Basic authentication credentials for a previous connection when reusing a reset (curl_easy_reset) connection handle to send a request to the same host name, which allows remote attackers to obtain sensitive information via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3236/">CVE-2015-3236</cve>
	<bugzilla href="https://bugzilla.suse.com/934501">SUSE bug 934501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333977" comment="curl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3237</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3237" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3237" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3237" ref_url="https://www.suse.com/security/cve/CVE-2015-3237" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:1135-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-06/msg00054.html" source="SUSE-SU"/>
    <description>
    The smb_request_state function in cURL and libcurl 7.40.0 through 7.42.1 allows remote SMB servers to obtain sensitive information from memory or cause a denial of service (out-of-bounds read and crash) via crafted length and offset values.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3237/">CVE-2015-3237</cve>
	<bugzilla href="https://bugzilla.suse.com/934502">SUSE bug 934502</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333977" comment="curl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3255</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3255" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3255" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3255" ref_url="https://www.suse.com/security/cve/CVE-2015-3255" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001649.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1734-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1927-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00042.html" source="SUSE-SU"/>
    <description>
    The polkit_backend_action_pool_init function in polkitbackend/polkitbackendactionpool.c in PolicyKit (aka polkit) before 0.113 might allow local users to gain privileges via duplicate action IDs in action descriptions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3255/">CVE-2015-3255</cve>
	<bugzilla href="https://bugzilla.suse.com/939246">SUSE bug 939246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943816">SUSE bug 943816</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334253" comment="PolicyKit is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153259" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3259</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3259" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3259" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3259" ref_url="https://www.suse.com/security/cve/CVE-2015-3259" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1299-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1302-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1479-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001743.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2003-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2249-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00052.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the xl command line utility in Xen 4.1.x through 4.5.x allows local guest administrators to gain privileges via a long configuration argument.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3259/">CVE-2015-3259</cve>
	<bugzilla href="https://bugzilla.suse.com/935634">SUSE bug 935634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936281">SUSE bug 936281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937018">SUSE bug 937018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567180" comment="xen-4.2.5_12-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567181" comment="xen-doc-html-4.2.5_12-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567182" comment="xen-doc-pdf-4.2.5_12-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567183" comment="xen-kmp-default-4.2.5_12_3.0.101_0.47.55-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567184" comment="xen-kmp-pae-4.2.5_12_3.0.101_0.47.55-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567185" comment="xen-libs-4.2.5_12-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567186" comment="xen-libs-32bit-4.2.5_12-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567187" comment="xen-tools-4.2.5_12-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567188" comment="xen-tools-domU-4.2.5_12-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567451" comment="xen-4.4.2_10-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567452" comment="xen-doc-html-4.4.2_10-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567453" comment="xen-kmp-default-4.4.2_10_3.0.101_63-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567454" comment="xen-kmp-pae-4.4.2_10_3.0.101_63-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567455" comment="xen-libs-4.4.2_10-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567456" comment="xen-libs-32bit-4.4.2_10-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567457" comment="xen-tools-4.4.2_10-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567458" comment="xen-tools-domU-4.4.2_10-5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153276" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3276</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3276" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3276" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3276" ref_url="https://www.suse.com/security/cve/CVE-2015-3276" source="SUSE CVE"/>
    <description>
    The nss_parse_ciphers function in libraries/libldap/tls_m.c in OpenLDAP does not properly parse OpenSSL-style multi-keyword mode cipher strings, which might cause a weaker than intended cipher to be used and allow remote attackers to have unspecified impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3276/">CVE-2015-3276</cve>
	<bugzilla href="https://bugzilla.suse.com/938567">SUSE bug 938567</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336726" comment="openldap2-client is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3277</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3277" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3277" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3277" ref_url="https://www.suse.com/security/cve/CVE-2015-3277" source="SUSE CVE"/>
    <description>
    The mod_nss module before 1.0.11 in Fedora allows remote attackers to obtain cipher lists due to incorrect parsing of multi-keyword cipherstring.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3277/">CVE-2015-3277</cve>
	<bugzilla href="https://bugzilla.suse.com/938567">SUSE bug 938567</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336726" comment="openldap2-client is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153278" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3278</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3278" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3278" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3278" ref_url="https://www.suse.com/security/cve/CVE-2015-3278" source="SUSE CVE"/>
    <description>
    The cipherstring parsing code in nss_compat_ossl while in multi-keyword mode does not match the expected set of ciphers for a given cipher combination, which allows attackers to have unspecified impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3278/">CVE-2015-3278</cve>
	<bugzilla href="https://bugzilla.suse.com/938571">SUSE bug 938571</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338881" comment="mozilla-nss is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153294" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3294</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3294" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3294" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3294" ref_url="https://www.suse.com/security/cve/CVE-2015-3294" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0979-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2617-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0857-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00013.html" source="SUSE-SU"/>
    <description>
    The tcp_request function in Dnsmasq before 2.73rc4 does not properly handle the return value of the setup_reply function, which allows remote attackers to read process memory and cause a denial of service (out-of-bounds read and crash) via a malformed DNS request.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3294/">CVE-2015-3294</cve>
	<bugzilla href="https://bugzilla.suse.com/923144">SUSE bug 923144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928867">SUSE bug 928867</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594048" comment="dnsmasq-2.71-0.12.13.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153308" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3308</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3308" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3308" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3308" ref_url="https://www.suse.com/security/cve/CVE-2015-3308" source="SUSE CVE"/>
    <description>
    Double free vulnerability in lib/x509/x509_ext.c in GnuTLS before 3.3.14 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted CRL distribution point.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3308/">CVE-2015-3308</cve>
	<bugzilla href="https://bugzilla.suse.com/927411">SUSE bug 927411</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333974" comment="gnutls is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153331" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3331</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3331" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3331" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3331" ref_url="https://www.suse.com/security/cve/CVE-2015-3331" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1478-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1487-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1488-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1489-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1491-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00011.html" source="SUSE-SU"/>
    <description>
    The __driver_rfc4106_decrypt function in arch/x86/crypto/aesni-intel_glue.c in the Linux kernel before 3.19.3 does not properly determine the memory locations used for encrypted data, which allows context-dependent attackers to cause a denial of service (buffer overflow and system crash) or possibly execute arbitrary code by triggering a crypto API call, as demonstrated by use of a libkcapi test program with an AF_ALG(aead) socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-14"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3331/">CVE-2015-3331</cve>
	<bugzilla href="https://bugzilla.suse.com/927257">SUSE bug 927257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931231">SUSE bug 931231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939262">SUSE bug 939262</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593262" comment="kernel-default-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593263" comment="kernel-default-base-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593264" comment="kernel-default-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593265" comment="kernel-default-extra-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593266" comment="kernel-pae-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593267" comment="kernel-pae-base-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593268" comment="kernel-pae-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593269" comment="kernel-pae-extra-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593270" comment="kernel-source-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593271" comment="kernel-syms-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593272" comment="kernel-trace-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593273" comment="kernel-xen-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593274" comment="kernel-xen-base-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593275" comment="kernel-xen-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593276" comment="kernel-xen-extra-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590534" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590535" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3339</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3339" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3339" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3339" ref_url="https://www.suse.com/security/cve/CVE-2015-3339" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1487-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1488-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1489-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1491-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    Race condition in the prepare_binprm function in fs/exec.c in the Linux kernel before 3.19.6 allows local users to gain privileges by executing a setuid program at a time instant when a chown to root is in progress, and the ownership is changed but the setuid bit is not yet stripped.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-10"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3339/">CVE-2015-3339</cve>
	<bugzilla href="https://bugzilla.suse.com/903967">SUSE bug 903967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928130">SUSE bug 928130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939263">SUSE bug 939263</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593262" comment="kernel-default-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593263" comment="kernel-default-base-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593264" comment="kernel-default-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593265" comment="kernel-default-extra-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593266" comment="kernel-pae-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593267" comment="kernel-pae-base-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593268" comment="kernel-pae-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593269" comment="kernel-pae-extra-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593270" comment="kernel-source-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593271" comment="kernel-syms-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593272" comment="kernel-trace-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593273" comment="kernel-xen-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593274" comment="kernel-xen-base-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593275" comment="kernel-xen-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593276" comment="kernel-xen-extra-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590534" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590535" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3405</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3405" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3405" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3405" ref_url="https://www.suse.com/security/cve/CVE-2015-3405" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1173-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00000.html" source="SUSE-SU"/>
    <description>
    ntp-keygen in ntp 4.2.8px before 4.2.8p2-RC2 and 4.3.x before 4.3.12 does not generate MD5 keys with sufficient entropy on big endian machines when the lowest order byte of the temp variable is between 0x20 and 0x7f and not #, which might allow remote attackers to obtain the value of generated MD5 keys via a brute force attack with the 93 possible keys.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3405/">CVE-2015-3405</cve>
	<bugzilla href="https://bugzilla.suse.com/924202">SUSE bug 924202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928321">SUSE bug 928321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593919" comment="ntp-4.2.4p8-1.29.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593920" comment="ntp-doc-4.2.4p8-1.29.36.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3414</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3414" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3414" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3414" ref_url="https://www.suse.com/security/cve/CVE-2015-3414" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    SQLite before 3.8.9 does not properly implement the dequoting of collation-sequence names, which allows context-dependent attackers to cause a denial of service (uninitialized memory access and application crash) or possibly have unspecified other impact via a crafted COLLATE clause, as demonstrated by COLLATE"""""""" at the end of a SELECT statement.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-3414/">CVE-2015-3414</cve>
	<bugzilla href="https://bugzilla.suse.com/1085790">SUSE bug 1085790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190372">SUSE bug 1190372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193078">SUSE bug 1193078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928700">SUSE bug 928700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928701">SUSE bug 928701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928702">SUSE bug 928702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333981" comment="sqlite2 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3415</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3415" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3415" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3415" ref_url="https://www.suse.com/security/cve/CVE-2015-3415" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    The sqlite3VdbeExec function in vdbe.c in SQLite before 3.8.9 does not properly implement comparison operators, which allows context-dependent attackers to cause a denial of service (invalid free operation) or possibly have unspecified other impact via a crafted CHECK clause, as demonstrated by CHECK(0&amp;O&gt;O) in a CREATE TABLE statement.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-3415/">CVE-2015-3415</cve>
	<bugzilla href="https://bugzilla.suse.com/1190372">SUSE bug 1190372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928700">SUSE bug 928700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928701">SUSE bug 928701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928702">SUSE bug 928702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333981" comment="sqlite2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3416</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3416" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3416" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3416" ref_url="https://www.suse.com/security/cve/CVE-2015-3416" source="SUSE CVE"/>
    <description>
    The sqlite3VXPrintf function in printf.c in SQLite before 3.8.9 does not properly handle precision and width values during floating-point conversions, which allows context-dependent attackers to cause a denial of service (integer overflow and stack-based buffer overflow) or possibly have unspecified other impact via large integers in a crafted printf function call in a SELECT statement.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-29"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-3416/">CVE-2015-3416</cve>
	<bugzilla href="https://bugzilla.suse.com/1190372">SUSE bug 1190372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928700">SUSE bug 928700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928701">SUSE bug 928701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928702">SUSE bug 928702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333981" comment="sqlite2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3418</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3418" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3418" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3418" ref_url="https://www.suse.com/security/cve/CVE-2015-3418" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001456.html" source="SUSE-SU"/>
    <description>
    The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserver and xorg-server) before 1.16.4 allows attackers to cause a denial of service (divide-by-zero and crash) via a zero-height PutImage request.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-28"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3418/">CVE-2015-3418</cve>
	<bugzilla href="https://bugzilla.suse.com/928520">SUSE bug 928520</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594152" comment="xorg-x11-Xvnc-7.4-27.105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594153" comment="xorg-x11-server-7.4-27.105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594154" comment="xorg-x11-server-extra-7.4-27.105.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3451</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3451" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3451" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3451" ref_url="https://www.suse.com/security/cve/CVE-2015-3451" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001553.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1506-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-09/msg00006.html" source="SUSE-SU"/>
    <description>
    The _clone function in XML::LibXML before 2.0119 does not properly set the expand_entities option, which allows remote attackers to conduct XML external entity (XXE) attacks via crafted XML data to the (1) new or (2) load_xml function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3451/">CVE-2015-3451</cve>
	<bugzilla href="https://bugzilla.suse.com/929237">SUSE bug 929237</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334254" comment="perl-XML-LibXML is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3456</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3456" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3456" ref_url="https://www.suse.com/security/cve/CVE-2015-3456" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0889-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0889-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0923-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0927-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0929-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0940-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0943-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0944-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="TID7016497" ref_url="https://www.suse.com/support/kb/doc?id=7016497" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1092-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1400-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00021.html" source="SUSE-SU"/>
    <description>
    The Floppy Disk Controller (FDC) in QEMU, as used in Xen 4.5.x and earlier and KVM, allows local guest users to cause a denial of service (out-of-bounds write and guest crash) or possibly execute arbitrary code via the (1) FD_CMD_READ_ID, (2) FD_CMD_DRIVE_SPECIFICATION_COMMAND, or other unspecified commands, aka VENOM.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3456/">CVE-2015-3456</cve>
	<bugzilla href="https://bugzilla.suse.com/929339">SUSE bug 929339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932770">SUSE bug 932770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935900">SUSE bug 935900</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594162" comment="kvm-1.4.2-0.22.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567163" comment="xen-4.2.5_06-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567164" comment="xen-doc-html-4.2.5_06-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567165" comment="xen-doc-pdf-4.2.5_06-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567166" comment="xen-kmp-default-4.2.5_06_3.0.101_0.47.52-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567167" comment="xen-kmp-pae-4.2.5_06_3.0.101_0.47.52-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567168" comment="xen-libs-4.2.5_06-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567169" comment="xen-libs-32bit-4.2.5_06-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567170" comment="xen-tools-4.2.5_06-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567171" comment="xen-tools-domU-4.2.5_06-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3622</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3622" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3622" ref_url="https://www.suse.com/security/cve/CVE-2015-3622" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1372-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1674-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00097.html" source="SUSE-SU"/>
    <description>
    The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.5 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3622/">CVE-2015-3622</cve>
	<bugzilla href="https://bugzilla.suse.com/929414">SUSE bug 929414</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333974" comment="gnutls is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3636</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3636" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3636" ref_url="https://www.suse.com/security/cve/CVE-2015-3636" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1478-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1487-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1488-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1489-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1491-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
    <description>
    The ping_unhash function in net/ipv4/ping.c in the Linux kernel before 4.0.3 does not initialize a certain list data structure during an unhash operation, which allows local users to gain privileges or cause a denial of service (use-after-free and system crash) by leveraging the ability to make a SOCK_DGRAM socket system call for the IPPROTO_ICMP or IPPROTO_ICMPV6 protocol, and then making a connect system call after a disconnect.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3636/">CVE-2015-3636</cve>
	<bugzilla href="https://bugzilla.suse.com/929525">SUSE bug 929525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939277">SUSE bug 939277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994624">SUSE bug 994624</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593262" comment="kernel-default-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593263" comment="kernel-default-base-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593264" comment="kernel-default-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593265" comment="kernel-default-extra-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593266" comment="kernel-pae-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593267" comment="kernel-pae-base-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593268" comment="kernel-pae-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593269" comment="kernel-pae-extra-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593270" comment="kernel-source-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593271" comment="kernel-syms-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593272" comment="kernel-trace-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593273" comment="kernel-xen-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593274" comment="kernel-xen-base-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593275" comment="kernel-xen-devel-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593276" comment="kernel-xen-extra-3.0.101-0.47.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590534" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009590535" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3659</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3659" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3659" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3659" ref_url="https://www.suse.com/security/cve/CVE-2015-3659" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html" source="SUSE-SU"/>
    <description>
    The SQLite authorizer in the Storage functionality in WebKit in Apple Safari before 6.2.7, 7.x before 7.1.7, and 8.x before 8.0.7, as used in Apple iOS before 8.4 and other products, does not properly restrict access to SQL functions, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3659/">CVE-2015-3659</cve>
	<bugzilla href="https://bugzilla.suse.com/936835">SUSE bug 936835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936836">SUSE bug 936836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971460">SUSE bug 971460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333981" comment="sqlite2 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3717</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3717" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3717" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3717" ref_url="https://www.suse.com/security/cve/CVE-2015-3717" source="SUSE CVE"/>
    <description>
    Multiple buffer overflows in the printf functionality in SQLite, as used in Apple iOS before 8.4 and OS X before 10.10.4, allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3717/">CVE-2015-3717</cve>
	<bugzilla href="https://bugzilla.suse.com/936836">SUSE bug 936836</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333981" comment="sqlite2 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3811</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3811" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3811" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3811" ref_url="https://www.suse.com/security/cve/CVE-2015-3811" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001448.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0936-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0937-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00039.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-wcp.c in the WCP dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 improperly refers to previously processed bytes, which allows remote attackers to cause a denial of service (application crash) via a crafted packet, a different vulnerability than CVE-2015-2188.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3811/">CVE-2015-3811</cve>
	<bugzilla href="https://bugzilla.suse.com/930689">SUSE bug 930689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930691">SUSE bug 930691</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594173" comment="wireshark-1.10.14-0.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3812</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3812" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3812" ref_url="https://www.suse.com/security/cve/CVE-2015-3812" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001448.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0936-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0937-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00039.html" source="SUSE-SU"/>
    <description>
    Multiple memory leaks in the x11_init_protocol function in epan/dissectors/packet-x11.c in the X11 dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 allow remote attackers to cause a denial of service (memory consumption) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3812/">CVE-2015-3812</cve>
	<bugzilla href="https://bugzilla.suse.com/930689">SUSE bug 930689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930691">SUSE bug 930691</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594173" comment="wireshark-1.10.14-0.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3813</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3813" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3813" ref_url="https://www.suse.com/security/cve/CVE-2015-3813" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1676-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001625.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0936-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00038.html" source="SUSE-SU"/>
    <description>
    The fragment_add_work function in epan/reassemble.c in the packet-reassembly feature in Wireshark 1.12.x before 1.12.5 does not properly determine the defragmentation state in a case of an insufficient snapshot length, which allows remote attackers to cause a denial of service (memory consumption) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3813/">CVE-2015-3813</cve>
	<bugzilla href="https://bugzilla.suse.com/930689">SUSE bug 930689</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563893" comment="wireshark-1.12.7-0.5.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3814</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3814" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3814" ref_url="https://www.suse.com/security/cve/CVE-2015-3814" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001448.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0936-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0937-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00039.html" source="SUSE-SU"/>
    <description>
    The (1) dissect_tfs_request and (2) dissect_tfs_response functions in epan/dissectors/packet-ieee80211.c in the IEEE 802.11 dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 interpret a zero value as a length rather than an error condition, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3814/">CVE-2015-3814</cve>
	<bugzilla href="https://bugzilla.suse.com/930689">SUSE bug 930689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930691">SUSE bug 930691</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594173" comment="wireshark-1.10.14-0.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3885</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3885" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3885" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3885" ref_url="https://www.suse.com/security/cve/CVE-2015-3885" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003170.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0931-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00033.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the ljpeg_start function in dcraw 7.00 and earlier allows remote attackers to cause a denial of service (crash) via a crafted image, which triggers a buffer overflow, related to the len variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3885/">CVE-2015-3885</cve>
	<bugzilla href="https://bugzilla.suse.com/930683">SUSE bug 930683</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334257" comment="netpbm is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3900</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3900" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3900" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3900" ref_url="https://www.suse.com/security/cve/CVE-2015-3900" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1128-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00034.html" source="SUSE-SU"/>
    <description>
    RubyGems 2.0.x before 2.0.16, 2.2.x before 2.2.4, and 2.4.x before 2.4.7 does not validate the hostname when fetching gems or making API requests, which allows remote attackers to redirect requests to arbitrary domains via a crafted DNS SRV record, aka a "DNS hijack attack."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3900/">CVE-2015-3900</cve>
	<bugzilla href="https://bugzilla.suse.com/936032">SUSE bug 936032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334050" comment="ruby is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3991</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3991" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3991" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3991" ref_url="https://www.suse.com/security/cve/CVE-2015-3991" source="SUSE CVE"/>
    <description>
    strongSwan 5.2.2 and 5.3.0 allows remote attackers to cause a denial of service (daemon crash) or execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3991/">CVE-2015-3991</cve>
	<bugzilla href="https://bugzilla.suse.com/931272">SUSE bug 931272</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333984" comment="strongswan is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4000</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4000" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1143-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1150-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1177-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1177-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1181-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1182-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1183-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1184-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1185-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1547-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1663-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0224-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0262-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004209.html" source="SUSE-SU"/>
		<reference ref_id="TID7010166" ref_url="https://www.suse.com/support/kb/doc/?id=7010166" source="SUSE-SU"/>
		<reference ref_id="TID7016528" ref_url="https://www.suse.com/support/kb/doc/?id=7016528" source="SUSE-SU"/>
		<reference ref_id="TID7016529" ref_url="https://www.suse.com/support/kb/doc?id=7016529" source="SUSE-SU"/>
		<reference ref_id="TID7016539" ref_url="https://www.suse.com/support/kb/doc/?id=7016539" source="SUSE-SU"/>
		<reference ref_id="TID7016657" ref_url="https://www.suse.com/support/kb/doc/?id=7016657" source="SUSE-SU"/>
		<reference ref_id="TID7016694" ref_url="https://www.suse.com/support/kb/doc/?id=7016694" source="SUSE-SU"/>
		<reference ref_id="TID7016726" ref_url="https://www.suse.com/support/kb/doc/?id=7016726" source="SUSE-SU"/>
		<reference ref_id="TID7016795" ref_url="https://www.suse.com/support/kb/doc/?id=7016795" source="SUSE-SU"/>
		<reference ref_id="TID7021279" ref_url="https://www.suse.com/support/kb/doc/?id=7021279" source="SUSE-SU"/>
		<reference ref_id="TID7021300" ref_url="https://www.suse.com/support/kb/doc/?id=7021300" source="SUSE-SU"/>
		<reference ref_id="TID7021433" ref_url="https://www.suse.com/support/kb/doc/?id=7021433" source="SUSE-SU"/>
		<reference ref_id="TID7021435" ref_url="https://www.suse.com/support/kb/doc/?id=7021435" source="SUSE-SU"/>
		<reference ref_id="TID7021518" ref_url="https://www.suse.com/support/kb/doc/?id=7021518" source="SUSE-SU"/>
		<reference ref_id="TID7021676" ref_url="https://www.suse.com/support/kb/doc/?id=7021676" source="SUSE-SU"/>
		<reference ref_id="TID7021743" ref_url="https://www.suse.com/support/kb/doc/?id=7021743" source="SUSE-SU"/>
		<reference ref_id="TID7021744" ref_url="https://www.suse.com/support/kb/doc/?id=7021744" source="SUSE-SU"/>
		<reference ref_id="TID7021823" ref_url="https://www.suse.com/support/kb/doc/?id=7021823" source="SUSE-SU"/>
		<reference ref_id="TID7021836" ref_url="https://www.suse.com/support/kb/doc/?id=7021836" source="SUSE-SU"/>
		<reference ref_id="TID7021848" ref_url="https://www.suse.com/support/kb/doc/?id=7021848" source="SUSE-SU"/>
		<reference ref_id="TID7021978" ref_url="https://www.suse.com/support/kb/doc/?id=7021978" source="SUSE-SU"/>
		<reference ref_id="TID7021993" ref_url="https://www.suse.com/support/kb/doc/?id=7021993" source="SUSE-SU"/>
		<reference ref_id="TID7021994" ref_url="https://www.suse.com/support/kb/doc/?id=7021994" source="SUSE-SU"/>
		<reference ref_id="TID7021995" ref_url="https://www.suse.com/support/kb/doc/?id=7021995" source="SUSE-SU"/>
		<reference ref_id="TID7022026" ref_url="https://www.suse.com/support/kb/doc/?id=7022026" source="SUSE-SU"/>
		<reference ref_id="TID7022077" ref_url="https://www.suse.com/support/kb/doc/?id=7022077" source="SUSE-SU"/>
		<reference ref_id="TID7022095" ref_url="https://www.suse.com/support/kb/doc/?id=7022095" source="SUSE-SU"/>
		<reference ref_id="TID7022096" ref_url="https://www.suse.com/support/kb/doc/?id=7022096" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1139-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1209-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1684-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0261-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0478-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0483-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2267-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00034.html" source="SUSE-SU"/>
    <description>
    The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the "Logjam" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-15"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<bugzilla href="https://bugzilla.suse.com/1074631">SUSE bug 1074631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931600">SUSE bug 931600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931698">SUSE bug 931698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931723">SUSE bug 931723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931845">SUSE bug 931845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932026">SUSE bug 932026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932483">SUSE bug 932483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934789">SUSE bug 934789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935033">SUSE bug 935033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935540">SUSE bug 935540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937202">SUSE bug 937202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937766">SUSE bug 937766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938432">SUSE bug 938432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938905">SUSE bug 938905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938906">SUSE bug 938906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938913">SUSE bug 938913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938945">SUSE bug 938945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943664">SUSE bug 943664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944729">SUSE bug 944729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945582">SUSE bug 945582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955589">SUSE bug 955589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980406">SUSE bug 980406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990592">SUSE bug 990592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566338" comment="MozillaFirefox-31.8.0esr-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566339" comment="MozillaFirefox-translations-31.8.0esr-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566371" comment="compat-openssl097g-0.9.7g-146.22.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566372" comment="compat-openssl097g-32bit-0.9.7g-146.22.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566604" comment="gnutls-2.4.1-24.39.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566643" comment="java-1_7_0-openjdk-1.7.0.85-0.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566644" comment="java-1_7_0-openjdk-demo-1.7.0.85-0.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566645" comment="java-1_7_0-openjdk-devel-1.7.0.85-0.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566340" comment="libfreebl3-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566341" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566605" comment="libgnutls26-2.4.1-24.39.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566606" comment="libgnutls26-32bit-2.4.1-24.39.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567004" comment="libldap-2_4-2-2.4.26-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567005" comment="libldap-2_4-2-32bit-2.4.26-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594176" comment="libmysql55client18-5.5.43-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594177" comment="libmysql55client18-32bit-5.5.43-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594178" comment="libmysql55client_r18-5.5.43-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594179" comment="libmysql55client_r18-32bit-5.5.43-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594180" comment="libmysqlclient15-5.0.96-0.8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594181" comment="libmysqlclient15-32bit-5.0.96-0.8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594182" comment="libmysqlclient_r15-5.0.96-0.8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594183" comment="libmysqlclient_r15-32bit-5.0.96-0.8.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593909" comment="libopenssl0_9_8-0.9.8j-0.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593910" comment="libopenssl0_9_8-32bit-0.9.8j-0.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566342" comment="libsoftokn3-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566343" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566344" comment="mozilla-nspr-4.10.8-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566345" comment="mozilla-nspr-32bit-4.10.8-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566346" comment="mozilla-nss-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566347" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566348" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594184" comment="mysql-5.5.43-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594185" comment="mysql-client-5.5.43-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567006" comment="openldap2-client-2.4.26-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567018" comment="openssh-6.2p2-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567019" comment="openssh-askpass-6.2p2-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567020" comment="openssh-askpass-gnome-6.2p2-0.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593911" comment="openssl-0.9.8j-0.72.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566338" comment="MozillaFirefox-31.8.0esr-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566339" comment="MozillaFirefox-translations-31.8.0esr-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566604" comment="gnutls-2.4.1-24.39.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566643" comment="java-1_7_0-openjdk-1.7.0.85-0.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566644" comment="java-1_7_0-openjdk-demo-1.7.0.85-0.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566645" comment="java-1_7_0-openjdk-devel-1.7.0.85-0.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566340" comment="libfreebl3-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566341" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566605" comment="libgnutls26-2.4.1-24.39.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566606" comment="libgnutls26-32bit-2.4.1-24.39.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567004" comment="libldap-2_4-2-2.4.26-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567005" comment="libldap-2_4-2-32bit-2.4.26-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566342" comment="libsoftokn3-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566343" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566344" comment="mozilla-nspr-4.10.8-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566345" comment="mozilla-nspr-32bit-4.10.8-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566346" comment="mozilla-nss-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566347" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566348" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-0.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567006" comment="openldap2-client-2.4.26-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567414" comment="openssh-6.6p1-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567415" comment="openssh-askpass-gnome-6.6p1-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567416" comment="openssh-helpers-6.6p1-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4001</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4001" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4001" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4001" ref_url="https://www.suse.com/security/cve/CVE-2015-4001" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Integer signedness error in the oz_hcd_get_desc_cnf function in drivers/staging/ozwpan/ozhcd.c in the OZWPAN driver in the Linux kernel through 4.0.5 allows remote attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4001/">CVE-2015-4001</cve>
	<bugzilla href="https://bugzilla.suse.com/933934">SUSE bug 933934</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4002</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4002" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4002" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4002" ref_url="https://www.suse.com/security/cve/CVE-2015-4002" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
    <description>
    drivers/staging/ozwpan/ozusbsvc1.c in the OZWPAN driver in the Linux kernel through 4.0.5 does not ensure that certain length values are sufficiently large, which allows remote attackers to cause a denial of service (system crash or large loop) or possibly execute arbitrary code via a crafted packet, related to the (1) oz_usb_rx and (2) oz_usb_handle_ep_data functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4002/">CVE-2015-4002</cve>
	<bugzilla href="https://bugzilla.suse.com/933934">SUSE bug 933934</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4003</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4003" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4003" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4003" ref_url="https://www.suse.com/security/cve/CVE-2015-4003" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
    <description>
    The oz_usb_handle_ep_data function in drivers/staging/ozwpan/ozusbsvc1.c in the OZWPAN driver in the Linux kernel through 4.0.5 allows remote attackers to cause a denial of service (divide-by-zero error and system crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4003/">CVE-2015-4003</cve>
	<bugzilla href="https://bugzilla.suse.com/933934">SUSE bug 933934</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4004</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4004" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4004" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4004" ref_url="https://www.suse.com/security/cve/CVE-2015-4004" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
    <description>
    The OZWPAN driver in the Linux kernel through 4.0.5 relies on an untrusted length field during packet parsing, which allows remote attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read and system crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4004/">CVE-2015-4004</cve>
	<bugzilla href="https://bugzilla.suse.com/933934">SUSE bug 933934</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4020</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4020" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4020" ref_url="https://www.suse.com/security/cve/CVE-2015-4020" source="SUSE CVE"/>
    <description>
    RubyGems 2.0.x before 2.0.17, 2.2.x before 2.2.5, and 2.4.x before 2.4.8 does not validate the hostname when fetching gems or making API requests, which allows remote attackers to redirect requests to arbitrary domains via a crafted DNS SRV record with a domain that is suffixed with the original domain name, aka a "DNS hijack attack." NOTE: this vulnerability exists because to an incomplete fix for CVE-2015-3900.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4020/">CVE-2015-4020</cve>
	<bugzilla href="https://bugzilla.suse.com/936032">SUSE bug 936032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334050" comment="ruby is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154035" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4035</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4035" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4035" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4035" ref_url="https://www.suse.com/security/cve/CVE-2015-4035" source="SUSE CVE"/>
    <description>
    scripts/xzgrep.in in xzgrep 5.2.x before 5.2.0, before 5.0.0 does not properly process file names containing semicolons, which allows remote attackers to execute arbitrary code by having a user run xzgrep on a crafted file name.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4035/">CVE-2015-4035</cve>
	<bugzilla href="https://bugzilla.suse.com/931678">SUSE bug 931678</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338883" comment="xz is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154037" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4037</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4037" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4037" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4037" ref_url="https://www.suse.com/security/cve/CVE-2015-4037" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1952-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="TID7016590" ref_url="https://www.suse.com/support/kb/doc?id=7016590" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1965-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2003-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00023.html" source="SUSE-SU"/>
    <description>
    The slirp_smb function in net/slirp.c in QEMU 2.3.0 and earlier creates temporary files with predictable names, which allows local users to cause a denial of service (instantiation failure) by creating /tmp/qemu-smb.*-* files before the program.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4037/">CVE-2015-4037</cve>
	<bugzilla href="https://bugzilla.suse.com/932267">SUSE bug 932267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567189" comment="xen-4.2.5_14-18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567190" comment="xen-doc-html-4.2.5_14-18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567191" comment="xen-doc-pdf-4.2.5_14-18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567192" comment="xen-kmp-default-4.2.5_14_3.0.101_0.47.67-18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567193" comment="xen-kmp-pae-4.2.5_14_3.0.101_0.47.67-18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567194" comment="xen-libs-4.2.5_14-18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567195" comment="xen-libs-32bit-4.2.5_14-18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567196" comment="xen-tools-4.2.5_14-18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567197" comment="xen-tools-domU-4.2.5_14-18.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567459" comment="xen-4.4.3_02-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567460" comment="xen-doc-html-4.4.3_02-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567461" comment="xen-kmp-default-4.4.3_02_3.0.101_65-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567462" comment="xen-kmp-pae-4.4.3_02_3.0.101_65-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567463" comment="xen-libs-4.4.3_02-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567464" comment="xen-libs-32bit-4.4.3_02-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567465" comment="xen-tools-4.4.3_02-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567466" comment="xen-tools-domU-4.4.3_02-26.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4103</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4103" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4103" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4103" ref_url="https://www.suse.com/security/cve/CVE-2015-4103" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1157-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="TID7016590" ref_url="https://www.suse.com/support/kb/doc?id=7016590" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1092-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00017.html" source="SUSE-SU"/>
    <description>
    Xen 3.3.x through 4.5.x does not properly restrict write access to the host MSI message data field, which allows local x86 HVM guest administrators to cause a denial of service (host interrupt handling confusion) via vectors related to qemu and accessing spanning multiple fields.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4103/">CVE-2015-4103</cve>
	<bugzilla href="https://bugzilla.suse.com/931625">SUSE bug 931625</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567252" comment="xen-4.2.5_08-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567253" comment="xen-doc-html-4.2.5_08-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567254" comment="xen-doc-pdf-4.2.5_08-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567255" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567256" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567257" comment="xen-libs-4.2.5_08-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567258" comment="xen-libs-32bit-4.2.5_08-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567259" comment="xen-tools-4.2.5_08-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567260" comment="xen-tools-domU-4.2.5_08-0.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4104</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4104" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4104" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4104" ref_url="https://www.suse.com/security/cve/CVE-2015-4104" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1157-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="TID7016590" ref_url="https://www.suse.com/support/kb/doc?id=7016590" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1092-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00017.html" source="SUSE-SU"/>
    <description>
    Xen 3.3.x through 4.5.x does not properly restrict access to PCI MSI mask bits, which allows local x86 HVM guest users to cause a denial of service (unexpected interrupt and host crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4104/">CVE-2015-4104</cve>
	<bugzilla href="https://bugzilla.suse.com/931626">SUSE bug 931626</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567252" comment="xen-4.2.5_08-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567253" comment="xen-doc-html-4.2.5_08-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567254" comment="xen-doc-pdf-4.2.5_08-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567255" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567256" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567257" comment="xen-libs-4.2.5_08-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567258" comment="xen-libs-32bit-4.2.5_08-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567259" comment="xen-tools-4.2.5_08-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567260" comment="xen-tools-domU-4.2.5_08-0.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4105</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4105" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4105" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4105" ref_url="https://www.suse.com/security/cve/CVE-2015-4105" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1157-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="TID7016590" ref_url="https://www.suse.com/support/kb/doc?id=7016590" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1092-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00017.html" source="SUSE-SU"/>
    <description>
    Xen 3.3.x through 4.5.x enables logging for PCI MSI-X pass-through error messages, which allows local x86 HVM guests to cause a denial of service (host disk consumption) via certain invalid operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4105/">CVE-2015-4105</cve>
	<bugzilla href="https://bugzilla.suse.com/931627">SUSE bug 931627</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567252" comment="xen-4.2.5_08-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567253" comment="xen-doc-html-4.2.5_08-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567254" comment="xen-doc-pdf-4.2.5_08-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567255" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567256" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567257" comment="xen-libs-4.2.5_08-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567258" comment="xen-libs-32bit-4.2.5_08-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567259" comment="xen-tools-4.2.5_08-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567260" comment="xen-tools-domU-4.2.5_08-0.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4106</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4106" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4106" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4106" ref_url="https://www.suse.com/security/cve/CVE-2015-4106" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1157-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001743.html" source="SUSE-SU"/>
		<reference ref_id="TID7016590" ref_url="https://www.suse.com/support/kb/doc?id=7016590" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1092-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2249-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00052.html" source="SUSE-SU"/>
    <description>
    QEMU does not properly restrict write access to the PCI config space for certain PCI pass-through devices, which might allow local x86 HVM guests to gain privileges, cause a denial of service (host crash), obtain sensitive information, or possibly have other unspecified impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4106/">CVE-2015-4106</cve>
	<bugzilla href="https://bugzilla.suse.com/931628">SUSE bug 931628</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567252" comment="xen-4.2.5_08-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567253" comment="xen-doc-html-4.2.5_08-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567254" comment="xen-doc-pdf-4.2.5_08-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567255" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567256" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567257" comment="xen-libs-4.2.5_08-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567258" comment="xen-libs-32bit-4.2.5_08-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567259" comment="xen-tools-4.2.5_08-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567260" comment="xen-tools-domU-4.2.5_08-0.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4141</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4141" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4141" ref_url="https://www.suse.com/security/cve/CVE-2015-4141" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1030-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-06/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2357-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    The WPS UPnP function in hostapd, when using WPS AP, and wpa_supplicant, when using WPS external registrar (ER), 0.7.0 through 2.4 allows remote attackers to cause a denial of service (crash) via a negative chunk length, which triggers an out-of-bounds read or heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4141/">CVE-2015-4141</cve>
	<bugzilla href="https://bugzilla.suse.com/915323">SUSE bug 915323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930077">SUSE bug 930077</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567160" comment="wpa_supplicant-0.7.1-6.17.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567161" comment="wpa_supplicant-gui-0.7.1-6.17.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4142</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4142" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4142" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4142" ref_url="https://www.suse.com/security/cve/CVE-2015-4142" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1030-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-06/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2357-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    Integer underflow in the WMM Action frame parser in hostapd 0.5.5 through 2.4 and wpa_supplicant 0.7.0 through 2.4, when used for AP mode MLME/SME functionality, allows remote attackers to cause a denial of service (crash) via a crafted frame, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4142/">CVE-2015-4142</cve>
	<bugzilla href="https://bugzilla.suse.com/915323">SUSE bug 915323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930078">SUSE bug 930078</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567160" comment="wpa_supplicant-0.7.1-6.17.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567161" comment="wpa_supplicant-gui-0.7.1-6.17.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4143</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4143" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4143" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4143" ref_url="https://www.suse.com/security/cve/CVE-2015-4143" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1030-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-06/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2357-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted (1) Commit or (2) Confirm message payload.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4143/">CVE-2015-4143</cve>
	<bugzilla href="https://bugzilla.suse.com/930079">SUSE bug 930079</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334146" comment="wpa_supplicant is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4144</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4144" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4144" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4144" ref_url="https://www.suse.com/security/cve/CVE-2015-4144" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:2896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00083.html" source="SUSE-SU"/>
    <description>
    The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not validate that a message is long enough to contain the Total-Length field, which allows remote attackers to cause a denial of service (crash) via a crafted message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4144/">CVE-2015-4144</cve>
	<bugzilla href="https://bugzilla.suse.com/930079">SUSE bug 930079</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334146" comment="wpa_supplicant is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4145</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4145" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4145" ref_url="https://www.suse.com/security/cve/CVE-2015-4145" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:2896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00083.html" source="SUSE-SU"/>
    <description>
    The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not validate a fragment is already being processed, which allows remote attackers to cause a denial of service (memory leak) via a crafted message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4145/">CVE-2015-4145</cve>
	<bugzilla href="https://bugzilla.suse.com/930079">SUSE bug 930079</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334146" comment="wpa_supplicant is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4146</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4146" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4146" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4146" ref_url="https://www.suse.com/security/cve/CVE-2015-4146" source="SUSE CVE"/>
    <description>
    The EAP-pwd peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not clear the L (Length) and M (More) flags before determining if a response should be fragmented, which allows remote attackers to cause a denial of service (crash) via a crafted message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4146/">CVE-2015-4146</cve>
	<bugzilla href="https://bugzilla.suse.com/930079">SUSE bug 930079</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334146" comment="wpa_supplicant is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4163</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4163" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4163" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4163" ref_url="https://www.suse.com/security/cve/CVE-2015-4163" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1157-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="TID7016590" ref_url="https://www.suse.com/support/kb/doc?id=7016590" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1092-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00017.html" source="SUSE-SU"/>
    <description>
    GNTTABOP_swap_grant_ref in Xen 4.2 through 4.5 does not check the grant table operation version, which allows local guest domains to cause a denial of service (NULL pointer dereference) via a hypercall without a GNTTABOP_setup_table or GNTTABOP_set_version.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4163/">CVE-2015-4163</cve>
	<bugzilla href="https://bugzilla.suse.com/932790">SUSE bug 932790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567252" comment="xen-4.2.5_08-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567253" comment="xen-doc-html-4.2.5_08-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567254" comment="xen-doc-pdf-4.2.5_08-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567255" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567256" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567257" comment="xen-libs-4.2.5_08-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567258" comment="xen-libs-32bit-4.2.5_08-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567259" comment="xen-tools-4.2.5_08-0.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567260" comment="xen-tools-domU-4.2.5_08-0.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4164</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4164" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4164" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4164" ref_url="https://www.suse.com/security/cve/CVE-2015-4164" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1157-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1206-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1479-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1643-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="TID7016590" ref_url="https://www.suse.com/support/kb/doc?id=7016590" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1092-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00017.html" source="SUSE-SU"/>
    <description>
    The compat_iret function in Xen 3.1 through 4.5 iterates the wrong way through a loop, which allows local 32-bit PV guest administrators to cause a denial of service (large loop and system hang) via a hypercall_iret call with EFLAGS.VM set.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4164/">CVE-2015-4164</cve>
	<bugzilla href="https://bugzilla.suse.com/932996">SUSE bug 932996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567180" comment="xen-4.2.5_12-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567181" comment="xen-doc-html-4.2.5_12-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567182" comment="xen-doc-pdf-4.2.5_12-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567183" comment="xen-kmp-default-4.2.5_12_3.0.101_0.47.55-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567184" comment="xen-kmp-pae-4.2.5_12_3.0.101_0.47.55-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567185" comment="xen-libs-4.2.5_12-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567186" comment="xen-libs-32bit-4.2.5_12-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567187" comment="xen-tools-4.2.5_12-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567188" comment="xen-tools-domU-4.2.5_12-15.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4167</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4167" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4167" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4167" ref_url="https://www.suse.com/security/cve/CVE-2015-4167" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1611-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001611.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
    <description>
    The udf_read_inode function in fs/udf/inode.c in the Linux kernel before 3.19.1 does not validate certain length values, which allows local users to cause a denial of service (incorrect data representation or integer overflow, and OOPS) via a crafted UDF filesystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4167/">CVE-2015-4167</cve>
	<bugzilla href="https://bugzilla.suse.com/917839">SUSE bug 917839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933907">SUSE bug 933907</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566727" comment="kernel-bigsmp-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566728" comment="kernel-default-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566729" comment="kernel-default-base-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566730" comment="kernel-default-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566731" comment="kernel-default-extra-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566732" comment="kernel-pae-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566733" comment="kernel-pae-base-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566734" comment="kernel-pae-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566735" comment="kernel-pae-extra-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566736" comment="kernel-source-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566737" comment="kernel-syms-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566738" comment="kernel-trace-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566739" comment="kernel-xen-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566740" comment="kernel-xen-base-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566741" comment="kernel-xen-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566742" comment="kernel-xen-extra-3.0.101-0.47.67.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567338" comment="kernel-default-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567339" comment="kernel-default-base-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567340" comment="kernel-default-devel-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567341" comment="kernel-default-extra-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567342" comment="kernel-pae-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567343" comment="kernel-pae-base-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567344" comment="kernel-pae-devel-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567345" comment="kernel-pae-extra-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567346" comment="kernel-source-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567347" comment="kernel-syms-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567348" comment="kernel-trace-devel-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567349" comment="kernel-xen-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567350" comment="kernel-xen-base-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567351" comment="kernel-xen-devel-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567352" comment="kernel-xen-extra-3.0.101-65.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4171</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4171" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4171" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4171" ref_url="https://www.suse.com/security/cve/CVE-2015-4171" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001641.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1082-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-06/msg00040.html" source="SUSE-SU"/>
    <description>
    strongSwan 4.3.0 through 5.x before 5.3.2 and strongSwan VPN Client before 1.4.6, when using EAP or pre-shared keys for authenticating an IKEv2 connection, does not enforce server authentication restrictions until the entire authentication process is complete, which allows remote servers to obtain credentials by using a valid certificate and then reading the responses.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-4171/">CVE-2015-4171</cve>
	<bugzilla href="https://bugzilla.suse.com/931845">SUSE bug 931845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933591">SUSE bug 933591</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594206" comment="strongswan-4.4.0-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594207" comment="strongswan-doc-4.4.0-6.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4176</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4176" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4176" ref_url="https://www.suse.com/security/cve/CVE-2015-4176" source="SUSE CVE"/>
    <description>
    fs/namespace.c in the Linux kernel before 4.0.2 does not properly support mount connectivity, which allows local users to read arbitrary files by leveraging user-namespace root access for deletion of a file or directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4176/">CVE-2015-4176</cve>
	<bugzilla href="https://bugzilla.suse.com/933971">SUSE bug 933971</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4177</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4177" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4177" ref_url="https://www.suse.com/security/cve/CVE-2015-4177" source="SUSE CVE"/>
    <description>
    The collect_mounts function in fs/namespace.c in the Linux kernel before 4.0.5 does not properly consider that it may execute after a path has been unmounted, which allows local users to cause a denial of service (system crash) by leveraging user-namespace root access for an MNT_DETACH umount2 system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4177/">CVE-2015-4177</cve>
	<bugzilla href="https://bugzilla.suse.com/933969">SUSE bug 933969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933970">SUSE bug 933970</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4178</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4178" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4178" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4178" ref_url="https://www.suse.com/security/cve/CVE-2015-4178" source="SUSE CVE"/>
    <description>
    The fs_pin implementation in the Linux kernel before 4.0.5 does not ensure the internal consistency of a certain list data structure, which allows local users to cause a denial of service (system crash) by leveraging user-namespace root access for an MNT_DETACH umount2 system call, related to fs/fs_pin.c and include/linux/fs_pin.h.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4178/">CVE-2015-4178</cve>
	<bugzilla href="https://bugzilla.suse.com/933969">SUSE bug 933969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933970">SUSE bug 933970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933971">SUSE bug 933971</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4428</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4428" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4428" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4428" ref_url="https://www.suse.com/security/cve/CVE-2015-4428" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-3118, CVE-2015-3124, CVE-2015-3127, CVE-2015-3128, CVE-2015-3129, CVE-2015-3131, CVE-2015-3132, CVE-2015-3136, CVE-2015-3137, CVE-2015-4430, and CVE-2015-5117.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4428/">CVE-2015-4428</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566538" comment="flash-player-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566539" comment="flash-player-gnome-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566540" comment="flash-player-kde4-11.2.202.481-0.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4429</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4429" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4429" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4429" ref_url="https://www.suse.com/security/cve/CVE-2015-4429" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allow attackers to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via unknown vectors, a different vulnerability than CVE-2015-3126.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4429/">CVE-2015-4429</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566538" comment="flash-player-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566539" comment="flash-player-gnome-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566540" comment="flash-player-kde4-11.2.202.481-0.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4430</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4430" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4430" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4430" ref_url="https://www.suse.com/security/cve/CVE-2015-4430" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-3118, CVE-2015-3124, CVE-2015-3127, CVE-2015-3128, CVE-2015-3129, CVE-2015-3131, CVE-2015-3132, CVE-2015-3136, CVE-2015-3137, CVE-2015-4428, and CVE-2015-5117.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4430/">CVE-2015-4430</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566538" comment="flash-player-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566539" comment="flash-player-gnome-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566540" comment="flash-player-kde4-11.2.202.481-0.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4431</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4431" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4431" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4431" ref_url="https://www.suse.com/security/cve/CVE-2015-4431" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-3117, CVE-2015-3123, CVE-2015-3130, CVE-2015-3133, and CVE-2015-3134.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4431/">CVE-2015-4431</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566538" comment="flash-player-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566539" comment="flash-player-gnome-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566540" comment="flash-player-kde4-11.2.202.481-0.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4432</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4432" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4432" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4432" ref_url="https://www.suse.com/security/cve/CVE-2015-4432" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-3135 and CVE-2015-5118.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4432/">CVE-2015-4432</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566538" comment="flash-player-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566539" comment="flash-player-gnome-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566540" comment="flash-player-kde4-11.2.202.481-0.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4433</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4433" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4433" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4433" ref_url="https://www.suse.com/security/cve/CVE-2015-4433" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2015-3119, CVE-2015-3120, CVE-2015-3121, and CVE-2015-3122.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4433/">CVE-2015-4433</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566538" comment="flash-player-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566539" comment="flash-player-gnome-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566540" comment="flash-player-kde4-11.2.202.481-0.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4467</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4467" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4467" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4467" ref_url="https://www.suse.com/security/cve/CVE-2015-4467" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001776.html" source="SUSE-SU"/>
    <description>
    The chmd_init_decomp function in chmd.c in libmspack before 0.5 does not properly validate the reset interval, which allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted CHM file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-07"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4467/">CVE-2015-4467</cve>
	<bugzilla href="https://bugzilla.suse.com/934524">SUSE bug 934524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934525">SUSE bug 934525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934529">SUSE bug 934529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934533">SUSE bug 934533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566833" comment="libmspack0-0.0.20060920alpha-74.10.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4469</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4469" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4469" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4469" ref_url="https://www.suse.com/security/cve/CVE-2015-4469" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001776.html" source="SUSE-SU"/>
    <description>
    The chmd_read_headers function in chmd.c in libmspack before 0.5 does not validate name lengths, which allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted CHM file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-07"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4469/">CVE-2015-4469</cve>
	<bugzilla href="https://bugzilla.suse.com/934524">SUSE bug 934524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934526">SUSE bug 934526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934529">SUSE bug 934529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934533">SUSE bug 934533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566833" comment="libmspack0-0.0.20060920alpha-74.10.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4470</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4470" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4470" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4470" ref_url="https://www.suse.com/security/cve/CVE-2015-4470" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001776.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in the inflate function in mszipd.c in libmspack before 0.5 allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted CAB archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-07"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4470/">CVE-2015-4470</cve>
	<bugzilla href="https://bugzilla.suse.com/934527">SUSE bug 934527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934533">SUSE bug 934533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566370" comment="cabextract-1.2-2.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566833" comment="libmspack0-0.0.20060920alpha-74.10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4471</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4471" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4471" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4471" ref_url="https://www.suse.com/security/cve/CVE-2015-4471" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001776.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in the lzxd_decompress function in lzxd.c in libmspack before 0.5 allows remote attackers to cause a denial of service (buffer under-read and application crash) via a crafted CAB archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-07"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4471/">CVE-2015-4471</cve>
	<bugzilla href="https://bugzilla.suse.com/934528">SUSE bug 934528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934533">SUSE bug 934533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566370" comment="cabextract-1.2-2.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566833" comment="libmspack0-0.0.20060920alpha-74.10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4472</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4472" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4472" ref_url="https://www.suse.com/security/cve/CVE-2015-4472" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001776.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in the READ_ENCINT macro in chmd.c in libmspack before 0.5 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted CHM file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-07"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4472/">CVE-2015-4472</cve>
	<bugzilla href="https://bugzilla.suse.com/934525">SUSE bug 934525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934529">SUSE bug 934529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934533">SUSE bug 934533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566833" comment="libmspack0-0.0.20060920alpha-74.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334260" comment="cabextract is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4473</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4473" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4473" ref_url="https://www.suse.com/security/cve/CVE-2015-4473" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1476-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1453-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1454-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00031.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-21"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4473/">CVE-2015-4473</cve>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566522" comment="MozillaFirefox-38.2.1esr-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566523" comment="MozillaFirefox-branding-SLED-31.0-0.12.51 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566524" comment="MozillaFirefox-translations-38.2.1esr-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566525" comment="libfreebl3-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566526" comment="libfreebl3-32bit-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566527" comment="libsoftokn3-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566528" comment="libsoftokn3-32bit-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566529" comment="mozilla-nss-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566530" comment="mozilla-nss-32bit-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566531" comment="mozilla-nss-tools-3.19.2.0-0.16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154474" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4474</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4474" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4474" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4474" ref_url="https://www.suse.com/security/cve/CVE-2015-4474" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1476-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 40.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4474/">CVE-2015-4474</cve>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566522" comment="MozillaFirefox-38.2.1esr-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566523" comment="MozillaFirefox-branding-SLED-31.0-0.12.51 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566524" comment="MozillaFirefox-translations-38.2.1esr-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566525" comment="libfreebl3-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566526" comment="libfreebl3-32bit-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566527" comment="libsoftokn3-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566528" comment="libsoftokn3-32bit-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566529" comment="mozilla-nss-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566530" comment="mozilla-nss-32bit-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566531" comment="mozilla-nss-tools-3.19.2.0-0.16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4475</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4475" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4475" ref_url="https://www.suse.com/security/cve/CVE-2015-4475" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1476-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1453-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1454-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00031.html" source="SUSE-SU"/>
    <description>
    The mozilla::AudioSink function in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 mishandles inconsistent sample formats within MP3 audio data, which allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via a malformed file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-21"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4475/">CVE-2015-4475</cve>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566522" comment="MozillaFirefox-38.2.1esr-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566523" comment="MozillaFirefox-branding-SLED-31.0-0.12.51 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566524" comment="MozillaFirefox-translations-38.2.1esr-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566525" comment="libfreebl3-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566526" comment="libfreebl3-32bit-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566527" comment="libsoftokn3-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566528" comment="libsoftokn3-32bit-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566529" comment="mozilla-nss-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566530" comment="mozilla-nss-32bit-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566531" comment="mozilla-nss-tools-3.19.2.0-0.16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4478</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4478" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4478" ref_url="https://www.suse.com/security/cve/CVE-2015-4478" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1476-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1453-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1454-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00031.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 do not impose certain ECMAScript 6 requirements on JavaScript object properties, which allows remote attackers to bypass the Same Origin Policy via the reviver parameter to the JSON.parse method.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-06"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4478/">CVE-2015-4478</cve>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566522" comment="MozillaFirefox-38.2.1esr-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566523" comment="MozillaFirefox-branding-SLED-31.0-0.12.51 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566524" comment="MozillaFirefox-translations-38.2.1esr-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566525" comment="libfreebl3-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566526" comment="libfreebl3-32bit-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566527" comment="libsoftokn3-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566528" comment="libsoftokn3-32bit-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566529" comment="mozilla-nss-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566530" comment="mozilla-nss-32bit-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566531" comment="mozilla-nss-tools-3.19.2.0-0.16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4479</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4479" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4479" ref_url="https://www.suse.com/security/cve/CVE-2015-4479" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1476-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1453-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1454-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00031.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in libstagefright in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allow remote attackers to execute arbitrary code via a crafted saio chunk in MPEG-4 video data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-11"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4479/">CVE-2015-4479</cve>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566522" comment="MozillaFirefox-38.2.1esr-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566523" comment="MozillaFirefox-branding-SLED-31.0-0.12.51 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566524" comment="MozillaFirefox-translations-38.2.1esr-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566525" comment="libfreebl3-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566526" comment="libfreebl3-32bit-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566527" comment="libsoftokn3-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566528" comment="libsoftokn3-32bit-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566529" comment="mozilla-nss-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566530" comment="mozilla-nss-32bit-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566531" comment="mozilla-nss-tools-3.19.2.0-0.16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4484</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4484" ref_url="https://www.suse.com/security/cve/CVE-2015-4484" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1476-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1453-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1454-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00031.html" source="SUSE-SU"/>
    <description>
    The js::jit::AssemblerX86Shared::lock_addl function in the JavaScript implementation in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to cause a denial of service (application crash) by leveraging the use of shared memory and accessing (1) an Atomics object or (2) a SharedArrayBuffer object.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-23"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4484/">CVE-2015-4484</cve>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566522" comment="MozillaFirefox-38.2.1esr-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566523" comment="MozillaFirefox-branding-SLED-31.0-0.12.51 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566524" comment="MozillaFirefox-translations-38.2.1esr-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566525" comment="libfreebl3-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566526" comment="libfreebl3-32bit-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566527" comment="libsoftokn3-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566528" comment="libsoftokn3-32bit-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566529" comment="mozilla-nss-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566530" comment="mozilla-nss-32bit-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566531" comment="mozilla-nss-tools-3.19.2.0-0.16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4485</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4485" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4485" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4485" ref_url="https://www.suse.com/security/cve/CVE-2015-4485" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1476-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1453-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1454-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00031.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the resize_context_buffers function in libvpx in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to execute arbitrary code via malformed WebM video data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-21"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4485/">CVE-2015-4485</cve>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566522" comment="MozillaFirefox-38.2.1esr-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566523" comment="MozillaFirefox-branding-SLED-31.0-0.12.51 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566524" comment="MozillaFirefox-translations-38.2.1esr-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566525" comment="libfreebl3-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566526" comment="libfreebl3-32bit-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566527" comment="libsoftokn3-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566528" comment="libsoftokn3-32bit-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566529" comment="mozilla-nss-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566530" comment="mozilla-nss-32bit-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566531" comment="mozilla-nss-tools-3.19.2.0-0.16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4486</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4486" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4486" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4486" ref_url="https://www.suse.com/security/cve/CVE-2015-4486" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1476-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1453-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1454-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00031.html" source="SUSE-SU"/>
    <description>
    The decrease_ref_count function in libvpx in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via malformed WebM video data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-21"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4486/">CVE-2015-4486</cve>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566522" comment="MozillaFirefox-38.2.1esr-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566523" comment="MozillaFirefox-branding-SLED-31.0-0.12.51 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566524" comment="MozillaFirefox-translations-38.2.1esr-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566525" comment="libfreebl3-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566526" comment="libfreebl3-32bit-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566527" comment="libsoftokn3-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566528" comment="libsoftokn3-32bit-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566529" comment="mozilla-nss-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566530" comment="mozilla-nss-32bit-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566531" comment="mozilla-nss-tools-3.19.2.0-0.16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4487</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4487" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4487" ref_url="https://www.suse.com/security/cve/CVE-2015-4487" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1476-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1453-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1454-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00031.html" source="SUSE-SU"/>
    <description>
    The nsTSubstring::ReplacePrep function in Mozilla Firefox before 40.0, Firefox ESR 38.x before 38.2, and Firefox OS before 2.2 might allow remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors, related to an "overflow."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-21"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4487/">CVE-2015-4487</cve>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566522" comment="MozillaFirefox-38.2.1esr-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566523" comment="MozillaFirefox-branding-SLED-31.0-0.12.51 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566524" comment="MozillaFirefox-translations-38.2.1esr-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566525" comment="libfreebl3-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566526" comment="libfreebl3-32bit-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566527" comment="libsoftokn3-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566528" comment="libsoftokn3-32bit-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566529" comment="mozilla-nss-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566530" comment="mozilla-nss-32bit-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566531" comment="mozilla-nss-tools-3.19.2.0-0.16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4488</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4488" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4488" ref_url="https://www.suse.com/security/cve/CVE-2015-4488" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1476-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1453-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1454-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00031.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the StyleAnimationValue class in Mozilla Firefox before 40.0, Firefox ESR 38.x before 38.2, and Firefox OS before 2.2 allows remote attackers to have an unspecified impact by leveraging a StyleAnimationValue::operator self assignment.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-21"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4488/">CVE-2015-4488</cve>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566522" comment="MozillaFirefox-38.2.1esr-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566523" comment="MozillaFirefox-branding-SLED-31.0-0.12.51 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566524" comment="MozillaFirefox-translations-38.2.1esr-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566525" comment="libfreebl3-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566526" comment="libfreebl3-32bit-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566527" comment="libsoftokn3-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566528" comment="libsoftokn3-32bit-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566529" comment="mozilla-nss-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566530" comment="mozilla-nss-32bit-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566531" comment="mozilla-nss-tools-3.19.2.0-0.16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4489</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4489" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4489" ref_url="https://www.suse.com/security/cve/CVE-2015-4489" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1476-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1453-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1454-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00031.html" source="SUSE-SU"/>
    <description>
    The nsTArray_Impl class in Mozilla Firefox before 40.0, Firefox ESR 38.x before 38.2, and Firefox OS before 2.2 might allow remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging a self assignment.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-12"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4489/">CVE-2015-4489</cve>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566522" comment="MozillaFirefox-38.2.1esr-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566523" comment="MozillaFirefox-branding-SLED-31.0-0.12.51 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566524" comment="MozillaFirefox-translations-38.2.1esr-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566525" comment="libfreebl3-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566526" comment="libfreebl3-32bit-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566527" comment="libsoftokn3-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566528" comment="libsoftokn3-32bit-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566529" comment="mozilla-nss-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566530" comment="mozilla-nss-32bit-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566531" comment="mozilla-nss-tools-3.19.2.0-0.16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4491</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4491" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4491" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4491" ref_url="https://www.suse.com/security/cve/CVE-2015-4491" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1476-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2195-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004361.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1453-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1454-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1500-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2287-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00033.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the make_filter_table function in pixops/pixops.c in gdk-pixbuf before 2.31.5, as used in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 on Linux, Google Chrome on Linux, and other products, allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow and application crash) via crafted bitmap dimensions that are mishandled during scaling.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4491/">CVE-2015-4491</cve>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942801">SUSE bug 942801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948790">SUSE bug 948790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566522" comment="MozillaFirefox-38.2.1esr-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566523" comment="MozillaFirefox-branding-SLED-31.0-0.12.51 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566524" comment="MozillaFirefox-translations-38.2.1esr-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566630" comment="gtk2-2.18.9-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566631" comment="gtk2-32bit-2.18.9-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566632" comment="gtk2-lang-2.18.9-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566525" comment="libfreebl3-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566526" comment="libfreebl3-32bit-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566527" comment="libsoftokn3-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566528" comment="libsoftokn3-32bit-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566529" comment="mozilla-nss-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566530" comment="mozilla-nss-32bit-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566531" comment="mozilla-nss-tools-3.19.2.0-0.16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4492</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4492" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4492" ref_url="https://www.suse.com/security/cve/CVE-2015-4492" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1476-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1453-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1454-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00031.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the XMLHttpRequest::Open implementation in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 might allow remote attackers to execute arbitrary code via a SharedWorker object that makes recursive calls to the open method of an XMLHttpRequest object.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4492/">CVE-2015-4492</cve>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566522" comment="MozillaFirefox-38.2.1esr-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566523" comment="MozillaFirefox-branding-SLED-31.0-0.12.51 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566524" comment="MozillaFirefox-translations-38.2.1esr-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566525" comment="libfreebl3-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566526" comment="libfreebl3-32bit-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566527" comment="libsoftokn3-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566528" comment="libsoftokn3-32bit-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566529" comment="mozilla-nss-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566530" comment="mozilla-nss-32bit-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566531" comment="mozilla-nss-tools-3.19.2.0-0.16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4495</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4495" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4495" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4495" ref_url="https://www.suse.com/security/cve/CVE-2015-4495" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1379-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1380-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1476-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html" source="SUSE-SU"/>
    <description>
    The PDF reader in Mozilla Firefox before 39.0.3, Firefox ESR 38.x before 38.1.1, and Firefox OS before 2.2 allows remote attackers to bypass the Same Origin Policy, and read arbitrary files or gain privileges, via vectors involving crafted JavaScript code and a native setter, as exploited in the wild in August 2015.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4495/">CVE-2015-4495</cve>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940918">SUSE bug 940918</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566522" comment="MozillaFirefox-38.2.1esr-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566523" comment="MozillaFirefox-branding-SLED-31.0-0.12.51 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566524" comment="MozillaFirefox-translations-38.2.1esr-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566525" comment="libfreebl3-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566526" comment="libfreebl3-32bit-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566527" comment="libsoftokn3-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566528" comment="libsoftokn3-32bit-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566529" comment="mozilla-nss-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566530" comment="mozilla-nss-32bit-3.19.2.0-0.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566531" comment="mozilla-nss-tools-3.19.2.0-0.16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4500</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4500" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4500" ref_url="https://www.suse.com/security/cve/CVE-2015-4500" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1680-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1681-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00005.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4500/">CVE-2015-4500</cve>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566486" comment="MozillaFirefox-38.3.0esr-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566487" comment="MozillaFirefox-translations-38.3.0esr-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566484" comment="mozilla-nspr-4.10.9-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566485" comment="mozilla-nspr-32bit-4.10.9-11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4501</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4501" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4501" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4501" ref_url="https://www.suse.com/security/cve/CVE-2015-4501" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1680-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1681-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00005.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 41.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4501/">CVE-2015-4501</cve>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566486" comment="MozillaFirefox-38.3.0esr-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566487" comment="MozillaFirefox-translations-38.3.0esr-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566484" comment="mozilla-nspr-4.10.9-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566485" comment="mozilla-nspr-32bit-4.10.9-11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4506</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4506" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4506" ref_url="https://www.suse.com/security/cve/CVE-2015-4506" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1680-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1681-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00005.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the vp9_init_context_buffers function in libvpx, as used in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3, allows remote attackers to execute arbitrary code via a crafted VP9 file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4506/">CVE-2015-4506</cve>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566486" comment="MozillaFirefox-38.3.0esr-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566487" comment="MozillaFirefox-translations-38.3.0esr-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566484" comment="mozilla-nspr-4.10.9-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566485" comment="mozilla-nspr-32bit-4.10.9-11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4509</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4509" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4509" ref_url="https://www.suse.com/security/cve/CVE-2015-4509" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1680-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1681-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00005.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the HTMLVideoElement interface in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 allows remote attackers to execute arbitrary code via crafted JavaScript code that modifies the URI table of a media element, aka ZDI-CAN-3176.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4509/">CVE-2015-4509</cve>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566486" comment="MozillaFirefox-38.3.0esr-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566487" comment="MozillaFirefox-translations-38.3.0esr-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566484" comment="mozilla-nspr-4.10.9-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566485" comment="mozilla-nspr-32bit-4.10.9-11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4511</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4511" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4511" ref_url="https://www.suse.com/security/cve/CVE-2015-4511" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1680-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1681-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00005.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the nestegg_track_codec_data function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 allows remote attackers to execute arbitrary code via a crafted header in a WebM video.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4511/">CVE-2015-4511</cve>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566486" comment="MozillaFirefox-38.3.0esr-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566487" comment="MozillaFirefox-translations-38.3.0esr-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566484" comment="mozilla-nspr-4.10.9-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566485" comment="mozilla-nspr-32bit-4.10.9-11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4513</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4513" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4513" ref_url="https://www.suse.com/security/cve/CVE-2015-4513" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1926-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1978-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1981-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1942-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2229-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2245-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4513/">CVE-2015-4513</cve>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566488" comment="MozillaFirefox-38.4.0esr-25.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566489" comment="MozillaFirefox-branding-SLED-38-15.31 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566490" comment="MozillaFirefox-translations-38.4.0esr-25.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566491" comment="libfreebl3-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566492" comment="libfreebl3-32bit-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566493" comment="libsoftokn3-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566494" comment="libsoftokn3-32bit-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566495" comment="mozilla-nspr-4.10.10-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566496" comment="mozilla-nspr-32bit-4.10.10-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566497" comment="mozilla-nss-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566498" comment="mozilla-nss-32bit-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566499" comment="mozilla-nss-tools-3.19.2.1-19.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4517</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4517" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4517" ref_url="https://www.suse.com/security/cve/CVE-2015-4517" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1680-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1681-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00005.html" source="SUSE-SU"/>
    <description>
    NetworkUtils.cpp in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4517/">CVE-2015-4517</cve>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566486" comment="MozillaFirefox-38.3.0esr-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566487" comment="MozillaFirefox-translations-38.3.0esr-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566484" comment="mozilla-nspr-4.10.9-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566485" comment="mozilla-nspr-32bit-4.10.9-11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4519</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4519" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4519" ref_url="https://www.suse.com/security/cve/CVE-2015-4519" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1680-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1681-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00005.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 allow user-assisted remote attackers to bypass intended access restrictions and discover a redirect's target URL via crafted JavaScript code that executes after a drag-and-drop action of an image into a TEXTBOX element.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4519/">CVE-2015-4519</cve>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566486" comment="MozillaFirefox-38.3.0esr-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566487" comment="MozillaFirefox-translations-38.3.0esr-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566484" comment="mozilla-nspr-4.10.9-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566485" comment="mozilla-nspr-32bit-4.10.9-11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4520</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4520" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4520" ref_url="https://www.suse.com/security/cve/CVE-2015-4520" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1680-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1681-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00005.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 allow remote attackers to bypass CORS preflight protection mechanisms by leveraging (1) duplicate cache-key generation or (2) retrieval of a value from an incorrect HTTP Access-Control-* response header.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4520/">CVE-2015-4520</cve>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566486" comment="MozillaFirefox-38.3.0esr-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566487" comment="MozillaFirefox-translations-38.3.0esr-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566484" comment="mozilla-nspr-4.10.9-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566485" comment="mozilla-nspr-32bit-4.10.9-11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4521</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4521" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4521" ref_url="https://www.suse.com/security/cve/CVE-2015-4521" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1680-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1681-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00005.html" source="SUSE-SU"/>
    <description>
    The ConvertDialogOptions function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4521/">CVE-2015-4521</cve>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566486" comment="MozillaFirefox-38.3.0esr-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566487" comment="MozillaFirefox-translations-38.3.0esr-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566484" comment="mozilla-nspr-4.10.9-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566485" comment="mozilla-nspr-32bit-4.10.9-11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4522</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4522" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4522" ref_url="https://www.suse.com/security/cve/CVE-2015-4522" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1680-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1681-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00005.html" source="SUSE-SU"/>
    <description>
    The nsUnicodeToUTF8::GetMaxLength function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors, related to an "overflow."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4522/">CVE-2015-4522</cve>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566486" comment="MozillaFirefox-38.3.0esr-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566487" comment="MozillaFirefox-translations-38.3.0esr-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566484" comment="mozilla-nspr-4.10.9-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566485" comment="mozilla-nspr-32bit-4.10.9-11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4551</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4551" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4551" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4551" ref_url="https://www.suse.com/security/cve/CVE-2015-4551" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001841.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0588-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00156.html" source="SUSE-SU"/>
    <description>
    LibreOffice before 4.4.5 and Apache OpenOffice before 4.1.2 uses the stored LinkUpdateMode configuration information in OpenDocument Format files and templates when handling links, which might allow remote attackers to obtain sensitive information via a crafted document, which embeds data from local files into (1) Calc or (2) Writer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4551/">CVE-2015-4551</cve>
	<bugzilla href="https://bugzilla.suse.com/893141">SUSE bug 893141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934423">SUSE bug 934423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936188">SUSE bug 936188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936190">SUSE bug 936190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940838">SUSE bug 940838</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009564685" comment="google-carlito-fonts-1.1.03.beta1-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564687" comment="libhyphen0-2.8.8-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564688" comment="libmythes-1_2-0-1.2.4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564689" comment="libreoffice-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564690" comment="libreoffice-base-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564691" comment="libreoffice-base-drivers-postgresql-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564693" comment="libreoffice-calc-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564694" comment="libreoffice-calc-extensions-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564695" comment="libreoffice-draw-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564696" comment="libreoffice-filters-optional-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564697" comment="libreoffice-gnome-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564698" comment="libreoffice-icon-theme-galaxy-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564699" comment="libreoffice-icon-theme-tango-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564700" comment="libreoffice-impress-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564701" comment="libreoffice-kde4-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564702" comment="libreoffice-l10n-af-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564703" comment="libreoffice-l10n-ar-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564704" comment="libreoffice-l10n-ca-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564705" comment="libreoffice-l10n-cs-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564706" comment="libreoffice-l10n-da-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564707" comment="libreoffice-l10n-de-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564708" comment="libreoffice-l10n-en-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564709" comment="libreoffice-l10n-es-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564710" comment="libreoffice-l10n-fi-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564711" comment="libreoffice-l10n-fr-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564712" comment="libreoffice-l10n-gu-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564713" comment="libreoffice-l10n-hi-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564714" comment="libreoffice-l10n-hu-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564715" comment="libreoffice-l10n-it-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564716" comment="libreoffice-l10n-ja-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564717" comment="libreoffice-l10n-ko-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564718" comment="libreoffice-l10n-nb-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564719" comment="libreoffice-l10n-nl-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564720" comment="libreoffice-l10n-nn-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564721" comment="libreoffice-l10n-pl-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564722" comment="libreoffice-l10n-pt-BR-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564723" comment="libreoffice-l10n-pt-PT-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564724" comment="libreoffice-l10n-ru-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564725" comment="libreoffice-l10n-sk-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564726" comment="libreoffice-l10n-sv-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564727" comment="libreoffice-l10n-xh-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564728" comment="libreoffice-l10n-zh-Hans-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564729" comment="libreoffice-l10n-zh-Hant-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564730" comment="libreoffice-l10n-zu-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564731" comment="libreoffice-mailmerge-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564732" comment="libreoffice-math-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564733" comment="libreoffice-officebean-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564734" comment="libreoffice-pyuno-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564735" comment="libreoffice-sdk-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515206" comment="libreoffice-share-linker-1-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564736" comment="libreoffice-voikko-4.1-2.26 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564737" comment="libreoffice-writer-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564738" comment="libreoffice-writer-extensions-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564740" comment="libvoikko1-3.7.1-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564741" comment="myspell-af_NA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564742" comment="myspell-af_ZA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564743" comment="myspell-ar-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564744" comment="myspell-ar_AE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564745" comment="myspell-ar_BH-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564746" comment="myspell-ar_DZ-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564747" comment="myspell-ar_EG-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564748" comment="myspell-ar_IQ-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564749" comment="myspell-ar_JO-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564750" comment="myspell-ar_KW-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564751" comment="myspell-ar_LB-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564752" comment="myspell-ar_LY-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564753" comment="myspell-ar_MA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564754" comment="myspell-ar_OM-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564755" comment="myspell-ar_QA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564756" comment="myspell-ar_SA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564757" comment="myspell-ar_SD-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564758" comment="myspell-ar_SY-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564759" comment="myspell-ar_TN-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564760" comment="myspell-ar_YE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564761" comment="myspell-be_BY-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564762" comment="myspell-bg_BG-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564763" comment="myspell-bn_BD-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564764" comment="myspell-bn_IN-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564765" comment="myspell-bs-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564766" comment="myspell-bs_BA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564767" comment="myspell-ca-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564768" comment="myspell-ca_AD-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564769" comment="myspell-ca_ES-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564770" comment="myspell-ca_ES_valencia-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564771" comment="myspell-ca_FR-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564772" comment="myspell-ca_IT-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564773" comment="myspell-cs_CZ-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564774" comment="myspell-da_DK-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564775" comment="myspell-de-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564776" comment="myspell-de_AT-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564777" comment="myspell-de_CH-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564778" comment="myspell-de_DE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564779" comment="myspell-dictionaries-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564780" comment="myspell-el_GR-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564781" comment="myspell-en-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564782" comment="myspell-en_AU-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564783" comment="myspell-en_BS-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564784" comment="myspell-en_BZ-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564785" comment="myspell-en_CA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564786" comment="myspell-en_GB-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564787" comment="myspell-en_GH-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564788" comment="myspell-en_IE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564789" comment="myspell-en_IN-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564790" comment="myspell-en_JM-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564791" comment="myspell-en_MW-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564792" comment="myspell-en_NA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564793" comment="myspell-en_NZ-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564794" comment="myspell-en_PH-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564795" comment="myspell-en_TT-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564796" comment="myspell-en_US-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564797" comment="myspell-en_ZA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564798" comment="myspell-en_ZW-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564799" comment="myspell-es-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564800" comment="myspell-es_AR-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564801" comment="myspell-es_BO-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564802" comment="myspell-es_CL-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564803" comment="myspell-es_CO-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564804" comment="myspell-es_CR-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564805" comment="myspell-es_CU-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564806" comment="myspell-es_DO-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564807" comment="myspell-es_EC-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564808" comment="myspell-es_ES-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564809" comment="myspell-es_GT-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564810" comment="myspell-es_HN-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564811" comment="myspell-es_MX-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564812" comment="myspell-es_NI-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564813" comment="myspell-es_PA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564814" comment="myspell-es_PE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564815" comment="myspell-es_PR-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564816" comment="myspell-es_PY-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564817" comment="myspell-es_SV-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564818" comment="myspell-es_UY-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564819" comment="myspell-es_VE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564820" comment="myspell-et_EE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564821" comment="myspell-fr_BE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564822" comment="myspell-fr_CA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564823" comment="myspell-fr_CH-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564824" comment="myspell-fr_FR-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564825" comment="myspell-fr_LU-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564826" comment="myspell-fr_MC-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564827" comment="myspell-gu_IN-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564828" comment="myspell-he_IL-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564829" comment="myspell-hi_IN-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564830" comment="myspell-hr_HR-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564831" comment="myspell-hu_HU-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564832" comment="myspell-it_IT-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564833" comment="myspell-lightproof-en-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564834" comment="myspell-lightproof-hu_HU-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564835" comment="myspell-lightproof-pt_BR-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564836" comment="myspell-lightproof-ru_RU-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564837" comment="myspell-lo_LA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564838" comment="myspell-lt_LT-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564839" comment="myspell-lv_LV-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564840" comment="myspell-nb_NO-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564841" comment="myspell-nl_BE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564842" comment="myspell-nl_NL-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564843" comment="myspell-nn_NO-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564844" comment="myspell-no-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564845" comment="myspell-pl_PL-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564846" comment="myspell-pt_AO-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564847" comment="myspell-pt_BR-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564848" comment="myspell-pt_PT-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564849" comment="myspell-ro-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564850" comment="myspell-ro_RO-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564851" comment="myspell-ru_RU-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564852" comment="myspell-sk_SK-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564853" comment="myspell-sl_SI-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564854" comment="myspell-sr-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564855" comment="myspell-sr_CS-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564856" comment="myspell-sr_Latn_CS-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564857" comment="myspell-sr_Latn_RS-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564858" comment="myspell-sr_RS-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564859" comment="myspell-sv_FI-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564860" comment="myspell-sv_SE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564861" comment="myspell-te-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564862" comment="myspell-te_IN-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564863" comment="myspell-th_TH-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564864" comment="myspell-vi-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564865" comment="myspell-vi_VN-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564866" comment="myspell-zu_ZA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564868" comment="python-importlib-1.0.2-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4588</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4588" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4588" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4588" ref_url="https://www.suse.com/security/cve/CVE-2015-4588" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001569.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1132-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1134-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-06/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1212-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the DecodeImage function in libwmf 0.2.8.4 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted "run-length count" in an image in a WMF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4588/">CVE-2015-4588</cve>
	<bugzilla href="https://bugzilla.suse.com/933109">SUSE bug 933109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566932" comment="libwmf-0.2.8.4-206.29.29.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4620</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4620" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4620" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4620" ref_url="https://www.suse.com/security/cve/CVE-2015-4620" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1205-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1250-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1250-2" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00050.html" source="SUSE-SU"/>
    <description>
    name.c in named in ISC BIND 9.7.x through 9.9.x before 9.9.7-P1 and 9.10.x before 9.10.2-P2, when configured as a recursive resolver with DNSSEC validation, allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) by constructing crafted zone data and then making a query for a name in that zone.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4620/">CVE-2015-4620</cve>
	<bugzilla href="https://bugzilla.suse.com/936476">SUSE bug 936476</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009593894" comment="bind-libs-9.9.6P1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593895" comment="bind-libs-32bit-9.9.6P1-0.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009593896" comment="bind-utils-9.9.6P1-0.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4652</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4652" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4652" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4652" ref_url="https://www.suse.com/security/cve/CVE-2015-4652" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1676-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001610.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1215-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-gsm_a_dtap.c in the GSM DTAP dissector in Wireshark 1.12.x before 1.12.6 does not properly validate digit characters, which allows remote attackers to cause a denial of service (application crash) via a crafted packet, related to the de_emerg_num_list and de_bcd_num functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-4652/">CVE-2015-4652</cve>
	<bugzilla href="https://bugzilla.suse.com/935158">SUSE bug 935158</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563893" comment="wireshark-1.12.7-0.5.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4695</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4695" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4695" ref_url="https://www.suse.com/security/cve/CVE-2015-4695" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001569.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1212-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    meta.h in libwmf 0.2.8.4 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted WMF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4695/">CVE-2015-4695</cve>
	<bugzilla href="https://bugzilla.suse.com/936058">SUSE bug 936058</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566932" comment="libwmf-0.2.8.4-206.29.29.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4696</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4696" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4696" ref_url="https://www.suse.com/security/cve/CVE-2015-4696" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001569.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1212-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in libwmf 0.2.8.4 allows remote attackers to cause a denial of service (crash) via a crafted WMF file to the (1) wmf2gd or (2) wmf2eps command.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4696/">CVE-2015-4696</cve>
	<bugzilla href="https://bugzilla.suse.com/936062">SUSE bug 936062</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566932" comment="libwmf-0.2.8.4-206.29.29.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154700" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4700</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4700" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4700" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4700" ref_url="https://www.suse.com/security/cve/CVE-2015-4700" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1478-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1487-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1488-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1489-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1491-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1611-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001706.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
    <description>
    The bpf_int_jit_compile function in arch/x86/net/bpf_jit_comp.c in the Linux kernel before 4.0.6 allows local users to cause a denial of service (system crash) by creating a packet filter and then loading crafted BPF instructions that trigger late convergence by the JIT compiler.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4700/">CVE-2015-4700</cve>
	<bugzilla href="https://bugzilla.suse.com/935705">SUSE bug 935705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939273">SUSE bug 939273</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566727" comment="kernel-bigsmp-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566728" comment="kernel-default-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566729" comment="kernel-default-base-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566730" comment="kernel-default-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566731" comment="kernel-default-extra-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566732" comment="kernel-pae-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566733" comment="kernel-pae-base-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566734" comment="kernel-pae-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566735" comment="kernel-pae-extra-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566736" comment="kernel-source-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566737" comment="kernel-syms-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566738" comment="kernel-trace-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566739" comment="kernel-xen-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566740" comment="kernel-xen-base-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566741" comment="kernel-xen-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566742" comment="kernel-xen-extra-3.0.101-0.47.67.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567338" comment="kernel-default-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567339" comment="kernel-default-base-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567340" comment="kernel-default-devel-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567341" comment="kernel-default-extra-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567342" comment="kernel-pae-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567343" comment="kernel-pae-base-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567344" comment="kernel-pae-devel-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567345" comment="kernel-pae-extra-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567346" comment="kernel-source-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567347" comment="kernel-syms-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567348" comment="kernel-trace-devel-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567349" comment="kernel-xen-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567350" comment="kernel-xen-base-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567351" comment="kernel-xen-devel-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567352" comment="kernel-xen-extra-3.0.101-65.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4706</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4706" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4706" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4706" ref_url="https://www.suse.com/security/cve/CVE-2015-4706" source="SUSE CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in IPython 3.x before 3.2 allows remote attackers to inject arbitrary web script or HTML via vectors involving JSON error messages and the /api/contents path.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-10-31"/>
	<updated date="2021-10-31"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4706/">CVE-2015-4706</cve>
	<bugzilla href="https://bugzilla.suse.com/935908">SUSE bug 935908</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339310" comment="IPython is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4707</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4707" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4707" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4707" ref_url="https://www.suse.com/security/cve/CVE-2015-4707" source="SUSE CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in IPython before 3.2 allows remote attackers to inject arbitrary web script or HTML via vectors involving JSON error messages and the /api/notebooks path.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4707/">CVE-2015-4707</cve>
	<bugzilla href="https://bugzilla.suse.com/935908">SUSE bug 935908</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339310" comment="IPython is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4729</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4729" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4729" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4729" ref_url="https://www.suse.com/security/cve/CVE-2015-4729" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u80 and 8u45 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4729/">CVE-2015-4729</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566643" comment="java-1_7_0-openjdk-1.7.0.85-0.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566644" comment="java-1_7_0-openjdk-demo-1.7.0.85-0.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566645" comment="java-1_7_0-openjdk-devel-1.7.0.85-0.11.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4730</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4730" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4730" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4730" ref_url="https://www.suse.com/security/cve/CVE-2015-4730" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.20 and earlier allows remote authenticated users to affect availability via unknown vectors related to Types.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4730/">CVE-2015-4730</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566978" comment="libmysql55client18-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566979" comment="libmysql55client18-32bit-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566980" comment="libmysql55client_r18-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566981" comment="libmysql55client_r18-32bit-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566982" comment="mysql-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566983" comment="mysql-client-5.5.46-0.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4731</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4731" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4731" ref_url="https://www.suse.com/security/cve/CVE-2015-4731" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; Java SE Embedded 7u75; and Java SE Embedded 8u33 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4731/">CVE-2015-4731</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566643" comment="java-1_7_0-openjdk-1.7.0.85-0.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566644" comment="java-1_7_0-openjdk-demo-1.7.0.85-0.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566645" comment="java-1_7_0-openjdk-devel-1.7.0.85-0.11.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4732</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4732" ref_url="https://www.suse.com/security/cve/CVE-2015-4732" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2015-2590.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4732/">CVE-2015-4732</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566643" comment="java-1_7_0-openjdk-1.7.0.85-0.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566644" comment="java-1_7_0-openjdk-demo-1.7.0.85-0.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566645" comment="java-1_7_0-openjdk-devel-1.7.0.85-0.11.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4733</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4733" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4733" ref_url="https://www.suse.com/security/cve/CVE-2015-4733" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4733/">CVE-2015-4733</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566643" comment="java-1_7_0-openjdk-1.7.0.85-0.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566644" comment="java-1_7_0-openjdk-demo-1.7.0.85-0.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566645" comment="java-1_7_0-openjdk-devel-1.7.0.85-0.11.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154734" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4734</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4734" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4734" ref_url="https://www.suse.com/security/cve/CVE-2015-4734" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85 and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality via vectors related to JGSS.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4734/">CVE-2015-4734</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566646" comment="java-1_7_0-openjdk-1.7.0.91-0.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566647" comment="java-1_7_0-openjdk-demo-1.7.0.91-0.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566648" comment="java-1_7_0-openjdk-devel-1.7.0.91-0.14.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4736</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4736" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4736" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4736" ref_url="https://www.suse.com/security/cve/CVE-2015-4736" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u80 and 8u45 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4736/">CVE-2015-4736</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566643" comment="java-1_7_0-openjdk-1.7.0.85-0.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566644" comment="java-1_7_0-openjdk-demo-1.7.0.85-0.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566645" comment="java-1_7_0-openjdk-devel-1.7.0.85-0.11.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4737</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4737" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4737" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4737" ref_url="https://www.suse.com/security/cve/CVE-2015-4737" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001639.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1629-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect confidentiality via unknown vectors related to Server : Pluggable Auth.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-4737/">CVE-2015-4737</cve>
	<bugzilla href="https://bugzilla.suse.com/938412">SUSE bug 938412</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566972" comment="libmysql55client18-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566973" comment="libmysql55client18-32bit-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566974" comment="libmysql55client_r18-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566975" comment="libmysql55client_r18-32bit-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566976" comment="mysql-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566977" comment="mysql-client-5.5.45-0.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4748</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4748" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4748" ref_url="https://www.suse.com/security/cve/CVE-2015-4748" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="TID7016694" ref_url="https://www.suse.com/support/kb/doc/?id=7016694" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JRockit R28.3.6; and Java SE Embedded 7u75 and Embedded 8u33 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Security.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4748/">CVE-2015-4748</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566643" comment="java-1_7_0-openjdk-1.7.0.85-0.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566644" comment="java-1_7_0-openjdk-demo-1.7.0.85-0.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566645" comment="java-1_7_0-openjdk-devel-1.7.0.85-0.11.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4749</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4749" ref_url="https://www.suse.com/security/cve/CVE-2015-4749" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="TID7016694" ref_url="https://www.suse.com/support/kb/doc/?id=7016694" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JRockit R28.3.6; and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect availability via vectors related to JNDI.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4749/">CVE-2015-4749</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566643" comment="java-1_7_0-openjdk-1.7.0.85-0.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566644" comment="java-1_7_0-openjdk-demo-1.7.0.85-0.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566645" comment="java-1_7_0-openjdk-devel-1.7.0.85-0.11.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4752</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4752" ref_url="https://www.suse.com/security/cve/CVE-2015-4752" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001639.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1629-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect availability via vectors related to Server : I_S.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4752/">CVE-2015-4752</cve>
	<bugzilla href="https://bugzilla.suse.com/938412">SUSE bug 938412</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566972" comment="libmysql55client18-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566973" comment="libmysql55client18-32bit-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566974" comment="libmysql55client_r18-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566975" comment="libmysql55client_r18-32bit-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566976" comment="mysql-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566977" comment="mysql-client-5.5.45-0.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4756</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4756" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4756" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4756" ref_url="https://www.suse.com/security/cve/CVE-2015-4756" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001639.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1629-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.22 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : InnoDB, a different vulnerability than CVE-2015-0439.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4756/">CVE-2015-4756</cve>
	<bugzilla href="https://bugzilla.suse.com/938412">SUSE bug 938412</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566972" comment="libmysql55client18-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566973" comment="libmysql55client18-32bit-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566974" comment="libmysql55client_r18-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566975" comment="libmysql55client_r18-32bit-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566976" comment="mysql-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566977" comment="mysql-client-5.5.45-0.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4757</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4757" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4757" ref_url="https://www.suse.com/security/cve/CVE-2015-4757" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001639.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1629-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier and 5.6.23 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Optimizer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4757/">CVE-2015-4757</cve>
	<bugzilla href="https://bugzilla.suse.com/938412">SUSE bug 938412</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566972" comment="libmysql55client18-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566973" comment="libmysql55client18-32bit-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566974" comment="libmysql55client_r18-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566975" comment="libmysql55client_r18-32bit-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566976" comment="mysql-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566977" comment="mysql-client-5.5.45-0.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4760</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4760" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4760" ref_url="https://www.suse.com/security/cve/CVE-2015-4760" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4760/">CVE-2015-4760</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566643" comment="java-1_7_0-openjdk-1.7.0.85-0.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566644" comment="java-1_7_0-openjdk-demo-1.7.0.85-0.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566645" comment="java-1_7_0-openjdk-devel-1.7.0.85-0.11.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4761</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4761" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4761" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4761" ref_url="https://www.suse.com/security/cve/CVE-2015-4761" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001639.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1629-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.24 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Memcached.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4761/">CVE-2015-4761</cve>
	<bugzilla href="https://bugzilla.suse.com/938412">SUSE bug 938412</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566972" comment="libmysql55client18-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566973" comment="libmysql55client18-32bit-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566974" comment="libmysql55client_r18-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566975" comment="libmysql55client_r18-32bit-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566976" comment="mysql-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566977" comment="mysql-client-5.5.45-0.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4766</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4766" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4766" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4766" ref_url="https://www.suse.com/security/cve/CVE-2015-4766" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.25 and earlier allows local users to affect availability via unknown vectors related to Server : Security : Firewall.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4766/">CVE-2015-4766</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566978" comment="libmysql55client18-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566979" comment="libmysql55client18-32bit-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566980" comment="libmysql55client_r18-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566981" comment="libmysql55client_r18-32bit-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566982" comment="mysql-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566983" comment="mysql-client-5.5.46-0.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4767</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4767" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4767" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4767" ref_url="https://www.suse.com/security/cve/CVE-2015-4767" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001639.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1629-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.24 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Security : Firewall, a different vulnerability than CVE-2015-4769.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4767/">CVE-2015-4767</cve>
	<bugzilla href="https://bugzilla.suse.com/938412">SUSE bug 938412</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566972" comment="libmysql55client18-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566973" comment="libmysql55client18-32bit-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566974" comment="libmysql55client_r18-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566975" comment="libmysql55client_r18-32bit-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566976" comment="mysql-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566977" comment="mysql-client-5.5.45-0.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4769</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4769" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4769" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4769" ref_url="https://www.suse.com/security/cve/CVE-2015-4769" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001639.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1629-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.24 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Security : Firewall, a different vulnerability than CVE-2015-4767.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4769/">CVE-2015-4769</cve>
	<bugzilla href="https://bugzilla.suse.com/938412">SUSE bug 938412</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566972" comment="libmysql55client18-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566973" comment="libmysql55client18-32bit-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566974" comment="libmysql55client_r18-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566975" comment="libmysql55client_r18-32bit-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566976" comment="mysql-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566977" comment="mysql-client-5.5.45-0.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4771</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4771" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4771" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4771" ref_url="https://www.suse.com/security/cve/CVE-2015-4771" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001639.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1629-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.24 and earlier allows remote authenticated users to affect availability via vectors related to RBR.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4771/">CVE-2015-4771</cve>
	<bugzilla href="https://bugzilla.suse.com/938412">SUSE bug 938412</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566972" comment="libmysql55client18-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566973" comment="libmysql55client18-32bit-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566974" comment="libmysql55client_r18-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566975" comment="libmysql55client_r18-32bit-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566976" comment="mysql-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566977" comment="mysql-client-5.5.45-0.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4772</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4772" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4772" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4772" ref_url="https://www.suse.com/security/cve/CVE-2015-4772" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001639.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1629-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.24 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Partition.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4772/">CVE-2015-4772</cve>
	<bugzilla href="https://bugzilla.suse.com/938412">SUSE bug 938412</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566972" comment="libmysql55client18-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566973" comment="libmysql55client18-32bit-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566974" comment="libmysql55client_r18-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566975" comment="libmysql55client_r18-32bit-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566976" comment="mysql-5.5.45-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566977" comment="mysql-client-5.5.45-0.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4792</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4792" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4792" ref_url="https://www.suse.com/security/cve/CVE-2015-4792" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001838.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0368-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Partition, a different vulnerability than CVE-2015-4802.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4792/">CVE-2015-4792</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958789">SUSE bug 958789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566978" comment="libmysql55client18-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566979" comment="libmysql55client18-32bit-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566980" comment="libmysql55client_r18-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566981" comment="libmysql55client_r18-32bit-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566982" comment="mysql-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566983" comment="mysql-client-5.5.46-0.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4800</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4800" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4800" ref_url="https://www.suse.com/security/cve/CVE-2015-4800" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.26 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Optimizer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4800/">CVE-2015-4800</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566978" comment="libmysql55client18-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566979" comment="libmysql55client18-32bit-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566980" comment="libmysql55client_r18-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566981" comment="libmysql55client_r18-32bit-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566982" comment="mysql-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566983" comment="mysql-client-5.5.46-0.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4802</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4802" ref_url="https://www.suse.com/security/cve/CVE-2015-4802" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001838.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0368-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Partition, a different vulnerability than CVE-2015-4792.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4802/">CVE-2015-4802</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958789">SUSE bug 958789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566978" comment="libmysql55client18-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566979" comment="libmysql55client18-32bit-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566980" comment="libmysql55client_r18-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566981" comment="libmysql55client_r18-32bit-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566982" comment="mysql-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566983" comment="mysql-client-5.5.46-0.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4803</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4803" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4803" ref_url="https://www.suse.com/security/cve/CVE-2015-4803" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60; Java SE Embedded 8u51; and JRockit R28.3.7 allows remote attackers to affect availability via vectors related to JAXP, a different vulnerability than CVE-2015-4893 and CVE-2015-4911.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4803/">CVE-2015-4803</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566646" comment="java-1_7_0-openjdk-1.7.0.91-0.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566647" comment="java-1_7_0-openjdk-demo-1.7.0.91-0.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566648" comment="java-1_7_0-openjdk-devel-1.7.0.91-0.14.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4805</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4805" ref_url="https://www.suse.com/security/cve/CVE-2015-4805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Serialization.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4805/">CVE-2015-4805</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566646" comment="java-1_7_0-openjdk-1.7.0.91-0.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566647" comment="java-1_7_0-openjdk-demo-1.7.0.91-0.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566648" comment="java-1_7_0-openjdk-devel-1.7.0.91-0.14.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4806</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4806" ref_url="https://www.suse.com/security/cve/CVE-2015-4806" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality and integrity via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4806/">CVE-2015-4806</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566646" comment="java-1_7_0-openjdk-1.7.0.91-0.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566647" comment="java-1_7_0-openjdk-demo-1.7.0.91-0.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566648" comment="java-1_7_0-openjdk-devel-1.7.0.91-0.14.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4815</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4815" ref_url="https://www.suse.com/security/cve/CVE-2015-4815" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001838.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0368-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect availability via vectors related to Server : DDL.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4815/">CVE-2015-4815</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958789">SUSE bug 958789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566978" comment="libmysql55client18-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566979" comment="libmysql55client18-32bit-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566980" comment="libmysql55client_r18-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566981" comment="libmysql55client_r18-32bit-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566982" comment="mysql-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566983" comment="mysql-client-5.5.46-0.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4816</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4816" ref_url="https://www.suse.com/security/cve/CVE-2015-4816" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001806.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.44 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : InnoDB.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4816/">CVE-2015-4816</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958790">SUSE bug 958790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566978" comment="libmysql55client18-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566979" comment="libmysql55client18-32bit-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566980" comment="libmysql55client_r18-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566981" comment="libmysql55client_r18-32bit-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566982" comment="mysql-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566983" comment="mysql-client-5.5.46-0.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4819</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4819" ref_url="https://www.suse.com/security/cve/CVE-2015-4819" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001806.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.44 and earlier, and 5.6.25 and earlier, allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Client programs.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4819/">CVE-2015-4819</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958790">SUSE bug 958790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969667">SUSE bug 969667</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566978" comment="libmysql55client18-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566979" comment="libmysql55client18-32bit-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566980" comment="libmysql55client_r18-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566981" comment="libmysql55client_r18-32bit-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566982" comment="mysql-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566983" comment="mysql-client-5.5.46-0.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4826</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4826" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4826" ref_url="https://www.suse.com/security/cve/CVE-2015-4826" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001838.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0368-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect confidentiality via unknown vectors related to Server : Types.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4826/">CVE-2015-4826</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958789">SUSE bug 958789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566978" comment="libmysql55client18-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566979" comment="libmysql55client18-32bit-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566980" comment="libmysql55client_r18-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566981" comment="libmysql55client_r18-32bit-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566982" comment="mysql-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566983" comment="mysql-client-5.5.46-0.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4830</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4830" ref_url="https://www.suse.com/security/cve/CVE-2015-4830" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001838.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0368-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect integrity via unknown vectors related to Server : Security : Privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4830/">CVE-2015-4830</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958789">SUSE bug 958789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566978" comment="libmysql55client18-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566979" comment="libmysql55client18-32bit-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566980" comment="libmysql55client_r18-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566981" comment="libmysql55client_r18-32bit-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566982" comment="mysql-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566983" comment="mysql-client-5.5.46-0.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4833</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4833" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4833" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4833" ref_url="https://www.suse.com/security/cve/CVE-2015-4833" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.25 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Partition.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4833/">CVE-2015-4833</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566978" comment="libmysql55client18-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566979" comment="libmysql55client18-32bit-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566980" comment="libmysql55client_r18-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566981" comment="libmysql55client_r18-32bit-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566982" comment="mysql-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566983" comment="mysql-client-5.5.46-0.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4835</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4835" ref_url="https://www.suse.com/security/cve/CVE-2015-4835" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2015-4881.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4835/">CVE-2015-4835</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566646" comment="java-1_7_0-openjdk-1.7.0.91-0.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566647" comment="java-1_7_0-openjdk-demo-1.7.0.91-0.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566648" comment="java-1_7_0-openjdk-devel-1.7.0.91-0.14.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4836</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4836" ref_url="https://www.suse.com/security/cve/CVE-2015-4836" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001838.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0368-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : SP.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4836/">CVE-2015-4836</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958789">SUSE bug 958789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566978" comment="libmysql55client18-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566979" comment="libmysql55client18-32bit-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566980" comment="libmysql55client_r18-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566981" comment="libmysql55client_r18-32bit-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566982" comment="mysql-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566983" comment="mysql-client-5.5.46-0.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4840</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4840" ref_url="https://www.suse.com/security/cve/CVE-2015-4840" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u85 and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4840/">CVE-2015-4840</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566646" comment="java-1_7_0-openjdk-1.7.0.91-0.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566647" comment="java-1_7_0-openjdk-demo-1.7.0.91-0.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566648" comment="java-1_7_0-openjdk-devel-1.7.0.91-0.14.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4842</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4842" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4842" ref_url="https://www.suse.com/security/cve/CVE-2015-4842" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality via vectors related to JAXP.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4842/">CVE-2015-4842</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566646" comment="java-1_7_0-openjdk-1.7.0.91-0.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566647" comment="java-1_7_0-openjdk-demo-1.7.0.91-0.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566648" comment="java-1_7_0-openjdk-devel-1.7.0.91-0.14.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4843</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4843" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4843" ref_url="https://www.suse.com/security/cve/CVE-2015-4843" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4843/">CVE-2015-4843</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566646" comment="java-1_7_0-openjdk-1.7.0.91-0.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566647" comment="java-1_7_0-openjdk-demo-1.7.0.91-0.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566648" comment="java-1_7_0-openjdk-devel-1.7.0.91-0.14.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4844</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4844" ref_url="https://www.suse.com/security/cve/CVE-2015-4844" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4844/">CVE-2015-4844</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566646" comment="java-1_7_0-openjdk-1.7.0.91-0.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566647" comment="java-1_7_0-openjdk-demo-1.7.0.91-0.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566648" comment="java-1_7_0-openjdk-devel-1.7.0.91-0.14.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4858</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4858" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4858" ref_url="https://www.suse.com/security/cve/CVE-2015-4858" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001838.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0368-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier, allows remote authenticated users to affect availability via vectors related to DML, a different vulnerability than CVE-2015-4913.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4858/">CVE-2015-4858</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958789">SUSE bug 958789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566978" comment="libmysql55client18-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566979" comment="libmysql55client18-32bit-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566980" comment="libmysql55client_r18-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566981" comment="libmysql55client_r18-32bit-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566982" comment="mysql-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566983" comment="mysql-client-5.5.46-0.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4860</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4860" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4860" ref_url="https://www.suse.com/security/cve/CVE-2015-4860" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI, a different vulnerability than CVE-2015-4883.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4860/">CVE-2015-4860</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566646" comment="java-1_7_0-openjdk-1.7.0.91-0.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566647" comment="java-1_7_0-openjdk-demo-1.7.0.91-0.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566648" comment="java-1_7_0-openjdk-devel-1.7.0.91-0.14.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4861</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4861" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4861" ref_url="https://www.suse.com/security/cve/CVE-2015-4861" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001838.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0368-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : InnoDB.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4861/">CVE-2015-4861</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958789">SUSE bug 958789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566978" comment="libmysql55client18-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566979" comment="libmysql55client18-32bit-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566980" comment="libmysql55client_r18-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566981" comment="libmysql55client_r18-32bit-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566982" comment="mysql-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566983" comment="mysql-client-5.5.46-0.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4862</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4862" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4862" ref_url="https://www.suse.com/security/cve/CVE-2015-4862" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.26 and earlier allows remote authenticated users to affect availability via vectors related to DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4862/">CVE-2015-4862</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566978" comment="libmysql55client18-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566979" comment="libmysql55client18-32bit-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566980" comment="libmysql55client_r18-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566981" comment="libmysql55client_r18-32bit-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566982" comment="mysql-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566983" comment="mysql-client-5.5.46-0.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4864</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4864" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4864" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4864" ref_url="https://www.suse.com/security/cve/CVE-2015-4864" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect integrity via unknown vectors related to Server : Security : Privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4864/">CVE-2015-4864</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566978" comment="libmysql55client18-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566979" comment="libmysql55client18-32bit-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566980" comment="libmysql55client_r18-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566981" comment="libmysql55client_r18-32bit-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566982" comment="mysql-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566983" comment="mysql-client-5.5.46-0.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4866</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4866" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4866" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4866" ref_url="https://www.suse.com/security/cve/CVE-2015-4866" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.23 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : InnoDB.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4866/">CVE-2015-4866</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566978" comment="libmysql55client18-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566979" comment="libmysql55client18-32bit-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566980" comment="libmysql55client_r18-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566981" comment="libmysql55client_r18-32bit-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566982" comment="mysql-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566983" comment="mysql-client-5.5.46-0.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4870</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4870" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4870" ref_url="https://www.suse.com/security/cve/CVE-2015-4870" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001838.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0368-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Parser.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4870/">CVE-2015-4870</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958789">SUSE bug 958789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566978" comment="libmysql55client18-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566979" comment="libmysql55client18-32bit-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566980" comment="libmysql55client_r18-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566981" comment="libmysql55client_r18-32bit-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566982" comment="mysql-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566983" comment="mysql-client-5.5.46-0.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4871</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4871" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4871" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4871" ref_url="https://www.suse.com/security/cve/CVE-2015-4871" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u85 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4871/">CVE-2015-4871</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566649" comment="java-1_7_0-openjdk-1.7.0.95-0.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566650" comment="java-1_7_0-openjdk-demo-1.7.0.95-0.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566651" comment="java-1_7_0-openjdk-devel-1.7.0.95-0.17.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4872</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4872" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4872" ref_url="https://www.suse.com/security/cve/CVE-2015-4872" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60; Java SE Embedded 8u51; and JRockit R28.3.7 allows remote attackers to affect integrity via unknown vectors related to Security.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4872/">CVE-2015-4872</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566646" comment="java-1_7_0-openjdk-1.7.0.91-0.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566647" comment="java-1_7_0-openjdk-demo-1.7.0.91-0.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566648" comment="java-1_7_0-openjdk-devel-1.7.0.91-0.14.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154879" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4879</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4879" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4879" ref_url="https://www.suse.com/security/cve/CVE-2015-4879" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001806.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.44 and earlier, and 5.6.25 and earlier, allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4879/">CVE-2015-4879</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958790">SUSE bug 958790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566978" comment="libmysql55client18-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566979" comment="libmysql55client18-32bit-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566980" comment="libmysql55client_r18-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566981" comment="libmysql55client_r18-32bit-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566982" comment="mysql-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566983" comment="mysql-client-5.5.46-0.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4881</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4881" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4881" ref_url="https://www.suse.com/security/cve/CVE-2015-4881" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2015-4835.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4881/">CVE-2015-4881</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566646" comment="java-1_7_0-openjdk-1.7.0.91-0.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566647" comment="java-1_7_0-openjdk-demo-1.7.0.91-0.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566648" comment="java-1_7_0-openjdk-devel-1.7.0.91-0.14.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4882</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4882" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4882" ref_url="https://www.suse.com/security/cve/CVE-2015-4882" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect availability via vectors related to CORBA.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4882/">CVE-2015-4882</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566646" comment="java-1_7_0-openjdk-1.7.0.91-0.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566647" comment="java-1_7_0-openjdk-demo-1.7.0.91-0.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566648" comment="java-1_7_0-openjdk-devel-1.7.0.91-0.14.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4883</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4883" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4883" ref_url="https://www.suse.com/security/cve/CVE-2015-4883" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI, a different vulnerability than CVE-2015-4860.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4883/">CVE-2015-4883</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566646" comment="java-1_7_0-openjdk-1.7.0.91-0.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566647" comment="java-1_7_0-openjdk-demo-1.7.0.91-0.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566648" comment="java-1_7_0-openjdk-devel-1.7.0.91-0.14.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4890</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4890" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4890" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4890" ref_url="https://www.suse.com/security/cve/CVE-2015-4890" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.26 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Replication.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4890/">CVE-2015-4890</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566978" comment="libmysql55client18-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566979" comment="libmysql55client18-32bit-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566980" comment="libmysql55client_r18-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566981" comment="libmysql55client_r18-32bit-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566982" comment="mysql-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566983" comment="mysql-client-5.5.46-0.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4893</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4893" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4893" ref_url="https://www.suse.com/security/cve/CVE-2015-4893" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60; Java SE Embedded 8u51; and JRockit R28.3.7 allows remote attackers to affect availability via vectors related to JAXP, a different vulnerability than CVE-2015-4803 and CVE-2015-4911.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4893/">CVE-2015-4893</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566646" comment="java-1_7_0-openjdk-1.7.0.91-0.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566647" comment="java-1_7_0-openjdk-demo-1.7.0.91-0.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566648" comment="java-1_7_0-openjdk-devel-1.7.0.91-0.14.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4895</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4895" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4895" ref_url="https://www.suse.com/security/cve/CVE-2015-4895" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001806.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.25 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : InnoDB.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4895/">CVE-2015-4895</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958790">SUSE bug 958790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566978" comment="libmysql55client18-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566979" comment="libmysql55client18-32bit-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566980" comment="libmysql55client_r18-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566981" comment="libmysql55client_r18-32bit-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566982" comment="mysql-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566983" comment="mysql-client-5.5.46-0.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4903</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4903" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4903" ref_url="https://www.suse.com/security/cve/CVE-2015-4903" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality via vectors related to RMI.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4903/">CVE-2015-4903</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566646" comment="java-1_7_0-openjdk-1.7.0.91-0.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566647" comment="java-1_7_0-openjdk-demo-1.7.0.91-0.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566648" comment="java-1_7_0-openjdk-devel-1.7.0.91-0.14.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4904</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4904" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4904" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4904" ref_url="https://www.suse.com/security/cve/CVE-2015-4904" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.25 and earlier allows remote authenticated users to affect availability via unknown vectors related to libmysqld.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4904/">CVE-2015-4904</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566978" comment="libmysql55client18-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566979" comment="libmysql55client18-32bit-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566980" comment="libmysql55client_r18-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566981" comment="libmysql55client_r18-32bit-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566982" comment="mysql-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566983" comment="mysql-client-5.5.46-0.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4905</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4905" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4905" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4905" ref_url="https://www.suse.com/security/cve/CVE-2015-4905" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.23 and earlier allows remote authenticated users to affect availability via vectors related to Server : DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4905/">CVE-2015-4905</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566978" comment="libmysql55client18-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566979" comment="libmysql55client18-32bit-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566980" comment="libmysql55client_r18-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566981" comment="libmysql55client_r18-32bit-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566982" comment="mysql-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566983" comment="mysql-client-5.5.46-0.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4910</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4910" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4910" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4910" ref_url="https://www.suse.com/security/cve/CVE-2015-4910" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.26 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Memcached.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4910/">CVE-2015-4910</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566978" comment="libmysql55client18-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566979" comment="libmysql55client18-32bit-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566980" comment="libmysql55client_r18-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566981" comment="libmysql55client_r18-32bit-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566982" comment="mysql-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566983" comment="mysql-client-5.5.46-0.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4911</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4911" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4911" ref_url="https://www.suse.com/security/cve/CVE-2015-4911" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60; Java SE Embedded 8u51; and JRockit R28.3.7 allows remote attackers to affect availability via vectors related to JAXP, a different vulnerability than CVE-2015-4803 and CVE-2015-4893.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4911/">CVE-2015-4911</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566646" comment="java-1_7_0-openjdk-1.7.0.91-0.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566647" comment="java-1_7_0-openjdk-demo-1.7.0.91-0.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566648" comment="java-1_7_0-openjdk-devel-1.7.0.91-0.14.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4913</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4913" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4913" ref_url="https://www.suse.com/security/cve/CVE-2015-4913" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001838.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0368-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect availability via vectors related to Server : DML, a different vulnerability than CVE-2015-4858.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4913/">CVE-2015-4913</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958789">SUSE bug 958789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566978" comment="libmysql55client18-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566979" comment="libmysql55client18-32bit-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566980" comment="libmysql55client_r18-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566981" comment="libmysql55client_r18-32bit-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566982" comment="mysql-5.5.46-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566983" comment="mysql-client-5.5.46-0.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5116</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5116" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5116" ref_url="https://www.suse.com/security/cve/CVE-2015-5116" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allow remote attackers to bypass the Same Origin Policy via unspecified vectors, a different vulnerability than CVE-2014-0578, CVE-2015-3115, CVE-2015-3116, and CVE-2015-3125.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-5116/">CVE-2015-5116</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566538" comment="flash-player-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566539" comment="flash-player-gnome-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566540" comment="flash-player-kde4-11.2.202.481-0.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5117</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5117" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5117" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5117" ref_url="https://www.suse.com/security/cve/CVE-2015-5117" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-3118, CVE-2015-3124, CVE-2015-3127, CVE-2015-3128, CVE-2015-3129, CVE-2015-3131, CVE-2015-3132, CVE-2015-3136, CVE-2015-3137, CVE-2015-4428, and CVE-2015-4430.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-5117/">CVE-2015-5117</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566538" comment="flash-player-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566539" comment="flash-player-gnome-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566540" comment="flash-player-kde4-11.2.202.481-0.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5118</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5118" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5118" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5118" ref_url="https://www.suse.com/security/cve/CVE-2015-5118" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-3135 and CVE-2015-4432.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-5118/">CVE-2015-5118</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566538" comment="flash-player-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566539" comment="flash-player-gnome-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566540" comment="flash-player-kde4-11.2.202.481-0.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5119</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5119" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5119" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5119" ref_url="https://www.suse.com/security/cve/CVE-2015-5119" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00016.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the ByteArray class in the ActionScript 3 (AS3) implementation in Adobe Flash Player 13.x through 13.0.0.296 and 14.x through 18.0.0.194 on Windows and OS X and 11.x through 11.2.202.468 on Linux allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content that overrides a valueOf function, as exploited in the wild in July 2015.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-5119/">CVE-2015-5119</cve>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937752">SUSE bug 937752</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566538" comment="flash-player-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566539" comment="flash-player-gnome-11.2.202.481-0.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566540" comment="flash-player-kde4-11.2.202.481-0.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5122</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5122" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5122" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5122" ref_url="https://www.suse.com/security/cve/CVE-2015-5122" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1267-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00032.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the DisplayObject class in the ActionScript 3 (AS3) implementation in Adobe Flash Player 13.x through 13.0.0.302 on Windows and OS X, 14.x through 18.0.0.203 on Windows and OS X, 11.x through 11.2.202.481 on Linux, and 12.x through 18.0.0.204 on Linux Chrome installations allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content that leverages improper handling of the opaqueBackground property, as exploited in the wild in July 2015.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5122/">CVE-2015-5122</cve>
	<bugzilla href="https://bugzilla.suse.com/937752">SUSE bug 937752</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566541" comment="flash-player-11.2.202.491-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566542" comment="flash-player-gnome-11.2.202.491-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566543" comment="flash-player-kde4-11.2.202.491-0.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5123</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5123" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5123" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5123" ref_url="https://www.suse.com/security/cve/CVE-2015-5123" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1267-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00032.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the BitmapData class in the ActionScript 3 (AS3) implementation in Adobe Flash Player 13.x through 13.0.0.302 on Windows and OS X, 14.x through 18.0.0.203 on Windows and OS X, 11.x through 11.2.202.481 on Linux, and 12.x through 18.0.0.204 on Linux Chrome installations allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content that overrides a valueOf function, as exploited in the wild in July 2015.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5123/">CVE-2015-5123</cve>
	<bugzilla href="https://bugzilla.suse.com/937752">SUSE bug 937752</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566541" comment="flash-player-11.2.202.491-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566542" comment="flash-player-gnome-11.2.202.491-0.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566543" comment="flash-player-kde4-11.2.202.491-0.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5124</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5124" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5124" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5124" ref_url="https://www.suse.com/security/cve/CVE-2015-5124" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-3117, CVE-2015-3123, CVE-2015-3130, CVE-2015-3133, CVE-2015-3134, and CVE-2015-4431.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-5124/">CVE-2015-5124</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566544" comment="flash-player-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566545" comment="flash-player-gnome-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566546" comment="flash-player-kde4-11.2.202.508-0.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5125</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5125" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5125" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5125" ref_url="https://www.suse.com/security/cve/CVE-2015-5125" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allow attackers to cause a denial of service (vector-length corruption) or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5125/">CVE-2015-5125</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566544" comment="flash-player-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566545" comment="flash-player-gnome-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566546" comment="flash-player-kde4-11.2.202.508-0.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5127</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5127" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5127" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5127" ref_url="https://www.suse.com/security/cve/CVE-2015-5127" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5130, CVE-2015-5134, CVE-2015-5539, CVE-2015-5540, CVE-2015-5550, CVE-2015-5551, CVE-2015-5556, CVE-2015-5557, CVE-2015-5559, CVE-2015-5561, CVE-2015-5563, CVE-2015-5564, and CVE-2015-5565.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5127/">CVE-2015-5127</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566544" comment="flash-player-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566545" comment="flash-player-gnome-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566546" comment="flash-player-kde4-11.2.202.508-0.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5128</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5128" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5128" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5128" ref_url="https://www.suse.com/security/cve/CVE-2015-5128" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: This candidate was withdrawn by its CNA.  Further investigation showed that it was not a security issue.  Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5128/">CVE-2015-5128</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566544" comment="flash-player-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566545" comment="flash-player-gnome-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566546" comment="flash-player-kde4-11.2.202.508-0.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5129</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5129" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5129" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5129" ref_url="https://www.suse.com/security/cve/CVE-2015-5129" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5541.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5129/">CVE-2015-5129</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566544" comment="flash-player-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566545" comment="flash-player-gnome-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566546" comment="flash-player-kde4-11.2.202.508-0.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5130</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5130" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5130" ref_url="https://www.suse.com/security/cve/CVE-2015-5130" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5127, CVE-2015-5134, CVE-2015-5539, CVE-2015-5540, CVE-2015-5550, CVE-2015-5551, CVE-2015-5556, CVE-2015-5557, CVE-2015-5559, CVE-2015-5561, CVE-2015-5563, CVE-2015-5564, and CVE-2015-5565.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5130/">CVE-2015-5130</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952254">SUSE bug 952254</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566544" comment="flash-player-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566545" comment="flash-player-gnome-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566546" comment="flash-player-kde4-11.2.202.508-0.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5131</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5131" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5131" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5131" ref_url="https://www.suse.com/security/cve/CVE-2015-5131" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5132 and CVE-2015-5133.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5131/">CVE-2015-5131</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566544" comment="flash-player-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566545" comment="flash-player-gnome-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566546" comment="flash-player-kde4-11.2.202.508-0.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5132</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5132" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5132" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5132" ref_url="https://www.suse.com/security/cve/CVE-2015-5132" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5131 and CVE-2015-5133.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5132/">CVE-2015-5132</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566544" comment="flash-player-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566545" comment="flash-player-gnome-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566546" comment="flash-player-kde4-11.2.202.508-0.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5133</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5133" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5133" ref_url="https://www.suse.com/security/cve/CVE-2015-5133" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5131 and CVE-2015-5132.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5133/">CVE-2015-5133</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566544" comment="flash-player-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566545" comment="flash-player-gnome-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566546" comment="flash-player-kde4-11.2.202.508-0.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5134</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5134" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5134" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5134" ref_url="https://www.suse.com/security/cve/CVE-2015-5134" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5127, CVE-2015-5130, CVE-2015-5539, CVE-2015-5540, CVE-2015-5550, CVE-2015-5551, CVE-2015-5556, CVE-2015-5557, CVE-2015-5559, CVE-2015-5561, CVE-2015-5563, CVE-2015-5564, and CVE-2015-5565.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5134/">CVE-2015-5134</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566544" comment="flash-player-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566545" comment="flash-player-gnome-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566546" comment="flash-player-kde4-11.2.202.508-0.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5146</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5146" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5146" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5146" ref_url="https://www.suse.com/security/cve/CVE-2015-5146" source="SUSE CVE"/>
    <description>
    ntpd in ntp before 4.2.8p3 with remote configuration enabled allows remote authenticated users with knowledge of the configuration password and access to a computer entrusted to perform remote configuration to cause a denial of service (service crash) via a NULL byte in a crafted configuration directive packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5146/">CVE-2015-5146</cve>
	<bugzilla href="https://bugzilla.suse.com/936690">SUSE bug 936690</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338821" comment="ntp is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5154</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5154" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5154" ref_url="https://www.suse.com/security/cve/CVE-2015-5154" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1299-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1302-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1409-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1421-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1426-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1455-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1472-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1479-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1643-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001743.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2003-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2249-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00052.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the IDE subsystem in QEMU, as used in Xen 4.5.x and earlier, when the container has a CDROM drive enabled, allows local guest users to execute arbitrary code on the host via unspecified ATAPI commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5154/">CVE-2015-5154</cve>
	<bugzilla href="https://bugzilla.suse.com/938344">SUSE bug 938344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566779" comment="kvm-1.4.2-0.22.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567180" comment="xen-4.2.5_12-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567181" comment="xen-doc-html-4.2.5_12-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567182" comment="xen-doc-pdf-4.2.5_12-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567183" comment="xen-kmp-default-4.2.5_12_3.0.101_0.47.55-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567184" comment="xen-kmp-pae-4.2.5_12_3.0.101_0.47.55-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567185" comment="xen-libs-4.2.5_12-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567186" comment="xen-libs-32bit-4.2.5_12-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567187" comment="xen-tools-4.2.5_12-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567188" comment="xen-tools-domU-4.2.5_12-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567386" comment="kvm-1.4.2-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567451" comment="xen-4.4.2_10-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567452" comment="xen-doc-html-4.4.2_10-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567453" comment="xen-kmp-default-4.4.2_10_3.0.101_63-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567454" comment="xen-kmp-pae-4.4.2_10_3.0.101_63-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567455" comment="xen-libs-4.4.2_10-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567456" comment="xen-libs-32bit-4.4.2_10-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567457" comment="xen-tools-4.4.2_10-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567458" comment="xen-tools-domU-4.4.2_10-5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5157</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5157" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5157" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5157" ref_url="https://www.suse.com/security/cve/CVE-2015-5157" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2339-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2350-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0354-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00005.html" source="SUSE-SU"/>
    <description>
    arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform mishandles IRET faults in processing NMIs that occurred during userspace execution, which might allow local users to gain privileges by triggering an NMI.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-14"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-5157/">CVE-2015-5157</cve>
	<bugzilla href="https://bugzilla.suse.com/937969">SUSE bug 937969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937970">SUSE bug 937970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938706">SUSE bug 938706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939207">SUSE bug 939207</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566744" comment="kernel-bigsmp-devel-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566745" comment="kernel-default-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566746" comment="kernel-default-base-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566747" comment="kernel-default-devel-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566748" comment="kernel-default-extra-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566749" comment="kernel-pae-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566750" comment="kernel-pae-base-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566751" comment="kernel-pae-devel-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566752" comment="kernel-pae-extra-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566753" comment="kernel-source-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566754" comment="kernel-syms-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566755" comment="kernel-trace-devel-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566756" comment="kernel-xen-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566757" comment="kernel-xen-base-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566758" comment="kernel-xen-devel-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566759" comment="kernel-xen-extra-3.0.101-0.47.71.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567368" comment="kernel-default-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567369" comment="kernel-default-base-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567370" comment="kernel-default-devel-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567371" comment="kernel-default-extra-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567372" comment="kernel-pae-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567373" comment="kernel-pae-base-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567374" comment="kernel-pae-devel-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567375" comment="kernel-pae-extra-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567376" comment="kernel-source-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567377" comment="kernel-syms-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567378" comment="kernel-trace-devel-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567379" comment="kernel-xen-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567380" comment="kernel-xen-base-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567381" comment="kernel-xen-devel-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567382" comment="kernel-xen-extra-3.0.101-68.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5158</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5158" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5158" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5158" ref_url="https://www.suse.com/security/cve/CVE-2015-5158" source="SUSE CVE"/>
    <description>
    Stack-based buffer overflow in hw/scsi/scsi-bus.c in QEMU, when built with SCSI-device emulation support, allows guest OS users with CAP_SYS_RAWIO permissions to cause a denial of service (instance crash) via an invalid opcode in a SCSI command descriptor block.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5158/">CVE-2015-5158</cve>
	<bugzilla href="https://bugzilla.suse.com/939254">SUSE bug 939254</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334251" comment="kvm is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5165</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5165" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5165" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5165" ref_url="https://www.suse.com/security/cve/CVE-2015-5165" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1404-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1421-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1479-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1643-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2003-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00023.html" source="SUSE-SU"/>
    <description>
    The C+ mode offload emulation in the RTL8139 network card device model in QEMU, as used in Xen 4.5.x and earlier, allows remote attackers to read process heap memory via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-5165/">CVE-2015-5165</cve>
	<bugzilla href="https://bugzilla.suse.com/939712">SUSE bug 939712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567180" comment="xen-4.2.5_12-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567181" comment="xen-doc-html-4.2.5_12-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567182" comment="xen-doc-pdf-4.2.5_12-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567183" comment="xen-kmp-default-4.2.5_12_3.0.101_0.47.55-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567184" comment="xen-kmp-pae-4.2.5_12_3.0.101_0.47.55-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567185" comment="xen-libs-4.2.5_12-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567186" comment="xen-libs-32bit-4.2.5_12-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567187" comment="xen-tools-4.2.5_12-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567188" comment="xen-tools-domU-4.2.5_12-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567300" comment="xen-4.4.2_12-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567301" comment="xen-doc-html-4.4.2_12-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567302" comment="xen-kmp-default-4.4.2_12_3.0.101_63-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567303" comment="xen-kmp-pae-4.4.2_12_3.0.101_63-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567304" comment="xen-libs-4.4.2_12-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567305" comment="xen-libs-32bit-4.4.2_12-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567306" comment="xen-tools-4.4.2_12-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567307" comment="xen-tools-domU-4.4.2_12-23.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5166</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5166" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5166" ref_url="https://www.suse.com/security/cve/CVE-2015-5166" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1404-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1479-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2003-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00023.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in QEMU in Xen 4.5.x and earlier does not completely unplug emulated block devices, which allows local HVM guest users to gain privileges by unplugging a block device twice.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5166/">CVE-2015-5166</cve>
	<bugzilla href="https://bugzilla.suse.com/939709">SUSE bug 939709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567180" comment="xen-4.2.5_12-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567181" comment="xen-doc-html-4.2.5_12-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567182" comment="xen-doc-pdf-4.2.5_12-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567183" comment="xen-kmp-default-4.2.5_12_3.0.101_0.47.55-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567184" comment="xen-kmp-pae-4.2.5_12_3.0.101_0.47.55-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567185" comment="xen-libs-4.2.5_12-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567186" comment="xen-libs-32bit-4.2.5_12-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567187" comment="xen-tools-4.2.5_12-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567188" comment="xen-tools-domU-4.2.5_12-15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567300" comment="xen-4.4.2_12-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567301" comment="xen-doc-html-4.4.2_12-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567302" comment="xen-kmp-default-4.4.2_12_3.0.101_63-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567303" comment="xen-kmp-pae-4.4.2_12_3.0.101_63-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567304" comment="xen-libs-4.4.2_12-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567305" comment="xen-libs-32bit-4.4.2_12-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567306" comment="xen-tools-4.4.2_12-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567307" comment="xen-tools-domU-4.4.2_12-23.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5185</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5185" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5185" ref_url="https://www.suse.com/security/cve/CVE-2015-5185" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001722.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1571-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-09/msg00019.html" source="SUSE-SU"/>
    <description>
    The lookupProviders function in providerMgr.c in sblim-sfcb 1.3.4 and 1.3.18 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty className in a packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5185/">CVE-2015-5185</cve>
	<bugzilla href="https://bugzilla.suse.com/942628">SUSE bug 942628</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567144" comment="sblim-sfcb-1.3.11-0.25.4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5186</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5186" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5186" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5186" ref_url="https://www.suse.com/security/cve/CVE-2015-5186" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0563-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190563-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005428.html" source="SUSE-SU"/>
    <description>
    Audit before 2.4.4 in Linux does not sanitize escape characters in filenames.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5186/">CVE-2015-5186</cve>
	<bugzilla href="https://bugzilla.suse.com/941922">SUSE bug 941922</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333990" comment="audit is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5198</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5198" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5198" ref_url="https://www.suse.com/security/cve/CVE-2015-5198" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001670.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1537-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-09/msg00012.html" source="SUSE-SU"/>
    <description>
    libvdpau before 1.1.1, when used in a setuid or setgid application, allows local users to gain privileges via unspecified vectors, related to the VDPAU_DRIVER_PATH environment variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5198/">CVE-2015-5198</cve>
	<bugzilla href="https://bugzilla.suse.com/943967">SUSE bug 943967</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566924" comment="libvdpau1-0.4.1-16.20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566925" comment="libvdpau1-32bit-0.4.1-16.20.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5199</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5199" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5199" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5199" ref_url="https://www.suse.com/security/cve/CVE-2015-5199" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001670.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1537-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-09/msg00012.html" source="SUSE-SU"/>
    <description>
    Directory traversal vulnerability in dlopen in libvdpau before 1.1.1 allows local users to gain privileges via the VDPAU_DRIVER environment variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5199/">CVE-2015-5199</cve>
	<bugzilla href="https://bugzilla.suse.com/943968">SUSE bug 943968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566924" comment="libvdpau1-0.4.1-16.20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566925" comment="libvdpau1-32bit-0.4.1-16.20.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5200</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5200" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5200" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5200" ref_url="https://www.suse.com/security/cve/CVE-2015-5200" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001670.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1537-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-09/msg00012.html" source="SUSE-SU"/>
    <description>
    The trace functionality in libvdpau before 1.1.1, when used in a setuid or setgid application, allows local users to write to arbitrary files via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5200/">CVE-2015-5200</cve>
	<bugzilla href="https://bugzilla.suse.com/943969">SUSE bug 943969</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566924" comment="libvdpau1-0.4.1-16.20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566925" comment="libvdpau1-32bit-0.4.1-16.20.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5212</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5212" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5212" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5212" ref_url="https://www.suse.com/security/cve/CVE-2015-5212" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001841.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0588-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00156.html" source="SUSE-SU"/>
    <description>
    Integer underflow in LibreOffice before 4.4.5 and Apache OpenOffice before 4.1.2, when the configuration setting "Load printer settings with the document" is enabled, allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via crafted PrinterSetup data in an ODF document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5212/">CVE-2015-5212</cve>
	<bugzilla href="https://bugzilla.suse.com/934423">SUSE bug 934423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936188">SUSE bug 936188</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009564685" comment="google-carlito-fonts-1.1.03.beta1-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564687" comment="libhyphen0-2.8.8-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564688" comment="libmythes-1_2-0-1.2.4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564689" comment="libreoffice-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564690" comment="libreoffice-base-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564691" comment="libreoffice-base-drivers-postgresql-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564693" comment="libreoffice-calc-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564694" comment="libreoffice-calc-extensions-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564695" comment="libreoffice-draw-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564696" comment="libreoffice-filters-optional-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564697" comment="libreoffice-gnome-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564698" comment="libreoffice-icon-theme-galaxy-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564699" comment="libreoffice-icon-theme-tango-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564700" comment="libreoffice-impress-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564701" comment="libreoffice-kde4-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564702" comment="libreoffice-l10n-af-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564703" comment="libreoffice-l10n-ar-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564704" comment="libreoffice-l10n-ca-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564705" comment="libreoffice-l10n-cs-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564706" comment="libreoffice-l10n-da-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564707" comment="libreoffice-l10n-de-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564708" comment="libreoffice-l10n-en-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564709" comment="libreoffice-l10n-es-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564710" comment="libreoffice-l10n-fi-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564711" comment="libreoffice-l10n-fr-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564712" comment="libreoffice-l10n-gu-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564713" comment="libreoffice-l10n-hi-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564714" comment="libreoffice-l10n-hu-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564715" comment="libreoffice-l10n-it-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564716" comment="libreoffice-l10n-ja-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564717" comment="libreoffice-l10n-ko-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564718" comment="libreoffice-l10n-nb-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564719" comment="libreoffice-l10n-nl-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564720" comment="libreoffice-l10n-nn-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564721" comment="libreoffice-l10n-pl-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564722" comment="libreoffice-l10n-pt-BR-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564723" comment="libreoffice-l10n-pt-PT-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564724" comment="libreoffice-l10n-ru-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564725" comment="libreoffice-l10n-sk-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564726" comment="libreoffice-l10n-sv-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564727" comment="libreoffice-l10n-xh-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564728" comment="libreoffice-l10n-zh-Hans-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564729" comment="libreoffice-l10n-zh-Hant-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564730" comment="libreoffice-l10n-zu-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564731" comment="libreoffice-mailmerge-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564732" comment="libreoffice-math-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564733" comment="libreoffice-officebean-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564734" comment="libreoffice-pyuno-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564735" comment="libreoffice-sdk-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515206" comment="libreoffice-share-linker-1-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564736" comment="libreoffice-voikko-4.1-2.26 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564737" comment="libreoffice-writer-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564738" comment="libreoffice-writer-extensions-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564740" comment="libvoikko1-3.7.1-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564741" comment="myspell-af_NA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564742" comment="myspell-af_ZA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564743" comment="myspell-ar-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564744" comment="myspell-ar_AE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564745" comment="myspell-ar_BH-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564746" comment="myspell-ar_DZ-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564747" comment="myspell-ar_EG-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564748" comment="myspell-ar_IQ-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564749" comment="myspell-ar_JO-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564750" comment="myspell-ar_KW-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564751" comment="myspell-ar_LB-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564752" comment="myspell-ar_LY-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564753" comment="myspell-ar_MA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564754" comment="myspell-ar_OM-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564755" comment="myspell-ar_QA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564756" comment="myspell-ar_SA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564757" comment="myspell-ar_SD-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564758" comment="myspell-ar_SY-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564759" comment="myspell-ar_TN-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564760" comment="myspell-ar_YE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564761" comment="myspell-be_BY-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564762" comment="myspell-bg_BG-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564763" comment="myspell-bn_BD-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564764" comment="myspell-bn_IN-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564765" comment="myspell-bs-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564766" comment="myspell-bs_BA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564767" comment="myspell-ca-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564768" comment="myspell-ca_AD-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564769" comment="myspell-ca_ES-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564770" comment="myspell-ca_ES_valencia-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564771" comment="myspell-ca_FR-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564772" comment="myspell-ca_IT-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564773" comment="myspell-cs_CZ-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564774" comment="myspell-da_DK-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564775" comment="myspell-de-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564776" comment="myspell-de_AT-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564777" comment="myspell-de_CH-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564778" comment="myspell-de_DE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564779" comment="myspell-dictionaries-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564780" comment="myspell-el_GR-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564781" comment="myspell-en-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564782" comment="myspell-en_AU-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564783" comment="myspell-en_BS-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564784" comment="myspell-en_BZ-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564785" comment="myspell-en_CA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564786" comment="myspell-en_GB-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564787" comment="myspell-en_GH-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564788" comment="myspell-en_IE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564789" comment="myspell-en_IN-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564790" comment="myspell-en_JM-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564791" comment="myspell-en_MW-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564792" comment="myspell-en_NA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564793" comment="myspell-en_NZ-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564794" comment="myspell-en_PH-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564795" comment="myspell-en_TT-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564796" comment="myspell-en_US-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564797" comment="myspell-en_ZA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564798" comment="myspell-en_ZW-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564799" comment="myspell-es-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564800" comment="myspell-es_AR-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564801" comment="myspell-es_BO-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564802" comment="myspell-es_CL-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564803" comment="myspell-es_CO-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564804" comment="myspell-es_CR-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564805" comment="myspell-es_CU-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564806" comment="myspell-es_DO-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564807" comment="myspell-es_EC-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564808" comment="myspell-es_ES-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564809" comment="myspell-es_GT-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564810" comment="myspell-es_HN-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564811" comment="myspell-es_MX-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564812" comment="myspell-es_NI-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564813" comment="myspell-es_PA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564814" comment="myspell-es_PE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564815" comment="myspell-es_PR-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564816" comment="myspell-es_PY-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564817" comment="myspell-es_SV-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564818" comment="myspell-es_UY-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564819" comment="myspell-es_VE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564820" comment="myspell-et_EE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564821" comment="myspell-fr_BE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564822" comment="myspell-fr_CA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564823" comment="myspell-fr_CH-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564824" comment="myspell-fr_FR-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564825" comment="myspell-fr_LU-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564826" comment="myspell-fr_MC-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564827" comment="myspell-gu_IN-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564828" comment="myspell-he_IL-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564829" comment="myspell-hi_IN-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564830" comment="myspell-hr_HR-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564831" comment="myspell-hu_HU-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564832" comment="myspell-it_IT-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564833" comment="myspell-lightproof-en-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564834" comment="myspell-lightproof-hu_HU-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564835" comment="myspell-lightproof-pt_BR-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564836" comment="myspell-lightproof-ru_RU-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564837" comment="myspell-lo_LA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564838" comment="myspell-lt_LT-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564839" comment="myspell-lv_LV-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564840" comment="myspell-nb_NO-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564841" comment="myspell-nl_BE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564842" comment="myspell-nl_NL-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564843" comment="myspell-nn_NO-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564844" comment="myspell-no-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564845" comment="myspell-pl_PL-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564846" comment="myspell-pt_AO-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564847" comment="myspell-pt_BR-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564848" comment="myspell-pt_PT-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564849" comment="myspell-ro-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564850" comment="myspell-ro_RO-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564851" comment="myspell-ru_RU-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564852" comment="myspell-sk_SK-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564853" comment="myspell-sl_SI-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564854" comment="myspell-sr-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564855" comment="myspell-sr_CS-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564856" comment="myspell-sr_Latn_CS-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564857" comment="myspell-sr_Latn_RS-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564858" comment="myspell-sr_RS-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564859" comment="myspell-sv_FI-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564860" comment="myspell-sv_SE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564861" comment="myspell-te-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564862" comment="myspell-te_IN-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564863" comment="myspell-th_TH-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564864" comment="myspell-vi-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564865" comment="myspell-vi_VN-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564866" comment="myspell-zu_ZA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564868" comment="python-importlib-1.0.2-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5213</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5213" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5213" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5213" ref_url="https://www.suse.com/security/cve/CVE-2015-5213" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001841.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0588-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00156.html" source="SUSE-SU"/>
    <description>
    Integer overflow in LibreOffice before 4.4.5 and Apache OpenOffice before 4.1.2 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a long DOC file, which triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5213/">CVE-2015-5213</cve>
	<bugzilla href="https://bugzilla.suse.com/934423">SUSE bug 934423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936190">SUSE bug 936190</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009564685" comment="google-carlito-fonts-1.1.03.beta1-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564687" comment="libhyphen0-2.8.8-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564688" comment="libmythes-1_2-0-1.2.4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564689" comment="libreoffice-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564690" comment="libreoffice-base-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564691" comment="libreoffice-base-drivers-postgresql-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564693" comment="libreoffice-calc-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564694" comment="libreoffice-calc-extensions-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564695" comment="libreoffice-draw-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564696" comment="libreoffice-filters-optional-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564697" comment="libreoffice-gnome-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564698" comment="libreoffice-icon-theme-galaxy-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564699" comment="libreoffice-icon-theme-tango-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564700" comment="libreoffice-impress-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564701" comment="libreoffice-kde4-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564702" comment="libreoffice-l10n-af-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564703" comment="libreoffice-l10n-ar-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564704" comment="libreoffice-l10n-ca-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564705" comment="libreoffice-l10n-cs-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564706" comment="libreoffice-l10n-da-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564707" comment="libreoffice-l10n-de-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564708" comment="libreoffice-l10n-en-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564709" comment="libreoffice-l10n-es-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564710" comment="libreoffice-l10n-fi-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564711" comment="libreoffice-l10n-fr-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564712" comment="libreoffice-l10n-gu-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564713" comment="libreoffice-l10n-hi-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564714" comment="libreoffice-l10n-hu-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564715" comment="libreoffice-l10n-it-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564716" comment="libreoffice-l10n-ja-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564717" comment="libreoffice-l10n-ko-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564718" comment="libreoffice-l10n-nb-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564719" comment="libreoffice-l10n-nl-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564720" comment="libreoffice-l10n-nn-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564721" comment="libreoffice-l10n-pl-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564722" comment="libreoffice-l10n-pt-BR-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564723" comment="libreoffice-l10n-pt-PT-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564724" comment="libreoffice-l10n-ru-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564725" comment="libreoffice-l10n-sk-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564726" comment="libreoffice-l10n-sv-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564727" comment="libreoffice-l10n-xh-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564728" comment="libreoffice-l10n-zh-Hans-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564729" comment="libreoffice-l10n-zh-Hant-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564730" comment="libreoffice-l10n-zu-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564731" comment="libreoffice-mailmerge-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564732" comment="libreoffice-math-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564733" comment="libreoffice-officebean-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564734" comment="libreoffice-pyuno-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564735" comment="libreoffice-sdk-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515206" comment="libreoffice-share-linker-1-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564736" comment="libreoffice-voikko-4.1-2.26 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564737" comment="libreoffice-writer-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564738" comment="libreoffice-writer-extensions-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564740" comment="libvoikko1-3.7.1-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564741" comment="myspell-af_NA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564742" comment="myspell-af_ZA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564743" comment="myspell-ar-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564744" comment="myspell-ar_AE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564745" comment="myspell-ar_BH-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564746" comment="myspell-ar_DZ-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564747" comment="myspell-ar_EG-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564748" comment="myspell-ar_IQ-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564749" comment="myspell-ar_JO-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564750" comment="myspell-ar_KW-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564751" comment="myspell-ar_LB-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564752" comment="myspell-ar_LY-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564753" comment="myspell-ar_MA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564754" comment="myspell-ar_OM-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564755" comment="myspell-ar_QA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564756" comment="myspell-ar_SA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564757" comment="myspell-ar_SD-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564758" comment="myspell-ar_SY-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564759" comment="myspell-ar_TN-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564760" comment="myspell-ar_YE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564761" comment="myspell-be_BY-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564762" comment="myspell-bg_BG-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564763" comment="myspell-bn_BD-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564764" comment="myspell-bn_IN-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564765" comment="myspell-bs-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564766" comment="myspell-bs_BA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564767" comment="myspell-ca-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564768" comment="myspell-ca_AD-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564769" comment="myspell-ca_ES-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564770" comment="myspell-ca_ES_valencia-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564771" comment="myspell-ca_FR-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564772" comment="myspell-ca_IT-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564773" comment="myspell-cs_CZ-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564774" comment="myspell-da_DK-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564775" comment="myspell-de-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564776" comment="myspell-de_AT-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564777" comment="myspell-de_CH-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564778" comment="myspell-de_DE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564779" comment="myspell-dictionaries-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564780" comment="myspell-el_GR-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564781" comment="myspell-en-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564782" comment="myspell-en_AU-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564783" comment="myspell-en_BS-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564784" comment="myspell-en_BZ-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564785" comment="myspell-en_CA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564786" comment="myspell-en_GB-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564787" comment="myspell-en_GH-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564788" comment="myspell-en_IE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564789" comment="myspell-en_IN-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564790" comment="myspell-en_JM-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564791" comment="myspell-en_MW-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564792" comment="myspell-en_NA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564793" comment="myspell-en_NZ-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564794" comment="myspell-en_PH-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564795" comment="myspell-en_TT-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564796" comment="myspell-en_US-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564797" comment="myspell-en_ZA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564798" comment="myspell-en_ZW-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564799" comment="myspell-es-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564800" comment="myspell-es_AR-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564801" comment="myspell-es_BO-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564802" comment="myspell-es_CL-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564803" comment="myspell-es_CO-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564804" comment="myspell-es_CR-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564805" comment="myspell-es_CU-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564806" comment="myspell-es_DO-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564807" comment="myspell-es_EC-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564808" comment="myspell-es_ES-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564809" comment="myspell-es_GT-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564810" comment="myspell-es_HN-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564811" comment="myspell-es_MX-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564812" comment="myspell-es_NI-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564813" comment="myspell-es_PA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564814" comment="myspell-es_PE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564815" comment="myspell-es_PR-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564816" comment="myspell-es_PY-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564817" comment="myspell-es_SV-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564818" comment="myspell-es_UY-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564819" comment="myspell-es_VE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564820" comment="myspell-et_EE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564821" comment="myspell-fr_BE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564822" comment="myspell-fr_CA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564823" comment="myspell-fr_CH-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564824" comment="myspell-fr_FR-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564825" comment="myspell-fr_LU-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564826" comment="myspell-fr_MC-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564827" comment="myspell-gu_IN-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564828" comment="myspell-he_IL-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564829" comment="myspell-hi_IN-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564830" comment="myspell-hr_HR-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564831" comment="myspell-hu_HU-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564832" comment="myspell-it_IT-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564833" comment="myspell-lightproof-en-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564834" comment="myspell-lightproof-hu_HU-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564835" comment="myspell-lightproof-pt_BR-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564836" comment="myspell-lightproof-ru_RU-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564837" comment="myspell-lo_LA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564838" comment="myspell-lt_LT-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564839" comment="myspell-lv_LV-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564840" comment="myspell-nb_NO-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564841" comment="myspell-nl_BE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564842" comment="myspell-nl_NL-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564843" comment="myspell-nn_NO-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564844" comment="myspell-no-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564845" comment="myspell-pl_PL-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564846" comment="myspell-pt_AO-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564847" comment="myspell-pt_BR-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564848" comment="myspell-pt_PT-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564849" comment="myspell-ro-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564850" comment="myspell-ro_RO-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564851" comment="myspell-ru_RU-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564852" comment="myspell-sk_SK-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564853" comment="myspell-sl_SI-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564854" comment="myspell-sr-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564855" comment="myspell-sr_CS-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564856" comment="myspell-sr_Latn_CS-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564857" comment="myspell-sr_Latn_RS-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564858" comment="myspell-sr_RS-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564859" comment="myspell-sv_FI-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564860" comment="myspell-sv_SE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564861" comment="myspell-te-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564862" comment="myspell-te_IN-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564863" comment="myspell-th_TH-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564864" comment="myspell-vi-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564865" comment="myspell-vi_VN-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564866" comment="myspell-zu_ZA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564868" comment="python-importlib-1.0.2-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5214</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5214" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5214" ref_url="https://www.suse.com/security/cve/CVE-2015-5214" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001841.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0588-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00156.html" source="SUSE-SU"/>
    <description>
    LibreOffice before 4.4.6 and 5.x before 5.0.1 and Apache OpenOffice before 4.1.2 allows remote attackers to cause a denial of service (memory corruption and application crash) or execute arbitrary code via an index to a non-existent bookmark in a DOC file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5214/">CVE-2015-5214</cve>
	<bugzilla href="https://bugzilla.suse.com/934423">SUSE bug 934423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940838">SUSE bug 940838</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009564685" comment="google-carlito-fonts-1.1.03.beta1-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564687" comment="libhyphen0-2.8.8-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564688" comment="libmythes-1_2-0-1.2.4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564689" comment="libreoffice-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564690" comment="libreoffice-base-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564691" comment="libreoffice-base-drivers-postgresql-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564693" comment="libreoffice-calc-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564694" comment="libreoffice-calc-extensions-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564695" comment="libreoffice-draw-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564696" comment="libreoffice-filters-optional-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564697" comment="libreoffice-gnome-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564698" comment="libreoffice-icon-theme-galaxy-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564699" comment="libreoffice-icon-theme-tango-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564700" comment="libreoffice-impress-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564701" comment="libreoffice-kde4-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564702" comment="libreoffice-l10n-af-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564703" comment="libreoffice-l10n-ar-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564704" comment="libreoffice-l10n-ca-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564705" comment="libreoffice-l10n-cs-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564706" comment="libreoffice-l10n-da-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564707" comment="libreoffice-l10n-de-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564708" comment="libreoffice-l10n-en-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564709" comment="libreoffice-l10n-es-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564710" comment="libreoffice-l10n-fi-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564711" comment="libreoffice-l10n-fr-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564712" comment="libreoffice-l10n-gu-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564713" comment="libreoffice-l10n-hi-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564714" comment="libreoffice-l10n-hu-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564715" comment="libreoffice-l10n-it-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564716" comment="libreoffice-l10n-ja-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564717" comment="libreoffice-l10n-ko-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564718" comment="libreoffice-l10n-nb-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564719" comment="libreoffice-l10n-nl-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564720" comment="libreoffice-l10n-nn-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564721" comment="libreoffice-l10n-pl-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564722" comment="libreoffice-l10n-pt-BR-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564723" comment="libreoffice-l10n-pt-PT-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564724" comment="libreoffice-l10n-ru-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564725" comment="libreoffice-l10n-sk-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564726" comment="libreoffice-l10n-sv-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564727" comment="libreoffice-l10n-xh-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564728" comment="libreoffice-l10n-zh-Hans-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564729" comment="libreoffice-l10n-zh-Hant-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564730" comment="libreoffice-l10n-zu-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564731" comment="libreoffice-mailmerge-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564732" comment="libreoffice-math-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564733" comment="libreoffice-officebean-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564734" comment="libreoffice-pyuno-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564735" comment="libreoffice-sdk-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009515206" comment="libreoffice-share-linker-1-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564736" comment="libreoffice-voikko-4.1-2.26 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564737" comment="libreoffice-writer-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564738" comment="libreoffice-writer-extensions-5.0.4.2-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564740" comment="libvoikko1-3.7.1-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564741" comment="myspell-af_NA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564742" comment="myspell-af_ZA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564743" comment="myspell-ar-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564744" comment="myspell-ar_AE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564745" comment="myspell-ar_BH-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564746" comment="myspell-ar_DZ-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564747" comment="myspell-ar_EG-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564748" comment="myspell-ar_IQ-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564749" comment="myspell-ar_JO-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564750" comment="myspell-ar_KW-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564751" comment="myspell-ar_LB-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564752" comment="myspell-ar_LY-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564753" comment="myspell-ar_MA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564754" comment="myspell-ar_OM-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564755" comment="myspell-ar_QA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564756" comment="myspell-ar_SA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564757" comment="myspell-ar_SD-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564758" comment="myspell-ar_SY-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564759" comment="myspell-ar_TN-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564760" comment="myspell-ar_YE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564761" comment="myspell-be_BY-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564762" comment="myspell-bg_BG-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564763" comment="myspell-bn_BD-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564764" comment="myspell-bn_IN-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564765" comment="myspell-bs-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564766" comment="myspell-bs_BA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564767" comment="myspell-ca-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564768" comment="myspell-ca_AD-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564769" comment="myspell-ca_ES-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564770" comment="myspell-ca_ES_valencia-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564771" comment="myspell-ca_FR-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564772" comment="myspell-ca_IT-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564773" comment="myspell-cs_CZ-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564774" comment="myspell-da_DK-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564775" comment="myspell-de-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564776" comment="myspell-de_AT-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564777" comment="myspell-de_CH-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564778" comment="myspell-de_DE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564779" comment="myspell-dictionaries-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564780" comment="myspell-el_GR-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564781" comment="myspell-en-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564782" comment="myspell-en_AU-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564783" comment="myspell-en_BS-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564784" comment="myspell-en_BZ-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564785" comment="myspell-en_CA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564786" comment="myspell-en_GB-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564787" comment="myspell-en_GH-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564788" comment="myspell-en_IE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564789" comment="myspell-en_IN-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564790" comment="myspell-en_JM-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564791" comment="myspell-en_MW-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564792" comment="myspell-en_NA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564793" comment="myspell-en_NZ-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564794" comment="myspell-en_PH-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564795" comment="myspell-en_TT-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564796" comment="myspell-en_US-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564797" comment="myspell-en_ZA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564798" comment="myspell-en_ZW-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564799" comment="myspell-es-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564800" comment="myspell-es_AR-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564801" comment="myspell-es_BO-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564802" comment="myspell-es_CL-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564803" comment="myspell-es_CO-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564804" comment="myspell-es_CR-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564805" comment="myspell-es_CU-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564806" comment="myspell-es_DO-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564807" comment="myspell-es_EC-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564808" comment="myspell-es_ES-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564809" comment="myspell-es_GT-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564810" comment="myspell-es_HN-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564811" comment="myspell-es_MX-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564812" comment="myspell-es_NI-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564813" comment="myspell-es_PA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564814" comment="myspell-es_PE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564815" comment="myspell-es_PR-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564816" comment="myspell-es_PY-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564817" comment="myspell-es_SV-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564818" comment="myspell-es_UY-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564819" comment="myspell-es_VE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564820" comment="myspell-et_EE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564821" comment="myspell-fr_BE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564822" comment="myspell-fr_CA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564823" comment="myspell-fr_CH-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564824" comment="myspell-fr_FR-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564825" comment="myspell-fr_LU-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564826" comment="myspell-fr_MC-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564827" comment="myspell-gu_IN-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564828" comment="myspell-he_IL-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564829" comment="myspell-hi_IN-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564830" comment="myspell-hr_HR-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564831" comment="myspell-hu_HU-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564832" comment="myspell-it_IT-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564833" comment="myspell-lightproof-en-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564834" comment="myspell-lightproof-hu_HU-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564835" comment="myspell-lightproof-pt_BR-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564836" comment="myspell-lightproof-ru_RU-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564837" comment="myspell-lo_LA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564838" comment="myspell-lt_LT-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564839" comment="myspell-lv_LV-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564840" comment="myspell-nb_NO-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564841" comment="myspell-nl_BE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564842" comment="myspell-nl_NL-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564843" comment="myspell-nn_NO-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564844" comment="myspell-no-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564845" comment="myspell-pl_PL-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564846" comment="myspell-pt_AO-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564847" comment="myspell-pt_BR-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564848" comment="myspell-pt_PT-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564849" comment="myspell-ro-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564850" comment="myspell-ro_RO-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564851" comment="myspell-ru_RU-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564852" comment="myspell-sk_SK-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564853" comment="myspell-sl_SI-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564854" comment="myspell-sr-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564855" comment="myspell-sr_CS-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564856" comment="myspell-sr_Latn_CS-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564857" comment="myspell-sr_Latn_RS-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564858" comment="myspell-sr_RS-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564859" comment="myspell-sv_FI-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564860" comment="myspell-sv_SE-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564861" comment="myspell-te-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564862" comment="myspell-te_IN-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564863" comment="myspell-th_TH-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564864" comment="myspell-vi-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564865" comment="myspell-vi_VN-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564866" comment="myspell-zu_ZA-20150827-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564868" comment="python-importlib-1.0.2-0.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5224</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5224" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5224" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5224" ref_url="https://www.suse.com/security/cve/CVE-2015-5224" source="SUSE CVE"/>
    <description>
    The mkostemp function in login-utils in util-linux when used incorrectly allows remote attackers to cause file name collision and possibly other attacks.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5224/">CVE-2015-5224</cve>
	<bugzilla href="https://bugzilla.suse.com/943012">SUSE bug 943012</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334326" comment="util-linux is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5234</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5234" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5234" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5234" ref_url="https://www.suse.com/security/cve/CVE-2015-5234" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001615.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00019.html" source="SUSE-SU"/>
    <description>
    IcedTea-Web before 1.5.3 and 1.6.x before 1.6.1 does not properly sanitize applet URLs, which allows remote attackers to inject applets into the .appletTrustSettings configuration file and bypass user approval to execute the applet via a crafted web page, possibly related to line breaks.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5234/">CVE-2015-5234</cve>
	<bugzilla href="https://bugzilla.suse.com/944209">SUSE bug 944209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334261" comment="icedtea-web is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567333" comment="icedtea-web-1.5.3-0.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5235</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5235" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5235" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5235" ref_url="https://www.suse.com/security/cve/CVE-2015-5235" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001615.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00019.html" source="SUSE-SU"/>
    <description>
    IcedTea-Web before 1.5.3 and 1.6.x before 1.6.1 does not properly determine the origin of unsigned applets, which allows remote attackers to bypass the approval process or trick users into approving applet execution via a crafted web page.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-31"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5235/">CVE-2015-5235</cve>
	<bugzilla href="https://bugzilla.suse.com/944208">SUSE bug 944208</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334261" comment="icedtea-web is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567333" comment="icedtea-web-1.5.3-0.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5239</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5239" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5239" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5239" ref_url="https://www.suse.com/security/cve/CVE-2015-5239" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1952-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2003-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2249-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the VNC display driver in QEMU before 2.1.0 allows attachers to cause a denial of service (process crash) via a CLIENT_CUT_TEXT message, which triggers an infinite loop.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5239/">CVE-2015-5239</cve>
	<bugzilla href="https://bugzilla.suse.com/944463">SUSE bug 944463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567189" comment="xen-4.2.5_14-18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567190" comment="xen-doc-html-4.2.5_14-18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567191" comment="xen-doc-pdf-4.2.5_14-18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567192" comment="xen-kmp-default-4.2.5_14_3.0.101_0.47.67-18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567193" comment="xen-kmp-pae-4.2.5_14_3.0.101_0.47.67-18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567194" comment="xen-libs-4.2.5_14-18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567195" comment="xen-libs-32bit-4.2.5_14-18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567196" comment="xen-tools-4.2.5_14-18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567197" comment="xen-tools-domU-4.2.5_14-18.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567459" comment="xen-4.4.3_02-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567460" comment="xen-doc-html-4.4.3_02-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567461" comment="xen-kmp-default-4.4.3_02_3.0.101_65-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567462" comment="xen-kmp-pae-4.4.3_02_3.0.101_65-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567463" comment="xen-libs-4.4.3_02-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567464" comment="xen-libs-32bit-4.4.3_02-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567465" comment="xen-tools-4.4.3_02-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567466" comment="xen-tools-domU-4.4.3_02-26.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5245</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5245" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5245" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5245" ref_url="https://www.suse.com/security/cve/CVE-2015-5245" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001952.html" source="SUSE-SU"/>
    <description>
    CRLF injection vulnerability in the Ceph Object Gateway (aka radosgw or RGW) in Ceph before 0.94.4 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a crafted bucket name.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5245/">CVE-2015-5245</cve>
	<bugzilla href="https://bugzilla.suse.com/945206">SUSE bug 945206</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334046" comment="ceph is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5247</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5247" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5247" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5247" ref_url="https://www.suse.com/security/cve/CVE-2015-5247" source="SUSE CVE"/>
    <description>
    The virStorageVolCreateXML API in libvirt 1.2.14 through 1.2.19 allows remote authenticated users with a read-write connection to cause a denial of service (libvirtd crash) by triggering a failed unlink after creating a volume on a root_squash NFS pool.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5247/">CVE-2015-5247</cve>
	<bugzilla href="https://bugzilla.suse.com/945645">SUSE bug 945645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333954" comment="libvirt is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5252</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5252" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5252" ref_url="https://www.suse.com/security/cve/CVE-2015-5252" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0032-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0164-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2354-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2356-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1106-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" source="SUSE-SU"/>
    <description>
    vfs.c in smbd in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, when share names with certain substring relationships exist, allows remote attackers to bypass intended file-access restrictions via a symlink that points outside of a share.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5252/">CVE-2015-5252</cve>
	<bugzilla href="https://bugzilla.suse.com/958582">SUSE bug 958582</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567124" comment="libldb1-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567125" comment="libldb1-32bit-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567126" comment="libsmbclient0-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567127" comment="libsmbclient0-32bit-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567128" comment="libtalloc2-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567129" comment="libtalloc2-32bit-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567130" comment="libtdb1-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567131" comment="libtdb1-32bit-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567132" comment="libtevent0-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567133" comment="libtevent0-32bit-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567134" comment="libwbclient0-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567135" comment="libwbclient0-32bit-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567136" comment="samba-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567137" comment="samba-32bit-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567138" comment="samba-client-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567139" comment="samba-client-32bit-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567140" comment="samba-doc-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567141" comment="samba-krb-printing-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567142" comment="samba-winbind-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567143" comment="samba-winbind-32bit-3.6.3-64.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155276" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5276</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5276" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5276" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5276" ref_url="https://www.suse.com/security/cve/CVE-2015-5276" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0908-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1946-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1069-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-04/msg00052.html" source="SUSE-SU"/>
    <description>
    The std::random_device class in libstdc++ in the GNU Compiler Collection (aka GCC) before 4.9.4 does not properly handle short reads from blocking sources, which makes it easier for context-dependent attackers to predict the random values via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5276/">CVE-2015-5276</cve>
	<bugzilla href="https://bugzilla.suse.com/945842">SUSE bug 945842</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567320" comment="libgcc_s1-5.3.1+r233831-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567321" comment="libgcc_s1-32bit-5.3.1+r233831-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567322" comment="libgfortran3-5.3.1+r233831-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567323" comment="libgfortran3-32bit-5.3.1+r233831-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567324" comment="libgomp1-5.3.1+r233831-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567325" comment="libgomp1-32bit-5.3.1+r233831-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567326" comment="libquadmath0-5.3.1+r233831-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567327" comment="libquadmath0-32bit-5.3.1+r233831-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567328" comment="libstdc++6-5.3.1+r233831-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567329" comment="libstdc++6-32bit-5.3.1+r233831-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567330" comment="libstdc++6-locale-5.3.1+r233831-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155278" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5278</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5278" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5278" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5278" ref_url="https://www.suse.com/security/cve/CVE-2015-5278" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1445-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
    <description>
    The ne2000_receive function in hw/net/ne2000.c in QEMU before 2.4.0.1 allows attackers to cause a denial of service (infinite loop and instance crash) or possibly execute arbitrary code via vectors related to receiving packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-05"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5278/">CVE-2015-5278</cve>
	<bugzilla href="https://bugzilla.suse.com/945989">SUSE bug 945989</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567467" comment="xen-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567468" comment="xen-doc-html-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567469" comment="xen-kmp-default-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567470" comment="xen-kmp-pae-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567471" comment="xen-libs-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567472" comment="xen-libs-32bit-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567473" comment="xen-tools-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567474" comment="xen-tools-domU-4.4.4_02-32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5283</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5283" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5283" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5283" ref_url="https://www.suse.com/security/cve/CVE-2015-5283" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2194-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1842-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
    <description>
    The sctp_init function in net/sctp/protocol.c in the Linux kernel before 4.2.3 has an incorrect sequence of protocol-initialization steps, which allows local users to cause a denial of service (panic or memory corruption) by creating SCTP sockets before all of the steps have finished.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5283/">CVE-2015-5283</cve>
	<bugzilla href="https://bugzilla.suse.com/947155">SUSE bug 947155</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5288</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5288" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5288" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5288" ref_url="https://www.suse.com/security/cve/CVE-2015-5288" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1907-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1919-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00040.html" source="SUSE-SU"/>
    <description>
    The crypt function in contrib/pgcrypto in PostgreSQL before 9.0.23, 9.1.x before 9.1.19, 9.2.x before 9.2.14, 9.3.x before 9.3.10, and 9.4.x before 9.4.5 allows attackers to cause a denial of service (server crash) or read arbitrary server memory via a "too-short" salt.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5288/">CVE-2015-5288</cve>
	<bugzilla href="https://bugzilla.suse.com/949669">SUSE bug 949669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949670">SUSE bug 949670</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567044" comment="libecpg6-9.4.5-0.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567045" comment="libpq5-9.4.5-0.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567046" comment="libpq5-32bit-9.4.5-0.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567056" comment="postgresql91-9.1.19-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567057" comment="postgresql91-docs-9.1.19-0.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567047" comment="postgresql94-9.4.5-0.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567048" comment="postgresql94-docs-9.4.5-0.8.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567423" comment="libecpg6-9.4.6-0.14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567424" comment="libpq5-9.4.6-0.14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567425" comment="libpq5-32bit-9.4.6-0.14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567426" comment="postgresql94-9.4.6-0.14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567427" comment="postgresql94-docs-9.4.6-0.14.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5289</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5289" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5289" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5289" ref_url="https://www.suse.com/security/cve/CVE-2015-5289" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1907-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00033.html" source="SUSE-SU"/>
    <description>
    Multiple stack-based buffer overflows in json parsing in PostgreSQL before 9.3.x before 9.3.10 and 9.4.x before 9.4.5 allow attackers to cause a denial of service (server crash) via unspecified vectors, which are not properly handled in (1) json or (2) jsonb values.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5289/">CVE-2015-5289</cve>
	<bugzilla href="https://bugzilla.suse.com/949669">SUSE bug 949669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949670">SUSE bug 949670</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567044" comment="libecpg6-9.4.5-0.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567045" comment="libpq5-9.4.5-0.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567046" comment="libpq5-32bit-9.4.5-0.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567047" comment="postgresql94-9.4.5-0.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567048" comment="postgresql94-docs-9.4.5-0.8.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567423" comment="libecpg6-9.4.6-0.14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567424" comment="libpq5-9.4.6-0.14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567425" comment="libpq5-32bit-9.4.6-0.14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567426" comment="postgresql94-9.4.6-0.14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567427" comment="postgresql94-docs-9.4.6-0.14.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5292</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5292" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5292" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5292" ref_url="https://www.suse.com/security/cve/CVE-2015-5292" source="SUSE CVE"/>
    <description>
    Memory leak in the Privilege Attribute Certificate (PAC) responder plugin (sssd_pac_plugin.so) in System Security Services Daemon (SSSD) 1.10 before 1.13.1 allows remote authenticated users to cause a denial of service (memory consumption) via a large number of logins that trigger parsing of PAC blobs during Kerberos authentication.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5292/">CVE-2015-5292</cve>
	<bugzilla href="https://bugzilla.suse.com/948819">SUSE bug 948819</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333946" comment="sssd is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5296</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5296" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5296" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5296" ref_url="https://www.suse.com/security/cve/CVE-2015-5296" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0032-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0164-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2354-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2356-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1106-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" source="SUSE-SU"/>
    <description>
    Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 supports connections that are encrypted but unsigned, which allows man-in-the-middle attackers to conduct encrypted-to-unencrypted downgrade attacks by modifying the client-server data stream, related to clidfs.c, libsmb_server.c, and smbXcli_base.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5296/">CVE-2015-5296</cve>
	<bugzilla href="https://bugzilla.suse.com/1058622">SUSE bug 1058622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958584">SUSE bug 958584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973031">SUSE bug 973031</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567124" comment="libldb1-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567125" comment="libldb1-32bit-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567126" comment="libsmbclient0-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567127" comment="libsmbclient0-32bit-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567128" comment="libtalloc2-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567129" comment="libtalloc2-32bit-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567130" comment="libtdb1-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567131" comment="libtdb1-32bit-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567132" comment="libtevent0-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567133" comment="libtevent0-32bit-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567134" comment="libwbclient0-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567135" comment="libwbclient0-32bit-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567136" comment="samba-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567137" comment="samba-32bit-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567138" comment="samba-client-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567139" comment="samba-client-32bit-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567140" comment="samba-doc-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567141" comment="samba-krb-printing-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567142" comment="samba-winbind-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567143" comment="samba-winbind-32bit-3.6.3-64.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155299" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5299</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5299" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5299" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5299" ref_url="https://www.suse.com/security/cve/CVE-2015-5299" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0032-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0164-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2354-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2356-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1106-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" source="SUSE-SU"/>
    <description>
    The shadow_copy2_get_shadow_copy_data function in modules/vfs_shadow_copy2.c in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 does not verify that the DIRECTORY_LIST access right has been granted, which allows remote attackers to access snapshots by visiting a shadow copy directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5299/">CVE-2015-5299</cve>
	<bugzilla href="https://bugzilla.suse.com/958583">SUSE bug 958583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567124" comment="libldb1-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567125" comment="libldb1-32bit-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567126" comment="libsmbclient0-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567127" comment="libsmbclient0-32bit-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567128" comment="libtalloc2-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567129" comment="libtalloc2-32bit-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567130" comment="libtdb1-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567131" comment="libtdb1-32bit-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567132" comment="libtevent0-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567133" comment="libtevent0-32bit-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567134" comment="libwbclient0-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567135" comment="libwbclient0-32bit-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567136" comment="samba-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567137" comment="samba-32bit-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567138" comment="samba-client-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567139" comment="samba-client-32bit-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567140" comment="samba-doc-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567141" comment="samba-krb-printing-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567142" comment="samba-winbind-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567143" comment="samba-winbind-32bit-3.6.3-64.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155307" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5307</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5307" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5307" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5307" ref_url="https://www.suse.com/security/cve/CVE-2015-5307" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2194-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2339-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2350-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0354-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2232-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2249-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2250-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5307/">CVE-2015-5307</cve>
	<bugzilla href="https://bugzilla.suse.com/953527">SUSE bug 953527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954018">SUSE bug 954018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954404">SUSE bug 954404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954405">SUSE bug 954405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962977">SUSE bug 962977</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566744" comment="kernel-bigsmp-devel-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566745" comment="kernel-default-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566746" comment="kernel-default-base-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566747" comment="kernel-default-devel-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566748" comment="kernel-default-extra-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566749" comment="kernel-pae-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566750" comment="kernel-pae-base-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566751" comment="kernel-pae-devel-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566752" comment="kernel-pae-extra-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566753" comment="kernel-source-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566754" comment="kernel-syms-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566755" comment="kernel-trace-devel-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566756" comment="kernel-xen-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566757" comment="kernel-xen-base-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566758" comment="kernel-xen-devel-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566759" comment="kernel-xen-extra-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567261" comment="xen-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567262" comment="xen-doc-html-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567263" comment="xen-doc-pdf-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567264" comment="xen-kmp-default-4.2.5_18_3.0.101_0.47.71-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567265" comment="xen-kmp-pae-4.2.5_18_3.0.101_0.47.71-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567266" comment="xen-libs-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567267" comment="xen-libs-32bit-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567268" comment="xen-tools-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567269" comment="xen-tools-domU-4.2.5_18-21.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567368" comment="kernel-default-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567369" comment="kernel-default-base-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567370" comment="kernel-default-devel-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567371" comment="kernel-default-extra-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567372" comment="kernel-pae-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567373" comment="kernel-pae-base-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567374" comment="kernel-pae-devel-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567375" comment="kernel-pae-extra-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567376" comment="kernel-source-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567377" comment="kernel-syms-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567378" comment="kernel-trace-devel-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567379" comment="kernel-xen-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567380" comment="kernel-xen-base-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567381" comment="kernel-xen-devel-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567382" comment="kernel-xen-extra-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567475" comment="xen-4.4.3_06-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567476" comment="xen-doc-html-4.4.3_06-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567477" comment="xen-kmp-default-4.4.3_06_3.0.101_65-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567478" comment="xen-kmp-pae-4.4.3_06_3.0.101_65-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567479" comment="xen-libs-4.4.3_06-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567480" comment="xen-libs-32bit-4.4.3_06-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567481" comment="xen-tools-4.4.3_06-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567482" comment="xen-tools-domU-4.4.3_06-29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5310</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5310" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5310" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5310" ref_url="https://www.suse.com/security/cve/CVE-2015-5310" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002272.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2357-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00075.html" source="SUSE-SU"/>
    <description>
    The WNM Sleep Mode code in wpa_supplicant 2.x before 2.6 does not properly ignore key data in response frames when management frame protection (MFP) was not negotiated, which allows remote attackers to inject arbitrary broadcast or multicast packets or cause a denial of service (ignored packets) via a WNM Sleep Mode response.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5310/">CVE-2015-5310</cve>
	<bugzilla href="https://bugzilla.suse.com/952254">SUSE bug 952254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953115">SUSE bug 953115</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334146" comment="wpa_supplicant is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5312</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5312" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5312" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5312" ref_url="https://www.suse.com/security/cve/CVE-2015-5312" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2372-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0106-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html" source="SUSE-SU"/>
    <description>
    The xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.3 does not properly prevent entity expansion, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted XML data, a different vulnerability than CVE-2014-3660.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-10"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5312/">CVE-2015-5312</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957105">SUSE bug 957105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959469">SUSE bug 959469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566939" comment="libxml2-2.7.6-0.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566940" comment="libxml2-32bit-2.7.6-0.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566941" comment="libxml2-python-2.7.6-0.34.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5313</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5313" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5313" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5313" ref_url="https://www.suse.com/security/cve/CVE-2015-5313" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001977.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0209-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0216-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00082.html" source="SUSE-SU"/>
    <description>
    Directory traversal vulnerability in the virStorageBackendFileSystemVolCreate function in storage/storage_backend_fs.c in libvirt, when fine-grained Access Control Lists (ACL) are in effect, allows local users with storage_vol:create ACL but not domain:write permission to write to arbitrary files via a .. (dot dot) in a volume name.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5313/">CVE-2015-5313</cve>
	<bugzilla href="https://bugzilla.suse.com/953110">SUSE bug 953110</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333954" comment="libvirt is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567390" comment="libvirt-1.2.5-12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567391" comment="libvirt-client-1.2.5-12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567392" comment="libvirt-client-32bit-1.2.5-12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567393" comment="libvirt-doc-1.2.5-12.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155330" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5330</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5330" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5330" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5330" ref_url="https://www.suse.com/security/cve/CVE-2015-5330" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0032-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0164-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2354-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2356-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1106-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" source="SUSE-SU"/>
    <description>
    ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5330/">CVE-2015-5330</cve>
	<bugzilla href="https://bugzilla.suse.com/958581">SUSE bug 958581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958586">SUSE bug 958586</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567124" comment="libldb1-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567125" comment="libldb1-32bit-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567126" comment="libsmbclient0-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567127" comment="libsmbclient0-32bit-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567128" comment="libtalloc2-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567129" comment="libtalloc2-32bit-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567130" comment="libtdb1-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567131" comment="libtdb1-32bit-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567132" comment="libtevent0-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567133" comment="libtevent0-32bit-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567134" comment="libwbclient0-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567135" comment="libwbclient0-32bit-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567136" comment="samba-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567137" comment="samba-32bit-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567138" comment="samba-client-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567139" comment="samba-client-32bit-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567140" comment="samba-doc-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567141" comment="samba-krb-printing-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567142" comment="samba-winbind-3.6.3-64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567143" comment="samba-winbind-32bit-3.6.3-64.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5352</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5352" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5352" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5352" ref_url="https://www.suse.com/security/cve/CVE-2015-5352" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1547-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001650.html" source="SUSE-SU"/>
		<reference ref_id="TID7022096" ref_url="https://www.suse.com/support/kb/doc/?id=7022096" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
    <description>
    The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5352/">CVE-2015-5352</cve>
	<bugzilla href="https://bugzilla.suse.com/1074631">SUSE bug 1074631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936695">SUSE bug 936695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938277">SUSE bug 938277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948086">SUSE bug 948086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996040">SUSE bug 996040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567018" comment="openssh-6.2p2-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567019" comment="openssh-askpass-6.2p2-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567020" comment="openssh-askpass-gnome-6.2p2-0.21.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567414" comment="openssh-6.6p1-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567415" comment="openssh-askpass-gnome-6.6p1-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567416" comment="openssh-helpers-6.6p1-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155364" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5364</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5364" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5364" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5364" ref_url="https://www.suse.com/security/cve/CVE-2015-5364" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1478-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1487-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1488-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1489-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1491-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1611-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001706.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
    <description>
    The (1) udp_recvmsg and (2) udpv6_recvmsg functions in the Linux kernel before 4.0.6 do not properly consider yielding a processor, which allows remote attackers to cause a denial of service (system hang) via incorrect checksums within a UDP packet flood.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-09"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5364/">CVE-2015-5364</cve>
	<bugzilla href="https://bugzilla.suse.com/781018">SUSE bug 781018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936831">SUSE bug 936831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939276">SUSE bug 939276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945112">SUSE bug 945112</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566727" comment="kernel-bigsmp-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566728" comment="kernel-default-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566729" comment="kernel-default-base-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566730" comment="kernel-default-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566731" comment="kernel-default-extra-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566732" comment="kernel-pae-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566733" comment="kernel-pae-base-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566734" comment="kernel-pae-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566735" comment="kernel-pae-extra-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566736" comment="kernel-source-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566737" comment="kernel-syms-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566738" comment="kernel-trace-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566739" comment="kernel-xen-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566740" comment="kernel-xen-base-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566741" comment="kernel-xen-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566742" comment="kernel-xen-extra-3.0.101-0.47.67.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567338" comment="kernel-default-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567339" comment="kernel-default-base-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567340" comment="kernel-default-devel-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567341" comment="kernel-default-extra-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567342" comment="kernel-pae-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567343" comment="kernel-pae-base-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567344" comment="kernel-pae-devel-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567345" comment="kernel-pae-extra-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567346" comment="kernel-source-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567347" comment="kernel-syms-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567348" comment="kernel-trace-devel-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567349" comment="kernel-xen-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567350" comment="kernel-xen-base-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567351" comment="kernel-xen-devel-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567352" comment="kernel-xen-extra-3.0.101-65.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155366" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5366</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5366" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5366" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5366" ref_url="https://www.suse.com/security/cve/CVE-2015-5366" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1478-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1487-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1488-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1489-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1491-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1611-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001706.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
    <description>
    The (1) udp_recvmsg and (2) udpv6_recvmsg functions in the Linux kernel before 4.0.6 provide inappropriate -EAGAIN return values, which allows remote attackers to cause a denial of service (EPOLLET epoll application read outage) via an incorrect checksum in a UDP packet, a different vulnerability than CVE-2015-5364.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-10"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5366/">CVE-2015-5366</cve>
	<bugzilla href="https://bugzilla.suse.com/781018">SUSE bug 781018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936831">SUSE bug 936831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939276">SUSE bug 939276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945112">SUSE bug 945112</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566727" comment="kernel-bigsmp-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566728" comment="kernel-default-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566729" comment="kernel-default-base-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566730" comment="kernel-default-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566731" comment="kernel-default-extra-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566732" comment="kernel-pae-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566733" comment="kernel-pae-base-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566734" comment="kernel-pae-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566735" comment="kernel-pae-extra-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566736" comment="kernel-source-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566737" comment="kernel-syms-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566738" comment="kernel-trace-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566739" comment="kernel-xen-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566740" comment="kernel-xen-base-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566741" comment="kernel-xen-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566742" comment="kernel-xen-extra-3.0.101-0.47.67.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567338" comment="kernel-default-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567339" comment="kernel-default-base-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567340" comment="kernel-default-devel-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567341" comment="kernel-default-extra-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567342" comment="kernel-pae-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567343" comment="kernel-pae-base-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567344" comment="kernel-pae-devel-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567345" comment="kernel-pae-extra-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567346" comment="kernel-source-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567347" comment="kernel-syms-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567348" comment="kernel-trace-devel-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567349" comment="kernel-xen-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567350" comment="kernel-xen-base-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567351" comment="kernel-xen-devel-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567352" comment="kernel-xen-extra-3.0.101-65.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5370</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5370" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5370" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5370" ref_url="https://www.suse.com/security/cve/CVE-2015-5370" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1023-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1024-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1028-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="TID7017473" ref_url="https://www.suse.com/support/kb/doc?id=7017473" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1106-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" source="SUSE-SU"/>
    <description>
    Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not properly implement the DCE-RPC layer, which allows remote attackers to perform protocol-downgrade attacks, cause a denial of service (application crash or CPU consumption), or possibly execute arbitrary code on a client system via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-03-03"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5370/">CVE-2015-5370</cve>
	<bugzilla href="https://bugzilla.suse.com/936862">SUSE bug 936862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975276">SUSE bug 975276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977416">SUSE bug 977416</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334264" comment="samba4 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5477</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5477" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5477" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5477" ref_url="https://www.suse.com/security/cve/CVE-2015-5477" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1316-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1322-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0227-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="TID7016709" ref_url="https://www.suse.com/support/kb/doc?id=7016709" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1335-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00001.html" source="SUSE-SU"/>
    <description>
    named in ISC BIND 9.x before 9.9.7-P2 and 9.10.x before 9.10.2-P3 allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) via TKEY queries.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5477/">CVE-2015-5477</cve>
	<bugzilla href="https://bugzilla.suse.com/1000362">SUSE bug 1000362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939567">SUSE bug 939567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980168">SUSE bug 980168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566356" comment="bind-libs-9.9.6P1-0.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566357" comment="bind-libs-32bit-9.9.6P1-0.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566358" comment="bind-utils-9.9.6P1-0.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5522</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5522" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5522" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5522" ref_url="https://www.suse.com/security/cve/CVE-2015-5522" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001586.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the ParseValue function in lexer.c in tidy before 4.9.31 allows remote attackers to cause a denial of service (crash) via vectors involving a command character in an href.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5522/">CVE-2015-5522</cve>
	<bugzilla href="https://bugzilla.suse.com/933588">SUSE bug 933588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567152" comment="libtidy-1.0-37.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5523</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5523" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5523" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5523" ref_url="https://www.suse.com/security/cve/CVE-2015-5523" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001586.html" source="SUSE-SU"/>
    <description>
    The ParseValue function in lexer.c in tidy before 4.9.31 allows remote attackers to cause a denial of service (crash) via vectors involving multiple whitespace characters before an empty href, which triggers a large memory allocation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5523/">CVE-2015-5523</cve>
	<bugzilla href="https://bugzilla.suse.com/933588">SUSE bug 933588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567152" comment="libtidy-1.0-37.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5539</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5539" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5539" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5539" ref_url="https://www.suse.com/security/cve/CVE-2015-5539" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5127, CVE-2015-5130, CVE-2015-5134, CVE-2015-5540, CVE-2015-5550, CVE-2015-5551, CVE-2015-5556, CVE-2015-5557, CVE-2015-5559, CVE-2015-5561, CVE-2015-5563, CVE-2015-5564, and CVE-2015-5565.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5539/">CVE-2015-5539</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566544" comment="flash-player-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566545" comment="flash-player-gnome-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566546" comment="flash-player-kde4-11.2.202.508-0.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5540</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5540" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5540" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5540" ref_url="https://www.suse.com/security/cve/CVE-2015-5540" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5127, CVE-2015-5130, CVE-2015-5134, CVE-2015-5539, CVE-2015-5550, CVE-2015-5551, CVE-2015-5556, CVE-2015-5557, CVE-2015-5559, CVE-2015-5561, CVE-2015-5563, CVE-2015-5564, and CVE-2015-5565.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5540/">CVE-2015-5540</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566544" comment="flash-player-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566545" comment="flash-player-gnome-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566546" comment="flash-player-kde4-11.2.202.508-0.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5541</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5541" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5541" ref_url="https://www.suse.com/security/cve/CVE-2015-5541" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5129.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5541/">CVE-2015-5541</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566544" comment="flash-player-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566545" comment="flash-player-gnome-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566546" comment="flash-player-kde4-11.2.202.508-0.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5544</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5544" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5544" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5544" ref_url="https://www.suse.com/security/cve/CVE-2015-5544" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5545, CVE-2015-5546, CVE-2015-5547, CVE-2015-5548, CVE-2015-5549, CVE-2015-5552, and CVE-2015-5553.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5544/">CVE-2015-5544</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566544" comment="flash-player-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566545" comment="flash-player-gnome-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566546" comment="flash-player-kde4-11.2.202.508-0.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5545</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5545" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5545" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5545" ref_url="https://www.suse.com/security/cve/CVE-2015-5545" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5544, CVE-2015-5546, CVE-2015-5547, CVE-2015-5548, CVE-2015-5549, CVE-2015-5552, and CVE-2015-5553.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5545/">CVE-2015-5545</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566544" comment="flash-player-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566545" comment="flash-player-gnome-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566546" comment="flash-player-kde4-11.2.202.508-0.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5546</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5546" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5546" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5546" ref_url="https://www.suse.com/security/cve/CVE-2015-5546" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5544, CVE-2015-5545, CVE-2015-5547, CVE-2015-5548, CVE-2015-5549, CVE-2015-5552, and CVE-2015-5553.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5546/">CVE-2015-5546</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566544" comment="flash-player-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566545" comment="flash-player-gnome-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566546" comment="flash-player-kde4-11.2.202.508-0.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5547</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5547" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5547" ref_url="https://www.suse.com/security/cve/CVE-2015-5547" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5544, CVE-2015-5545, CVE-2015-5546, CVE-2015-5548, CVE-2015-5549, CVE-2015-5552, and CVE-2015-5553.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5547/">CVE-2015-5547</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566544" comment="flash-player-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566545" comment="flash-player-gnome-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566546" comment="flash-player-kde4-11.2.202.508-0.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5548</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5548" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5548" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5548" ref_url="https://www.suse.com/security/cve/CVE-2015-5548" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5544, CVE-2015-5545, CVE-2015-5546, CVE-2015-5547, CVE-2015-5549, CVE-2015-5552, and CVE-2015-5553.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5548/">CVE-2015-5548</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566544" comment="flash-player-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566545" comment="flash-player-gnome-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566546" comment="flash-player-kde4-11.2.202.508-0.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5549</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5549" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5549" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5549" ref_url="https://www.suse.com/security/cve/CVE-2015-5549" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5544, CVE-2015-5545, CVE-2015-5546, CVE-2015-5547, CVE-2015-5548, CVE-2015-5552, and CVE-2015-5553.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5549/">CVE-2015-5549</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566544" comment="flash-player-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566545" comment="flash-player-gnome-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566546" comment="flash-player-kde4-11.2.202.508-0.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5550</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5550" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5550" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5550" ref_url="https://www.suse.com/security/cve/CVE-2015-5550" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5127, CVE-2015-5130, CVE-2015-5134, CVE-2015-5539, CVE-2015-5540, CVE-2015-5551, CVE-2015-5556, CVE-2015-5557, CVE-2015-5559, CVE-2015-5561, CVE-2015-5563, CVE-2015-5564, and CVE-2015-5565.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5550/">CVE-2015-5550</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566544" comment="flash-player-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566545" comment="flash-player-gnome-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566546" comment="flash-player-kde4-11.2.202.508-0.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5551</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5551" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5551" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5551" ref_url="https://www.suse.com/security/cve/CVE-2015-5551" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5127, CVE-2015-5130, CVE-2015-5134, CVE-2015-5539, CVE-2015-5540, CVE-2015-5550, CVE-2015-5556, CVE-2015-5557, CVE-2015-5559, CVE-2015-5561, CVE-2015-5563, CVE-2015-5564, and CVE-2015-5565.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5551/">CVE-2015-5551</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566544" comment="flash-player-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566545" comment="flash-player-gnome-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566546" comment="flash-player-kde4-11.2.202.508-0.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5552</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5552" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5552" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5552" ref_url="https://www.suse.com/security/cve/CVE-2015-5552" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5544, CVE-2015-5545, CVE-2015-5546, CVE-2015-5547, CVE-2015-5548, CVE-2015-5549, and CVE-2015-5553.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5552/">CVE-2015-5552</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566544" comment="flash-player-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566545" comment="flash-player-gnome-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566546" comment="flash-player-kde4-11.2.202.508-0.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5553</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5553" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5553" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5553" ref_url="https://www.suse.com/security/cve/CVE-2015-5553" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5544, CVE-2015-5545, CVE-2015-5546, CVE-2015-5547, CVE-2015-5548, CVE-2015-5549, and CVE-2015-5552.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5553/">CVE-2015-5553</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566544" comment="flash-player-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566545" comment="flash-player-gnome-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566546" comment="flash-player-kde4-11.2.202.508-0.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5554</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5554" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5554" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5554" ref_url="https://www.suse.com/security/cve/CVE-2015-5554" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2015-5555, CVE-2015-5558, and CVE-2015-5562.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5554/">CVE-2015-5554</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566544" comment="flash-player-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566545" comment="flash-player-gnome-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566546" comment="flash-player-kde4-11.2.202.508-0.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5555</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5555" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5555" ref_url="https://www.suse.com/security/cve/CVE-2015-5555" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2015-5554, CVE-2015-5558, and CVE-2015-5562.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5555/">CVE-2015-5555</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566544" comment="flash-player-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566545" comment="flash-player-gnome-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566546" comment="flash-player-kde4-11.2.202.508-0.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5556</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5556" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5556" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5556" ref_url="https://www.suse.com/security/cve/CVE-2015-5556" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5127, CVE-2015-5130, CVE-2015-5134, CVE-2015-5539, CVE-2015-5540, CVE-2015-5550, CVE-2015-5551, CVE-2015-5557, CVE-2015-5559, CVE-2015-5561, CVE-2015-5563, CVE-2015-5564, and CVE-2015-5565.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5556/">CVE-2015-5556</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566544" comment="flash-player-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566545" comment="flash-player-gnome-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566546" comment="flash-player-kde4-11.2.202.508-0.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5557</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5557" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5557" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5557" ref_url="https://www.suse.com/security/cve/CVE-2015-5557" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5127, CVE-2015-5130, CVE-2015-5134, CVE-2015-5539, CVE-2015-5540, CVE-2015-5550, CVE-2015-5551, CVE-2015-5556, CVE-2015-5559, CVE-2015-5561, CVE-2015-5563, CVE-2015-5564, and CVE-2015-5565.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5557/">CVE-2015-5557</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566544" comment="flash-player-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566545" comment="flash-player-gnome-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566546" comment="flash-player-kde4-11.2.202.508-0.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5558</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5558" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5558" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5558" ref_url="https://www.suse.com/security/cve/CVE-2015-5558" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2015-5554, CVE-2015-5555, and CVE-2015-5562.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5558/">CVE-2015-5558</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566544" comment="flash-player-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566545" comment="flash-player-gnome-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566546" comment="flash-player-kde4-11.2.202.508-0.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5559</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5559" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5559" ref_url="https://www.suse.com/security/cve/CVE-2015-5559" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5127, CVE-2015-5130, CVE-2015-5134, CVE-2015-5539, CVE-2015-5540, CVE-2015-5550, CVE-2015-5551, CVE-2015-5556, CVE-2015-5557, CVE-2015-5561, CVE-2015-5563, CVE-2015-5564, and CVE-2015-5565.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5559/">CVE-2015-5559</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566544" comment="flash-player-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566545" comment="flash-player-gnome-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566546" comment="flash-player-kde4-11.2.202.508-0.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5560</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5560" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5560" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5560" ref_url="https://www.suse.com/security/cve/CVE-2015-5560" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Integer overflow in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5560/">CVE-2015-5560</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566544" comment="flash-player-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566545" comment="flash-player-gnome-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566546" comment="flash-player-kde4-11.2.202.508-0.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5561</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5561" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5561" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5561" ref_url="https://www.suse.com/security/cve/CVE-2015-5561" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5127, CVE-2015-5130, CVE-2015-5134, CVE-2015-5539, CVE-2015-5540, CVE-2015-5550, CVE-2015-5551, CVE-2015-5556, CVE-2015-5557, CVE-2015-5559, CVE-2015-5563, CVE-2015-5564, and CVE-2015-5565.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5561/">CVE-2015-5561</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566544" comment="flash-player-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566545" comment="flash-player-gnome-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566546" comment="flash-player-kde4-11.2.202.508-0.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5562</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5562" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5562" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5562" ref_url="https://www.suse.com/security/cve/CVE-2015-5562" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2015-5554, CVE-2015-5555, and CVE-2015-5558.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5562/">CVE-2015-5562</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566544" comment="flash-player-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566545" comment="flash-player-gnome-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566546" comment="flash-player-kde4-11.2.202.508-0.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5563</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5563" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5563" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5563" ref_url="https://www.suse.com/security/cve/CVE-2015-5563" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5127, CVE-2015-5130, CVE-2015-5134, CVE-2015-5539, CVE-2015-5540, CVE-2015-5550, CVE-2015-5551, CVE-2015-5556, CVE-2015-5557, CVE-2015-5559, CVE-2015-5561, CVE-2015-5564, and CVE-2015-5565.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5563/">CVE-2015-5563</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566544" comment="flash-player-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566545" comment="flash-player-gnome-11.2.202.508-0.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566546" comment="flash-player-kde4-11.2.202.508-0.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5567</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5567" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5567" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5567" ref_url="https://www.suse.com/security/cve/CVE-2015-5567" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 allow attackers to execute arbitrary code or cause a denial of service (stack memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5579.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5567/">CVE-2015-5567</cve>
	<bugzilla href="https://bugzilla.suse.com/946880">SUSE bug 946880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566547" comment="flash-player-11.2.202.521-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566548" comment="flash-player-gnome-11.2.202.521-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566549" comment="flash-player-kde4-11.2.202.521-0.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5568</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5568" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5568" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5568" ref_url="https://www.suse.com/security/cve/CVE-2015-5568" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 allow attackers to cause a denial of service (vector-length corruption) or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5568/">CVE-2015-5568</cve>
	<bugzilla href="https://bugzilla.suse.com/946880">SUSE bug 946880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566547" comment="flash-player-11.2.202.521-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566548" comment="flash-player-gnome-11.2.202.521-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566549" comment="flash-player-kde4-11.2.202.521-0.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5569</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5569" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5569" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5569" ref_url="https://www.suse.com/security/cve/CVE-2015-5569" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1740-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1742-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1744-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK &amp; Compiler before 19.0.0.213 improperly implement the Flash broker API, which has unspecified impact and attack vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5569/">CVE-2015-5569</cve>
	<bugzilla href="https://bugzilla.suse.com/950169">SUSE bug 950169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566550" comment="flash-player-11.2.202.535-0.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566551" comment="flash-player-gnome-11.2.202.535-0.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566552" comment="flash-player-kde4-11.2.202.535-0.20.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5570</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5570" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5570" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5570" ref_url="https://www.suse.com/security/cve/CVE-2015-5570" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5574, CVE-2015-5581, CVE-2015-5584, and CVE-2015-6682.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5570/">CVE-2015-5570</cve>
	<bugzilla href="https://bugzilla.suse.com/946880">SUSE bug 946880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566547" comment="flash-player-11.2.202.521-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566548" comment="flash-player-gnome-11.2.202.521-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566549" comment="flash-player-kde4-11.2.202.521-0.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5571</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5571" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5571" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5571" ref_url="https://www.suse.com/security/cve/CVE-2015-5571" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 do not properly restrict the SWF file format, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks against JSONP endpoints, and obtain sensitive information, via a crafted OBJECT element with SWF content satisfying the character-set requirements of a callback API.  NOTE: this issue exists because of an incomplete fix for CVE-2014-4671 and CVE-2014-5333.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5571/">CVE-2015-5571</cve>
	<bugzilla href="https://bugzilla.suse.com/946880">SUSE bug 946880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566547" comment="flash-player-11.2.202.521-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566548" comment="flash-player-gnome-11.2.202.521-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566549" comment="flash-player-kde4-11.2.202.521-0.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5572</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5572" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5572" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5572" ref_url="https://www.suse.com/security/cve/CVE-2015-5572" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 allow attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5572/">CVE-2015-5572</cve>
	<bugzilla href="https://bugzilla.suse.com/946880">SUSE bug 946880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566547" comment="flash-player-11.2.202.521-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566548" comment="flash-player-gnome-11.2.202.521-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566549" comment="flash-player-kde4-11.2.202.521-0.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5573</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5573" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5573" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5573" ref_url="https://www.suse.com/security/cve/CVE-2015-5573" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5573/">CVE-2015-5573</cve>
	<bugzilla href="https://bugzilla.suse.com/946880">SUSE bug 946880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566547" comment="flash-player-11.2.202.521-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566548" comment="flash-player-gnome-11.2.202.521-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566549" comment="flash-player-kde4-11.2.202.521-0.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5574</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5574" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5574" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5574" ref_url="https://www.suse.com/security/cve/CVE-2015-5574" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5570, CVE-2015-5581, CVE-2015-5584, and CVE-2015-6682.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5574/">CVE-2015-5574</cve>
	<bugzilla href="https://bugzilla.suse.com/946880">SUSE bug 946880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566547" comment="flash-player-11.2.202.521-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566548" comment="flash-player-gnome-11.2.202.521-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566549" comment="flash-player-kde4-11.2.202.521-0.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5575</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5575" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5575" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5575" ref_url="https://www.suse.com/security/cve/CVE-2015-5575" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5577, CVE-2015-5578, CVE-2015-5580, CVE-2015-5582, CVE-2015-5588, and CVE-2015-6677.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5575/">CVE-2015-5575</cve>
	<bugzilla href="https://bugzilla.suse.com/946880">SUSE bug 946880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566547" comment="flash-player-11.2.202.521-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566548" comment="flash-player-gnome-11.2.202.521-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566549" comment="flash-player-kde4-11.2.202.521-0.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5576</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5576" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5576" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5576" ref_url="https://www.suse.com/security/cve/CVE-2015-5576" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 do not properly restrict discovery of memory addresses, which allows attackers to bypass the ASLR protection mechanism via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5576/">CVE-2015-5576</cve>
	<bugzilla href="https://bugzilla.suse.com/946880">SUSE bug 946880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566547" comment="flash-player-11.2.202.521-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566548" comment="flash-player-gnome-11.2.202.521-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566549" comment="flash-player-kde4-11.2.202.521-0.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5577</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5577" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5577" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5577" ref_url="https://www.suse.com/security/cve/CVE-2015-5577" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5575, CVE-2015-5578, CVE-2015-5580, CVE-2015-5582, CVE-2015-5588, and CVE-2015-6677.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5577/">CVE-2015-5577</cve>
	<bugzilla href="https://bugzilla.suse.com/946880">SUSE bug 946880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566547" comment="flash-player-11.2.202.521-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566548" comment="flash-player-gnome-11.2.202.521-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566549" comment="flash-player-kde4-11.2.202.521-0.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5578</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5578" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5578" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5578" ref_url="https://www.suse.com/security/cve/CVE-2015-5578" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5575, CVE-2015-5577, CVE-2015-5580, CVE-2015-5582, CVE-2015-5588, and CVE-2015-6677.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5578/">CVE-2015-5578</cve>
	<bugzilla href="https://bugzilla.suse.com/946880">SUSE bug 946880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566547" comment="flash-player-11.2.202.521-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566548" comment="flash-player-gnome-11.2.202.521-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566549" comment="flash-player-kde4-11.2.202.521-0.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155579" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5579</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5579" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5579" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5579" ref_url="https://www.suse.com/security/cve/CVE-2015-5579" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 allow attackers to execute arbitrary code or cause a denial of service (stack memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5567.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5579/">CVE-2015-5579</cve>
	<bugzilla href="https://bugzilla.suse.com/946880">SUSE bug 946880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566547" comment="flash-player-11.2.202.521-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566548" comment="flash-player-gnome-11.2.202.521-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566549" comment="flash-player-kde4-11.2.202.521-0.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5580</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5580" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5580" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5580" ref_url="https://www.suse.com/security/cve/CVE-2015-5580" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5575, CVE-2015-5577, CVE-2015-5578, CVE-2015-5582, CVE-2015-5588, and CVE-2015-6677.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5580/">CVE-2015-5580</cve>
	<bugzilla href="https://bugzilla.suse.com/946880">SUSE bug 946880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566547" comment="flash-player-11.2.202.521-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566548" comment="flash-player-gnome-11.2.202.521-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566549" comment="flash-player-kde4-11.2.202.521-0.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5581</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5581" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5581" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5581" ref_url="https://www.suse.com/security/cve/CVE-2015-5581" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5570, CVE-2015-5574, CVE-2015-5584, and CVE-2015-6682.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5581/">CVE-2015-5581</cve>
	<bugzilla href="https://bugzilla.suse.com/946880">SUSE bug 946880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566547" comment="flash-player-11.2.202.521-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566548" comment="flash-player-gnome-11.2.202.521-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566549" comment="flash-player-kde4-11.2.202.521-0.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5582</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5582" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5582" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5582" ref_url="https://www.suse.com/security/cve/CVE-2015-5582" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5575, CVE-2015-5577, CVE-2015-5578, CVE-2015-5580, CVE-2015-5588, and CVE-2015-6677.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5582/">CVE-2015-5582</cve>
	<bugzilla href="https://bugzilla.suse.com/946880">SUSE bug 946880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566547" comment="flash-player-11.2.202.521-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566548" comment="flash-player-gnome-11.2.202.521-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566549" comment="flash-player-kde4-11.2.202.521-0.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5584</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5584" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5584" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5584" ref_url="https://www.suse.com/security/cve/CVE-2015-5584" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5570, CVE-2015-5574, CVE-2015-5581, and CVE-2015-6682.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5584/">CVE-2015-5584</cve>
	<bugzilla href="https://bugzilla.suse.com/946880">SUSE bug 946880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566547" comment="flash-player-11.2.202.521-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566548" comment="flash-player-gnome-11.2.202.521-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566549" comment="flash-player-kde4-11.2.202.521-0.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5587</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5587" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5587" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5587" ref_url="https://www.suse.com/security/cve/CVE-2015-5587" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5587/">CVE-2015-5587</cve>
	<bugzilla href="https://bugzilla.suse.com/946880">SUSE bug 946880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566547" comment="flash-player-11.2.202.521-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566548" comment="flash-player-gnome-11.2.202.521-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566549" comment="flash-player-kde4-11.2.202.521-0.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5588</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5588" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5588" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5588" ref_url="https://www.suse.com/security/cve/CVE-2015-5588" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5575, CVE-2015-5577, CVE-2015-5578, CVE-2015-5580, CVE-2015-5582, and CVE-2015-6677.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5588/">CVE-2015-5588</cve>
	<bugzilla href="https://bugzilla.suse.com/946880">SUSE bug 946880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566547" comment="flash-player-11.2.202.521-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566548" comment="flash-player-gnome-11.2.202.521-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566549" comment="flash-player-kde4-11.2.202.521-0.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5600</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5600" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5600" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5600" ref_url="https://www.suse.com/security/cve/CVE-2015-5600" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1547-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001650.html" source="SUSE-SU"/>
		<reference ref_id="TID7022096" ref_url="https://www.suse.com/support/kb/doc/?id=7022096" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
    <description>
    The kbdint_next_device function in auth2-chall.c in sshd in OpenSSH through 6.9 does not properly restrict the processing of keyboard-interactive devices within a single connection, which makes it easier for remote attackers to conduct brute-force attacks or cause a denial of service (CPU consumption) via a long and duplicative list in the ssh -oKbdInteractiveDevices option, as demonstrated by a modified client that provides a different password for each pam element on this list.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5600/">CVE-2015-5600</cve>
	<bugzilla href="https://bugzilla.suse.com/1009988">SUSE bug 1009988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074631">SUSE bug 1074631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938746">SUSE bug 938746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943006">SUSE bug 943006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943007">SUSE bug 943007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943010">SUSE bug 943010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943504">SUSE bug 943504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945985">SUSE bug 945985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948086">SUSE bug 948086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954457">SUSE bug 954457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957883">SUSE bug 957883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996040">SUSE bug 996040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567018" comment="openssh-6.2p2-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567019" comment="openssh-askpass-6.2p2-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567020" comment="openssh-askpass-gnome-6.2p2-0.21.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567414" comment="openssh-6.6p1-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567415" comment="openssh-askpass-gnome-6.6p1-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567416" comment="openssh-helpers-6.6p1-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5621</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5621" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5621" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5621" ref_url="https://www.suse.com/security/cve/CVE-2015-5621" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001593.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1502-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The snmp_pdu_parse function in snmp_api.c in net-snmp 5.7.2 and earlier does not remove the varBind variable in a netsnmp_variable_list item when parsing of the SNMP PDU fails, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-11-12"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5621/">CVE-2015-5621</cve>
	<bugzilla href="https://bugzilla.suse.com/1111123">SUSE bug 1111123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940188">SUSE bug 940188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969779">SUSE bug 969779</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566990" comment="libsnmp15-5.4.2.1-8.12.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563731" comment="libsnmp15-32bit-5.4.2.1-8.12.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566991" comment="net-snmp-5.4.2.1-8.12.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566992" comment="perl-SNMP-5.4.2.1-8.12.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566993" comment="snmp-mibs-5.4.2.1-8.12.24.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5706</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5706" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5706" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5706" ref_url="https://www.suse.com/security/cve/CVE-2015-5706" source="SUSE CVE"/>
    <description>
    Use-after-free vulnerability in the path_openat function in fs/namei.c in the Linux kernel 3.x and 4.x before 4.0.4 allows local users to cause a denial of service or possibly have unspecified other impact via O_TMPFILE filesystem operations that leverage a duplicate cleanup operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5706/">CVE-2015-5706</cve>
	<bugzilla href="https://bugzilla.suse.com/940339">SUSE bug 940339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5707</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5707" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5707" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5707" ref_url="https://www.suse.com/security/cve/CVE-2015-5707" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1478-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1611-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2085-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2087-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2089-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2090-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2091-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0585-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1842-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the sg_start_req function in drivers/scsi/sg.c in the Linux kernel 2.6.x through 4.x before 4.1 allows local users to cause a denial of service or possibly have unspecified other impact via a large iov_count value in a write request.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5707/">CVE-2015-5707</cve>
	<bugzilla href="https://bugzilla.suse.com/923755">SUSE bug 923755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940338">SUSE bug 940338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940342">SUSE bug 940342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963994">SUSE bug 963994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566727" comment="kernel-bigsmp-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566728" comment="kernel-default-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566729" comment="kernel-default-base-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566730" comment="kernel-default-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566731" comment="kernel-default-extra-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566732" comment="kernel-pae-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566733" comment="kernel-pae-base-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566734" comment="kernel-pae-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566735" comment="kernel-pae-extra-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566736" comment="kernel-source-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566737" comment="kernel-syms-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566738" comment="kernel-trace-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566739" comment="kernel-xen-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566740" comment="kernel-xen-base-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566741" comment="kernel-xen-devel-3.0.101-0.47.67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566742" comment="kernel-xen-extra-3.0.101-0.47.67.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567338" comment="kernel-default-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567339" comment="kernel-default-base-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567340" comment="kernel-default-devel-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567341" comment="kernel-default-extra-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567342" comment="kernel-pae-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567343" comment="kernel-pae-base-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567344" comment="kernel-pae-devel-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567345" comment="kernel-pae-extra-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567346" comment="kernel-source-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567347" comment="kernel-syms-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567348" comment="kernel-trace-devel-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567349" comment="kernel-xen-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567350" comment="kernel-xen-base-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567351" comment="kernel-xen-devel-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567352" comment="kernel-xen-extra-3.0.101-65.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5722</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5722" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5722" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5722" ref_url="https://www.suse.com/security/cve/CVE-2015-5722" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1480-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1496-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0227-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1597-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1667-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00002.html" source="SUSE-SU"/>
    <description>
    buffer.c in named in ISC BIND 9.x before 9.9.7-P3 and 9.10.x before 9.10.2-P4 allows remote attackers to cause a denial of service (assertion failure and daemon exit) by creating a zone containing a malformed DNSSEC key and issuing a query for a name in that zone.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5722/">CVE-2015-5722</cve>
	<bugzilla href="https://bugzilla.suse.com/944066">SUSE bug 944066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944107">SUSE bug 944107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954983">SUSE bug 954983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958861">SUSE bug 958861</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566359" comment="bind-libs-9.9.6P1-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566360" comment="bind-libs-32bit-9.9.6P1-0.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566361" comment="bind-utils-9.9.6P1-0.15.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5745</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5745" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5745" ref_url="https://www.suse.com/security/cve/CVE-2015-5745" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the send_control_msg function in hw/char/virtio-serial-bus.c in QEMU before 2.4.0 allows guest users to cause a denial of service (QEMU process crash) via a crafted virtio control message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5745/">CVE-2015-5745</cve>
	<bugzilla href="https://bugzilla.suse.com/940929">SUSE bug 940929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6241</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6241" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6241" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6241" ref_url="https://www.suse.com/security/cve/CVE-2015-6241" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1676-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001625.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1836-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1836-2" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00057.html" source="SUSE-SU"/>
    <description>
    The proto_tree_add_bytes_item function in epan/proto.c in the protocol-tree implementation in Wireshark 1.12.x before 1.12.7 does not properly terminate a data structure after a failure to locate a number within a string, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6241/">CVE-2015-6241</cve>
	<bugzilla href="https://bugzilla.suse.com/941500">SUSE bug 941500</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563893" comment="wireshark-1.12.7-0.5.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6242</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6242" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6242" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6242" ref_url="https://www.suse.com/security/cve/CVE-2015-6242" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1676-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001625.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1836-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1836-2" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00057.html" source="SUSE-SU"/>
    <description>
    The wmem_block_split_free_chunk function in epan/wmem/wmem_allocator_block.c in the wmem block allocator in the memory manager in Wireshark 1.12.x before 1.12.7 does not properly consider a certain case of multiple realloc operations that restore a memory chunk to its original size, which allows remote attackers to cause a denial of service (incorrect free operation and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6242/">CVE-2015-6242</cve>
	<bugzilla href="https://bugzilla.suse.com/941500">SUSE bug 941500</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563893" comment="wireshark-1.12.7-0.5.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6243</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6243" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6243" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6243" ref_url="https://www.suse.com/security/cve/CVE-2015-6243" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1676-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001625.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1836-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1836-2" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00057.html" source="SUSE-SU"/>
    <description>
    The dissector-table implementation in epan/packet.c in Wireshark 1.12.x before 1.12.7 mishandles table searches for empty strings, which allows remote attackers to cause a denial of service (application crash) via a crafted packet, related to the (1) dissector_get_string_handle and (2) dissector_get_default_string_handle functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6243/">CVE-2015-6243</cve>
	<bugzilla href="https://bugzilla.suse.com/941500">SUSE bug 941500</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563893" comment="wireshark-1.12.7-0.5.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6244</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6244" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6244" ref_url="https://www.suse.com/security/cve/CVE-2015-6244" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1676-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001625.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1836-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1836-2" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00057.html" source="SUSE-SU"/>
    <description>
    The dissect_zbee_secure function in epan/dissectors/packet-zbee-security.c in the ZigBee dissector in Wireshark 1.12.x before 1.12.7 improperly relies on length fields contained in packet data, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6244/">CVE-2015-6244</cve>
	<bugzilla href="https://bugzilla.suse.com/941500">SUSE bug 941500</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563893" comment="wireshark-1.12.7-0.5.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6245</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6245" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6245" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6245" ref_url="https://www.suse.com/security/cve/CVE-2015-6245" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1676-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001625.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1836-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1836-2" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00057.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-gsm_rlcmac.c in the GSM RLC/MAC dissector in Wireshark 1.12.x before 1.12.7 uses incorrect integer data types, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6245/">CVE-2015-6245</cve>
	<bugzilla href="https://bugzilla.suse.com/941500">SUSE bug 941500</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563893" comment="wireshark-1.12.7-0.5.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156246" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6246</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6246" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6246" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6246" ref_url="https://www.suse.com/security/cve/CVE-2015-6246" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1676-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001625.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1836-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1836-2" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00057.html" source="SUSE-SU"/>
    <description>
    The dissect_wa_payload function in epan/dissectors/packet-waveagent.c in the WaveAgent dissector in Wireshark 1.12.x before 1.12.7 mishandles large tag values, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6246/">CVE-2015-6246</cve>
	<bugzilla href="https://bugzilla.suse.com/941500">SUSE bug 941500</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563893" comment="wireshark-1.12.7-0.5.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6247</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6247" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6247" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6247" ref_url="https://www.suse.com/security/cve/CVE-2015-6247" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1676-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001625.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1836-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1836-2" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00057.html" source="SUSE-SU"/>
    <description>
    The dissect_openflow_tablemod_v5 function in epan/dissectors/packet-openflow_v5.c in the OpenFlow dissector in Wireshark 1.12.x before 1.12.7 does not validate a certain offset value, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6247/">CVE-2015-6247</cve>
	<bugzilla href="https://bugzilla.suse.com/941500">SUSE bug 941500</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563893" comment="wireshark-1.12.7-0.5.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6248</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6248" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6248" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6248" ref_url="https://www.suse.com/security/cve/CVE-2015-6248" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1676-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001625.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1836-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1836-2" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00057.html" source="SUSE-SU"/>
    <description>
    The ptvcursor_add function in the ptvcursor implementation in epan/proto.c in Wireshark 1.12.x before 1.12.7 does not check whether the expected amount of data is available, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6248/">CVE-2015-6248</cve>
	<bugzilla href="https://bugzilla.suse.com/941500">SUSE bug 941500</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563893" comment="wireshark-1.12.7-0.5.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156249" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6249</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6249" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6249" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6249" ref_url="https://www.suse.com/security/cve/CVE-2015-6249" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1676-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001625.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1836-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1836-2" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00057.html" source="SUSE-SU"/>
    <description>
    The dissect_wccp2r1_address_table_info function in epan/dissectors/packet-wccp.c in the WCCP dissector in Wireshark 1.12.x before 1.12.7 does not prevent the conflicting use of a table for both IPv4 and IPv6 addresses, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6249/">CVE-2015-6249</cve>
	<bugzilla href="https://bugzilla.suse.com/941500">SUSE bug 941500</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563893" comment="wireshark-1.12.7-0.5.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6252</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6252" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6252" ref_url="https://www.suse.com/security/cve/CVE-2015-6252" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0354-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    The vhost_dev_ioctl function in drivers/vhost/vhost.c in the Linux kernel before 4.1.5 allows local users to cause a denial of service (memory consumption) via a VHOST_SET_LOG_FD ioctl call that triggers permanent file-descriptor allocation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6252/">CVE-2015-6252</cve>
	<bugzilla href="https://bugzilla.suse.com/942367">SUSE bug 942367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566744" comment="kernel-bigsmp-devel-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566745" comment="kernel-default-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566746" comment="kernel-default-base-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566747" comment="kernel-default-devel-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566748" comment="kernel-default-extra-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566749" comment="kernel-pae-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566750" comment="kernel-pae-base-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566751" comment="kernel-pae-devel-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566752" comment="kernel-pae-extra-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566753" comment="kernel-source-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566754" comment="kernel-syms-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566755" comment="kernel-trace-devel-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566756" comment="kernel-xen-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566757" comment="kernel-xen-base-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566758" comment="kernel-xen-devel-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566759" comment="kernel-xen-extra-3.0.101-0.47.71.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567338" comment="kernel-default-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567339" comment="kernel-default-base-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567340" comment="kernel-default-devel-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567341" comment="kernel-default-extra-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567342" comment="kernel-pae-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567343" comment="kernel-pae-base-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567344" comment="kernel-pae-devel-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567345" comment="kernel-pae-extra-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567346" comment="kernel-source-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567347" comment="kernel-syms-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567348" comment="kernel-trace-devel-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567349" comment="kernel-xen-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567350" comment="kernel-xen-base-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567351" comment="kernel-xen-devel-3.0.101-65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567352" comment="kernel-xen-extra-3.0.101-65.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6526</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6526" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6526" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6526" ref_url="https://www.suse.com/security/cve/CVE-2015-6526" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
    <description>
    The perf_callchain_user_64 function in arch/powerpc/perf/callchain.c in the Linux kernel before 4.0.2 on ppc64 platforms allows local users to cause a denial of service (infinite loop) via a deep 64-bit userspace backtrace.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6526/">CVE-2015-6526</cve>
	<bugzilla href="https://bugzilla.suse.com/942702">SUSE bug 942702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6563</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6563" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6563" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6563" ref_url="https://www.suse.com/security/cve/CVE-2015-6563" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1547-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001616.html" source="SUSE-SU"/>
		<reference ref_id="TID7022095" ref_url="https://www.suse.com/support/kb/doc/?id=7022095" source="SUSE-SU"/>
		<reference ref_id="TID7022096" ref_url="https://www.suse.com/support/kb/doc/?id=7022096" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
    <description>
    The monitor component in sshd in OpenSSH before 7.0 on non-OpenBSD platforms accepts extraneous username data in MONITOR_REQ_PAM_INIT_CTX requests, which allows local users to conduct impersonation attacks by leveraging any SSH login access in conjunction with control of the sshd uid to send a crafted MONITOR_REQ_PWNAM request, related to monitor.c and monitor_wrap.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6563/">CVE-2015-6563</cve>
	<bugzilla href="https://bugzilla.suse.com/1074631">SUSE bug 1074631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943006">SUSE bug 943006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943007">SUSE bug 943007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943010">SUSE bug 943010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948086">SUSE bug 948086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996040">SUSE bug 996040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567018" comment="openssh-6.2p2-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567019" comment="openssh-askpass-6.2p2-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567020" comment="openssh-askpass-gnome-6.2p2-0.21.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567414" comment="openssh-6.6p1-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567415" comment="openssh-askpass-gnome-6.6p1-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567416" comment="openssh-helpers-6.6p1-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6564</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6564" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6564" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6564" ref_url="https://www.suse.com/security/cve/CVE-2015-6564" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1547-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001616.html" source="SUSE-SU"/>
		<reference ref_id="TID7022095" ref_url="https://www.suse.com/support/kb/doc/?id=7022095" source="SUSE-SU"/>
		<reference ref_id="TID7022096" ref_url="https://www.suse.com/support/kb/doc/?id=7022096" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the mm_answer_pam_free_ctx function in monitor.c in sshd in OpenSSH before 7.0 on non-OpenBSD platforms might allow local users to gain privileges by leveraging control of the sshd uid to send an unexpectedly early MONITOR_REQ_PAM_FREE_CTX request.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6564/">CVE-2015-6564</cve>
	<bugzilla href="https://bugzilla.suse.com/1074631">SUSE bug 1074631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942850">SUSE bug 942850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943006">SUSE bug 943006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943007">SUSE bug 943007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943010">SUSE bug 943010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948086">SUSE bug 948086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996040">SUSE bug 996040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567018" comment="openssh-6.2p2-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567019" comment="openssh-askpass-6.2p2-0.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567020" comment="openssh-askpass-gnome-6.2p2-0.21.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567414" comment="openssh-6.6p1-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567415" comment="openssh-askpass-gnome-6.6p1-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567416" comment="openssh-helpers-6.6p1-13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6654</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6654" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6654" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6654" ref_url="https://www.suse.com/security/cve/CVE-2015-6654" source="SUSE CVE"/>
    <description>
    The xenmem_add_to_physmap_one function in arch/arm/mm.c in Xen 4.5.x, 4.4.x, and earlier does not limit the number of printk console messages when reporting a failure to retrieve a reference on a foreign page, which allows remote domains to cause a denial of service by leveraging permissions to map the memory of a foreign guest.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6654/">CVE-2015-6654</cve>
	<bugzilla href="https://bugzilla.suse.com/942657">SUSE bug 942657</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6676</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6676" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6676" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6676" ref_url="https://www.suse.com/security/cve/CVE-2015-6676" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-6678.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6676/">CVE-2015-6676</cve>
	<bugzilla href="https://bugzilla.suse.com/946880">SUSE bug 946880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566547" comment="flash-player-11.2.202.521-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566548" comment="flash-player-gnome-11.2.202.521-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566549" comment="flash-player-kde4-11.2.202.521-0.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6677</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6677" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6677" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6677" ref_url="https://www.suse.com/security/cve/CVE-2015-6677" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5575, CVE-2015-5577, CVE-2015-5578, CVE-2015-5580, CVE-2015-5582, and CVE-2015-5588.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6677/">CVE-2015-6677</cve>
	<bugzilla href="https://bugzilla.suse.com/946880">SUSE bug 946880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566547" comment="flash-player-11.2.202.521-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566548" comment="flash-player-gnome-11.2.202.521-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566549" comment="flash-player-kde4-11.2.202.521-0.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6678</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6678" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6678" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6678" ref_url="https://www.suse.com/security/cve/CVE-2015-6678" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-6676.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6678/">CVE-2015-6678</cve>
	<bugzilla href="https://bugzilla.suse.com/946880">SUSE bug 946880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566547" comment="flash-player-11.2.202.521-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566548" comment="flash-player-gnome-11.2.202.521-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566549" comment="flash-player-kde4-11.2.202.521-0.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6679</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6679" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6679" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6679" ref_url="https://www.suse.com/security/cve/CVE-2015-6679" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 allow attackers to bypass the Same Origin Policy and obtain sensitive information via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6679/">CVE-2015-6679</cve>
	<bugzilla href="https://bugzilla.suse.com/946880">SUSE bug 946880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566547" comment="flash-player-11.2.202.521-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566548" comment="flash-player-gnome-11.2.202.521-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566549" comment="flash-player-kde4-11.2.202.521-0.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6682</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6682" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6682" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6682" ref_url="https://www.suse.com/security/cve/CVE-2015-6682" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5570, CVE-2015-5574, CVE-2015-5581, and CVE-2015-5584.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6682/">CVE-2015-6682</cve>
	<bugzilla href="https://bugzilla.suse.com/946880">SUSE bug 946880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566547" comment="flash-player-11.2.202.521-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566548" comment="flash-player-gnome-11.2.202.521-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566549" comment="flash-player-kde4-11.2.202.521-0.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6749</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6749" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6749" ref_url="https://www.suse.com/security/cve/CVE-2015-6749" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001634.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1686-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00013.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the aiff_open function in oggenc/audio.c in vorbis-tools 1.4.0 and earlier allows remote attackers to cause a denial of service (crash) via a crafted AIFF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6749/">CVE-2015-6749</cve>
	<bugzilla href="https://bugzilla.suse.com/943795">SUSE bug 943795</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567156" comment="vorbis-tools-1.1.1-174.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6815</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6815" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6815" ref_url="https://www.suse.com/security/cve/CVE-2015-6815" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1952-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2003-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2249-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
    <description>
    The process_tx_desc function in hw/net/e1000.c in QEMU before 2.4.0.1 does not properly process transmit descriptor data when sending a network packet, which allows attackers to cause a denial of service (infinite loop and guest crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6815/">CVE-2015-6815</cve>
	<bugzilla href="https://bugzilla.suse.com/944697">SUSE bug 944697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567189" comment="xen-4.2.5_14-18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567190" comment="xen-doc-html-4.2.5_14-18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567191" comment="xen-doc-pdf-4.2.5_14-18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567192" comment="xen-kmp-default-4.2.5_14_3.0.101_0.47.67-18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567193" comment="xen-kmp-pae-4.2.5_14_3.0.101_0.47.67-18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567194" comment="xen-libs-4.2.5_14-18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567195" comment="xen-libs-32bit-4.2.5_14-18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567196" comment="xen-tools-4.2.5_14-18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567197" comment="xen-tools-domU-4.2.5_14-18.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567459" comment="xen-4.4.3_02-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567460" comment="xen-doc-html-4.4.3_02-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567461" comment="xen-kmp-default-4.4.3_02_3.0.101_65-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567462" comment="xen-kmp-pae-4.4.3_02_3.0.101_65-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567463" comment="xen-libs-4.4.3_02-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567464" comment="xen-libs-32bit-4.4.3_02-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567465" comment="xen-tools-4.4.3_02-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567466" comment="xen-tools-domU-4.4.3_02-26.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6855</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6855" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6855" ref_url="https://www.suse.com/security/cve/CVE-2015-6855" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
    <description>
    hw/ide/core.c in QEMU does not properly restrict the commands accepted by an ATAPI device, which allows guest users to cause a denial of service or possibly have unspecified other impact via certain IDE commands, as demonstrated by a WIN_READ_NATIVE_MAX command to an empty drive, which triggers a divide-by-zero error and instance crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6855/">CVE-2015-6855</cve>
	<bugzilla href="https://bugzilla.suse.com/945404">SUSE bug 945404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965156">SUSE bug 965156</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567467" comment="xen-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567468" comment="xen-doc-html-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567469" comment="xen-kmp-default-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567470" comment="xen-kmp-pae-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567471" comment="xen-libs-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567472" comment="xen-libs-32bit-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567473" comment="xen-tools-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567474" comment="xen-tools-domU-4.4.4_02-32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6908</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6908" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6908" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6908" ref_url="https://www.suse.com/security/cve/CVE-2015-6908" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0224-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0262-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0261-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00039.html" source="SUSE-SU"/>
    <description>
    The ber_get_next function in libraries/liblber/io.c in OpenLDAP 2.4.42 and earlier allows remote attackers to cause a denial of service (reachable assertion and application crash) via crafted BER data, as demonstrated by an attack against slapd.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-6908/">CVE-2015-6908</cve>
	<bugzilla href="https://bugzilla.suse.com/945582">SUSE bug 945582</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567010" comment="libldap-2_4-2-2.4.26-0.62.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567011" comment="libldap-2_4-2-32bit-2.4.26-0.62.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567012" comment="openldap2-client-2.4.26-0.62.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6937</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6937" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6937" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6937" ref_url="https://www.suse.com/security/cve/CVE-2015-6937" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2339-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2350-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0335-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0337-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0354-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0380-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0381-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0383-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0384-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0434-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2232-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    The __rds_conn_create function in net/rds/connection.c in the Linux kernel through 4.2.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6937/">CVE-2015-6937</cve>
	<bugzilla href="https://bugzilla.suse.com/923755">SUSE bug 923755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945825">SUSE bug 945825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952384">SUSE bug 952384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953052">SUSE bug 953052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963994">SUSE bug 963994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566744" comment="kernel-bigsmp-devel-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566745" comment="kernel-default-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566746" comment="kernel-default-base-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566747" comment="kernel-default-devel-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566748" comment="kernel-default-extra-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566749" comment="kernel-pae-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566750" comment="kernel-pae-base-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566751" comment="kernel-pae-devel-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566752" comment="kernel-pae-extra-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566753" comment="kernel-source-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566754" comment="kernel-syms-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566755" comment="kernel-trace-devel-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566756" comment="kernel-xen-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566757" comment="kernel-xen-base-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566758" comment="kernel-xen-devel-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566759" comment="kernel-xen-extra-3.0.101-0.47.71.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567368" comment="kernel-default-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567369" comment="kernel-default-base-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567370" comment="kernel-default-devel-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567371" comment="kernel-default-extra-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567372" comment="kernel-pae-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567373" comment="kernel-pae-base-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567374" comment="kernel-pae-devel-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567375" comment="kernel-pae-extra-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567376" comment="kernel-source-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567377" comment="kernel-syms-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567378" comment="kernel-trace-devel-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567379" comment="kernel-xen-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567380" comment="kernel-xen-base-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567381" comment="kernel-xen-devel-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567382" comment="kernel-xen-extra-3.0.101-68.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7174</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7174" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7174" ref_url="https://www.suse.com/security/cve/CVE-2015-7174" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1680-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1681-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00005.html" source="SUSE-SU"/>
    <description>
    The nsAttrAndChildArray::GrowBy function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors, related to an "overflow."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7174/">CVE-2015-7174</cve>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566486" comment="MozillaFirefox-38.3.0esr-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566487" comment="MozillaFirefox-translations-38.3.0esr-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566484" comment="mozilla-nspr-4.10.9-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566485" comment="mozilla-nspr-32bit-4.10.9-11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7175</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7175" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7175" ref_url="https://www.suse.com/security/cve/CVE-2015-7175" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1680-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1681-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00005.html" source="SUSE-SU"/>
    <description>
    The XULContentSinkImpl::AddText function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors, related to an "overflow."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7175/">CVE-2015-7175</cve>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566486" comment="MozillaFirefox-38.3.0esr-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566487" comment="MozillaFirefox-translations-38.3.0esr-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566484" comment="mozilla-nspr-4.10.9-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566485" comment="mozilla-nspr-32bit-4.10.9-11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7176</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7176" ref_url="https://www.suse.com/security/cve/CVE-2015-7176" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1680-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1681-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00005.html" source="SUSE-SU"/>
    <description>
    The AnimationThread function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 uses an incorrect argument to the sscanf function, which might allow remote attackers to cause a denial of service (stack-based buffer overflow and application crash) or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7176/">CVE-2015-7176</cve>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566486" comment="MozillaFirefox-38.3.0esr-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566487" comment="MozillaFirefox-translations-38.3.0esr-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566484" comment="mozilla-nspr-4.10.9-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566485" comment="mozilla-nspr-32bit-4.10.9-11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7177</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7177" ref_url="https://www.suse.com/security/cve/CVE-2015-7177" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1680-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1681-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00005.html" source="SUSE-SU"/>
    <description>
    The InitTextures function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7177/">CVE-2015-7177</cve>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566486" comment="MozillaFirefox-38.3.0esr-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566487" comment="MozillaFirefox-translations-38.3.0esr-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566484" comment="mozilla-nspr-4.10.9-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566485" comment="mozilla-nspr-32bit-4.10.9-11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7180</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7180" ref_url="https://www.suse.com/security/cve/CVE-2015-7180" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1680-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1681-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00005.html" source="SUSE-SU"/>
    <description>
    The ReadbackResultWriterD3D11::Run function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 misinterprets the return value of a function call, which might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7180/">CVE-2015-7180</cve>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566486" comment="MozillaFirefox-38.3.0esr-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566487" comment="MozillaFirefox-translations-38.3.0esr-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566484" comment="mozilla-nspr-4.10.9-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566485" comment="mozilla-nspr-32bit-4.10.9-11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7181</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7181" ref_url="https://www.suse.com/security/cve/CVE-2015-7181" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1926-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1978-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1981-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1942-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2229-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2245-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html" source="SUSE-SU"/>
    <description>
    The sec_asn1d_parse_leaf function in Mozilla Network Security Services (NSS) before 3.19.2.1 and 3.20.x before 3.20.1, as used in Firefox before 42.0 and Firefox ESR 38.x before 38.4 and other products, improperly restricts access to an unspecified data structure, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted OCTET STRING data, related to a "use-after-poison" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7181/">CVE-2015-7181</cve>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566488" comment="MozillaFirefox-38.4.0esr-25.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566489" comment="MozillaFirefox-branding-SLED-38-15.31 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566490" comment="MozillaFirefox-translations-38.4.0esr-25.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566491" comment="libfreebl3-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566492" comment="libfreebl3-32bit-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566493" comment="libsoftokn3-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566494" comment="libsoftokn3-32bit-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566495" comment="mozilla-nspr-4.10.10-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566496" comment="mozilla-nspr-32bit-4.10.10-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566497" comment="mozilla-nss-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566498" comment="mozilla-nss-32bit-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566499" comment="mozilla-nss-tools-3.19.2.1-19.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7182</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7182" ref_url="https://www.suse.com/security/cve/CVE-2015-7182" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1926-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1978-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1981-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1942-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2229-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2245-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the ASN.1 decoder in Mozilla Network Security Services (NSS) before 3.19.2.1 and 3.20.x before 3.20.1, as used in Firefox before 42.0 and Firefox ESR 38.x before 38.4 and other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted OCTET STRING data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7182/">CVE-2015-7182</cve>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566488" comment="MozillaFirefox-38.4.0esr-25.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566489" comment="MozillaFirefox-branding-SLED-38-15.31 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566490" comment="MozillaFirefox-translations-38.4.0esr-25.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566491" comment="libfreebl3-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566492" comment="libfreebl3-32bit-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566493" comment="libsoftokn3-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566494" comment="libsoftokn3-32bit-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566495" comment="mozilla-nspr-4.10.10-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566496" comment="mozilla-nspr-32bit-4.10.10-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566497" comment="mozilla-nss-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566498" comment="mozilla-nss-32bit-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566499" comment="mozilla-nss-tools-3.19.2.1-19.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7183</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7183" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7183" ref_url="https://www.suse.com/security/cve/CVE-2015-7183" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1926-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1978-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1981-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1942-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2229-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2245-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the PL_ARENA_ALLOCATE implementation in Netscape Portable Runtime (NSPR) in Mozilla Network Security Services (NSS) before 3.19.2.1 and 3.20.x before 3.20.1, as used in Firefox before 42.0 and Firefox ESR 38.x before 38.4 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7183/">CVE-2015-7183</cve>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962977">SUSE bug 962977</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566488" comment="MozillaFirefox-38.4.0esr-25.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566489" comment="MozillaFirefox-branding-SLED-38-15.31 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566490" comment="MozillaFirefox-translations-38.4.0esr-25.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566491" comment="libfreebl3-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566492" comment="libfreebl3-32bit-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566493" comment="libsoftokn3-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566494" comment="libsoftokn3-32bit-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566495" comment="mozilla-nspr-4.10.10-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566496" comment="mozilla-nspr-32bit-4.10.10-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566497" comment="mozilla-nss-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566498" comment="mozilla-nss-32bit-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566499" comment="mozilla-nss-tools-3.19.2.1-19.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7184</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7184" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7184" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7184" ref_url="https://www.suse.com/security/cve/CVE-2015-7184" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:1817-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00021.html" source="SUSE-SU"/>
    <description>
    The fetch API implementation in Mozilla Firefox before 41.0.2 does not restrict access to the HTTP response body in certain situations where user credentials are supplied but the CORS cross-origin request algorithm is improperly followed, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7184/">CVE-2015-7184</cve>
	<bugzilla href="https://bugzilla.suse.com/950686">SUSE bug 950686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7188</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7188" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7188" ref_url="https://www.suse.com/security/cve/CVE-2015-7188" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1926-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1978-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1981-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1942-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2229-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2245-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 allow remote attackers to bypass the Same Origin Policy for an IP address origin, and conduct cross-site scripting (XSS) attacks, by appending whitespace characters to an IP address string.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7188/">CVE-2015-7188</cve>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566488" comment="MozillaFirefox-38.4.0esr-25.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566489" comment="MozillaFirefox-branding-SLED-38-15.31 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566490" comment="MozillaFirefox-translations-38.4.0esr-25.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566491" comment="libfreebl3-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566492" comment="libfreebl3-32bit-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566493" comment="libsoftokn3-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566494" comment="libsoftokn3-32bit-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566495" comment="mozilla-nspr-4.10.10-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566496" comment="mozilla-nspr-32bit-4.10.10-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566497" comment="mozilla-nss-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566498" comment="mozilla-nss-32bit-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566499" comment="mozilla-nss-tools-3.19.2.1-19.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7189</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7189" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7189" ref_url="https://www.suse.com/security/cve/CVE-2015-7189" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1926-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1978-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1981-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1942-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2229-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2245-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html" source="SUSE-SU"/>
    <description>
    Race condition in the JPEGEncoder function in Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow) via vectors involving a CANVAS element and crafted JavaScript code.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7189/">CVE-2015-7189</cve>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566488" comment="MozillaFirefox-38.4.0esr-25.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566489" comment="MozillaFirefox-branding-SLED-38-15.31 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566490" comment="MozillaFirefox-translations-38.4.0esr-25.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566491" comment="libfreebl3-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566492" comment="libfreebl3-32bit-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566493" comment="libsoftokn3-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566494" comment="libsoftokn3-32bit-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566495" comment="mozilla-nspr-4.10.10-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566496" comment="mozilla-nspr-32bit-4.10.10-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566497" comment="mozilla-nss-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566498" comment="mozilla-nss-32bit-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566499" comment="mozilla-nss-tools-3.19.2.1-19.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7193</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7193" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7193" ref_url="https://www.suse.com/security/cve/CVE-2015-7193" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1926-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1978-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1981-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1942-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2229-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2245-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 improperly follow the CORS cross-origin request algorithm for the POST method in situations involving an unspecified Content-Type header manipulation, which allows remote attackers to bypass the Same Origin Policy by leveraging the lack of a preflight-request step.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7193/">CVE-2015-7193</cve>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566488" comment="MozillaFirefox-38.4.0esr-25.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566489" comment="MozillaFirefox-branding-SLED-38-15.31 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566490" comment="MozillaFirefox-translations-38.4.0esr-25.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566491" comment="libfreebl3-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566492" comment="libfreebl3-32bit-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566493" comment="libsoftokn3-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566494" comment="libsoftokn3-32bit-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566495" comment="mozilla-nspr-4.10.10-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566496" comment="mozilla-nspr-32bit-4.10.10-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566497" comment="mozilla-nss-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566498" comment="mozilla-nss-32bit-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566499" comment="mozilla-nss-tools-3.19.2.1-19.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7194</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7194" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7194" ref_url="https://www.suse.com/security/cve/CVE-2015-7194" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1926-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1978-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1981-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1942-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2229-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2245-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html" source="SUSE-SU"/>
    <description>
    Buffer underflow in libjar in Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted ZIP archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7194/">CVE-2015-7194</cve>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566488" comment="MozillaFirefox-38.4.0esr-25.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566489" comment="MozillaFirefox-branding-SLED-38-15.31 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566490" comment="MozillaFirefox-translations-38.4.0esr-25.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566491" comment="libfreebl3-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566492" comment="libfreebl3-32bit-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566493" comment="libsoftokn3-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566494" comment="libsoftokn3-32bit-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566495" comment="mozilla-nspr-4.10.10-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566496" comment="mozilla-nspr-32bit-4.10.10-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566497" comment="mozilla-nss-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566498" comment="mozilla-nss-32bit-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566499" comment="mozilla-nss-tools-3.19.2.1-19.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7196</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7196" ref_url="https://www.suse.com/security/cve/CVE-2015-7196" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1926-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1978-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1981-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1942-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2229-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2245-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4, when a Java plugin is enabled, allow remote attackers to cause a denial of service (incorrect garbage collection and application crash) or possibly execute arbitrary code via a crafted Java applet that deallocates an in-use JavaScript wrapper.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7196/">CVE-2015-7196</cve>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566488" comment="MozillaFirefox-38.4.0esr-25.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566489" comment="MozillaFirefox-branding-SLED-38-15.31 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566490" comment="MozillaFirefox-translations-38.4.0esr-25.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566491" comment="libfreebl3-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566492" comment="libfreebl3-32bit-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566493" comment="libsoftokn3-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566494" comment="libsoftokn3-32bit-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566495" comment="mozilla-nspr-4.10.10-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566496" comment="mozilla-nspr-32bit-4.10.10-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566497" comment="mozilla-nss-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566498" comment="mozilla-nss-32bit-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566499" comment="mozilla-nss-tools-3.19.2.1-19.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7197</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7197" ref_url="https://www.suse.com/security/cve/CVE-2015-7197" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1926-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1978-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1981-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1942-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2229-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2245-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 improperly control the ability of a web worker to create a WebSocket object, which allows remote attackers to bypass intended mixed-content restrictions via crafted JavaScript code.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7197/">CVE-2015-7197</cve>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566488" comment="MozillaFirefox-38.4.0esr-25.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566489" comment="MozillaFirefox-branding-SLED-38-15.31 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566490" comment="MozillaFirefox-translations-38.4.0esr-25.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566491" comment="libfreebl3-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566492" comment="libfreebl3-32bit-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566493" comment="libsoftokn3-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566494" comment="libsoftokn3-32bit-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566495" comment="mozilla-nspr-4.10.10-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566496" comment="mozilla-nspr-32bit-4.10.10-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566497" comment="mozilla-nss-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566498" comment="mozilla-nss-32bit-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566499" comment="mozilla-nss-tools-3.19.2.1-19.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7198</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7198" ref_url="https://www.suse.com/security/cve/CVE-2015-7198" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1926-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1978-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1981-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1942-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2229-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2245-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the rx::TextureStorage11 class in ANGLE, as used in Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted texture data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7198/">CVE-2015-7198</cve>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566488" comment="MozillaFirefox-38.4.0esr-25.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566489" comment="MozillaFirefox-branding-SLED-38-15.31 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566490" comment="MozillaFirefox-translations-38.4.0esr-25.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566491" comment="libfreebl3-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566492" comment="libfreebl3-32bit-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566493" comment="libsoftokn3-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566494" comment="libsoftokn3-32bit-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566495" comment="mozilla-nspr-4.10.10-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566496" comment="mozilla-nspr-32bit-4.10.10-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566497" comment="mozilla-nss-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566498" comment="mozilla-nss-32bit-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566499" comment="mozilla-nss-tools-3.19.2.1-19.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7199</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7199" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7199" ref_url="https://www.suse.com/security/cve/CVE-2015-7199" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1926-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1978-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1981-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1942-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2229-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2245-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html" source="SUSE-SU"/>
    <description>
    The (1) AddWeightedPathSegLists and (2) SVGPathSegListSMILType::Interpolate functions in Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 lack status checking, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted SVG document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7199/">CVE-2015-7199</cve>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566488" comment="MozillaFirefox-38.4.0esr-25.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566489" comment="MozillaFirefox-branding-SLED-38-15.31 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566490" comment="MozillaFirefox-translations-38.4.0esr-25.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566491" comment="libfreebl3-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566492" comment="libfreebl3-32bit-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566493" comment="libsoftokn3-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566494" comment="libsoftokn3-32bit-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566495" comment="mozilla-nspr-4.10.10-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566496" comment="mozilla-nspr-32bit-4.10.10-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566497" comment="mozilla-nss-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566498" comment="mozilla-nss-32bit-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566499" comment="mozilla-nss-tools-3.19.2.1-19.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7200</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7200" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7200" ref_url="https://www.suse.com/security/cve/CVE-2015-7200" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1926-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1978-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1981-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1942-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2229-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2245-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html" source="SUSE-SU"/>
    <description>
    The CryptoKey interface implementation in Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 lacks status checking, which allows attackers to have an unspecified impact via vectors related to a cryptographic key.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7200/">CVE-2015-7200</cve>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566488" comment="MozillaFirefox-38.4.0esr-25.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566489" comment="MozillaFirefox-branding-SLED-38-15.31 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566490" comment="MozillaFirefox-translations-38.4.0esr-25.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566491" comment="libfreebl3-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566492" comment="libfreebl3-32bit-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566493" comment="libsoftokn3-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566494" comment="libsoftokn3-32bit-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566495" comment="mozilla-nspr-4.10.10-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566496" comment="mozilla-nspr-32bit-4.10.10-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566497" comment="mozilla-nss-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566498" comment="mozilla-nss-32bit-3.19.2.1-19.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566499" comment="mozilla-nss-tools-3.19.2.1-19.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7201</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7201" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7201" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7201" ref_url="https://www.suse.com/security/cve/CVE-2015-7201" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2335-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2353-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2380-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2406-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0307-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0308-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.5 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7201/">CVE-2015-7201</cve>
	<bugzilla href="https://bugzilla.suse.com/959277">SUSE bug 959277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566322" comment="MozillaFirefox-38.5.0esr-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566323" comment="MozillaFirefox-translations-38.5.0esr-28.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7202</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7202" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7202" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7202" ref_url="https://www.suse.com/security/cve/CVE-2015-7202" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2335-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2353-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0307-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0308-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 43.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7202/">CVE-2015-7202</cve>
	<bugzilla href="https://bugzilla.suse.com/959277">SUSE bug 959277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566322" comment="MozillaFirefox-38.5.0esr-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566323" comment="MozillaFirefox-translations-38.5.0esr-28.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7205</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7205" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7205" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7205" ref_url="https://www.suse.com/security/cve/CVE-2015-7205" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2335-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2353-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2380-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2406-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0307-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0308-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html" source="SUSE-SU"/>
    <description>
    Integer underflow in the RTPReceiverVideo::ParseRtpPacket function in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.5 might allow remote attackers to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a crafted WebRTC RTP packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7205/">CVE-2015-7205</cve>
	<bugzilla href="https://bugzilla.suse.com/959277">SUSE bug 959277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566322" comment="MozillaFirefox-38.5.0esr-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566323" comment="MozillaFirefox-translations-38.5.0esr-28.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7210</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7210" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7210" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7210" ref_url="https://www.suse.com/security/cve/CVE-2015-7210" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2335-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2353-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2380-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2406-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0307-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0308-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.5 allows remote attackers to execute arbitrary code by triggering attempted use of a data channel that has been closed by a WebRTC function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7210/">CVE-2015-7210</cve>
	<bugzilla href="https://bugzilla.suse.com/959277">SUSE bug 959277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566322" comment="MozillaFirefox-38.5.0esr-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566323" comment="MozillaFirefox-translations-38.5.0esr-28.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7212</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7212" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7212" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7212" ref_url="https://www.suse.com/security/cve/CVE-2015-7212" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2335-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2353-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2380-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2406-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0307-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0308-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the mozilla::layers::BufferTextureClient::AllocateForSurface function in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.5 allows remote attackers to execute arbitrary code by triggering a graphics operation that requires a large texture allocation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7212/">CVE-2015-7212</cve>
	<bugzilla href="https://bugzilla.suse.com/959277">SUSE bug 959277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566322" comment="MozillaFirefox-38.5.0esr-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566323" comment="MozillaFirefox-translations-38.5.0esr-28.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7213</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7213" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7213" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7213" ref_url="https://www.suse.com/security/cve/CVE-2015-7213" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2335-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2353-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2380-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2406-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0307-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0308-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the MPEG4Extractor::readMetaData function in MPEG4Extractor.cpp in libstagefright in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.5 on 64-bit platforms allows remote attackers to execute arbitrary code via a crafted MP4 video file that triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7213/">CVE-2015-7213</cve>
	<bugzilla href="https://bugzilla.suse.com/959277">SUSE bug 959277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566322" comment="MozillaFirefox-38.5.0esr-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566323" comment="MozillaFirefox-translations-38.5.0esr-28.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7214</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7214" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7214" ref_url="https://www.suse.com/security/cve/CVE-2015-7214" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2335-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2353-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2380-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2406-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0307-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0308-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.5 allow remote attackers to bypass the Same Origin Policy via data: and view-source: URIs.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7214/">CVE-2015-7214</cve>
	<bugzilla href="https://bugzilla.suse.com/959277">SUSE bug 959277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566322" comment="MozillaFirefox-38.5.0esr-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566323" comment="MozillaFirefox-translations-38.5.0esr-28.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7222</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7222" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7222" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7222" ref_url="https://www.suse.com/security/cve/CVE-2015-7222" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2335-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2353-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2380-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2406-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0307-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0308-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html" source="SUSE-SU"/>
    <description>
    Integer underflow in the Metadata::setData function in MetaData.cpp in libstagefright in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.5 allows remote attackers to execute arbitrary code or cause a denial of service (incorrect memory allocation and application crash) via an MP4 video file with crafted covr metadata that triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7222/">CVE-2015-7222</cve>
	<bugzilla href="https://bugzilla.suse.com/959277">SUSE bug 959277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566322" comment="MozillaFirefox-38.5.0esr-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566323" comment="MozillaFirefox-translations-38.5.0esr-28.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7236</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7236" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7236" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7236" ref_url="https://www.suse.com/security/cve/CVE-2015-7236" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1705-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1706-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001623.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in xprt_set_caller in rpcb_svc_com.c in rpcbind 0.2.1 and earlier allows remote attackers to cause a denial of service (daemon crash) via crafted packets, involving a PMAP_CALLIT code.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7236/">CVE-2015-7236</cve>
	<bugzilla href="https://bugzilla.suse.com/940191">SUSE bug 940191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946204">SUSE bug 946204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567100" comment="rpcbind-0.1.6+git20080930-6.24.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7295</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7295" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7295" ref_url="https://www.suse.com/security/cve/CVE-2015-7295" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
    <description>
    hw/virtio/virtio.c in the Virtual Network Device (virtio-net) support in QEMU, when big or mergeable receive buffers are not supported, allows remote attackers to cause a denial of service (guest network consumption) via a flood of jumbo frames on the (1) tuntap or (2) macvtap interface.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7295/">CVE-2015-7295</cve>
	<bugzilla href="https://bugzilla.suse.com/947159">SUSE bug 947159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7311</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7311" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7311" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7311" ref_url="https://www.suse.com/security/cve/CVE-2015-7311" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001754.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2003-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2249-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2250-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    libxl in Xen 4.1.x through 4.6.x does not properly handle the readonly flag on disks when using the qemu-xen device model, which allows local guest users to write to a read-only disk image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7311/">CVE-2015-7311</cve>
	<bugzilla href="https://bugzilla.suse.com/947165">SUSE bug 947165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567261" comment="xen-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567262" comment="xen-doc-html-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567263" comment="xen-doc-pdf-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567264" comment="xen-kmp-default-4.2.5_18_3.0.101_0.47.71-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567265" comment="xen-kmp-pae-4.2.5_18_3.0.101_0.47.71-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567266" comment="xen-libs-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567267" comment="xen-libs-32bit-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567268" comment="xen-tools-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567269" comment="xen-tools-domU-4.2.5_18-21.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567475" comment="xen-4.4.3_06-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567476" comment="xen-doc-html-4.4.3_06-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567477" comment="xen-kmp-default-4.4.3_06_3.0.101_65-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567478" comment="xen-kmp-pae-4.4.3_06_3.0.101_65-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567479" comment="xen-libs-4.4.3_06-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567480" comment="xen-libs-32bit-4.4.3_06-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567481" comment="xen-tools-4.4.3_06-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567482" comment="xen-tools-domU-4.4.3_06-29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7497</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7497" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7497" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7497" ref_url="https://www.suse.com/security/cve/CVE-2015-7497" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2372-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0106-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the xmlDictComputeFastQKey function in dict.c in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-10"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7497/">CVE-2015-7497</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957106">SUSE bug 957106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959469">SUSE bug 959469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566939" comment="libxml2-2.7.6-0.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566940" comment="libxml2-32bit-2.7.6-0.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566941" comment="libxml2-python-2.7.6-0.34.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7498</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7498" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7498" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7498" ref_url="https://www.suse.com/security/cve/CVE-2015-7498" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2372-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0106-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the xmlParseXmlDecl function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service via unspecified vectors related to extracting errors after an encoding conversion failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-10"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7498/">CVE-2015-7498</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957107">SUSE bug 957107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959469">SUSE bug 959469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566939" comment="libxml2-2.7.6-0.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566940" comment="libxml2-32bit-2.7.6-0.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566941" comment="libxml2-python-2.7.6-0.34.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7499</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7499" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7499" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7499" ref_url="https://www.suse.com/security/cve/CVE-2015-7499" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2372-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0106-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the xmlGROW function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to obtain sensitive process memory information via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-10"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7499/">CVE-2015-7499</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957109">SUSE bug 957109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959469">SUSE bug 959469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566939" comment="libxml2-2.7.6-0.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566940" comment="libxml2-32bit-2.7.6-0.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566941" comment="libxml2-python-2.7.6-0.34.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7500</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7500" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7500" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7500" ref_url="https://www.suse.com/security/cve/CVE-2015-7500" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2372-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0106-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html" source="SUSE-SU"/>
    <description>
    The xmlParseMisc function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service (out-of-bounds heap read) via unspecified vectors related to incorrect entities boundaries and start tags.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-10"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7500/">CVE-2015-7500</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957110">SUSE bug 957110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959469">SUSE bug 959469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566939" comment="libxml2-2.7.6-0.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566940" comment="libxml2-32bit-2.7.6-0.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566941" comment="libxml2-python-2.7.6-0.34.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7504</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7504" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7504" ref_url="https://www.suse.com/security/cve/CVE-2015-7504" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the pcnet_receive function in hw/net/pcnet.c in QEMU allows guest OS administrators to cause a denial of service (instance crash) or possibly execute arbitrary code via a series of packets in loopback mode.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7504/">CVE-2015-7504</cve>
	<bugzilla href="https://bugzilla.suse.com/956411">SUSE bug 956411</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567261" comment="xen-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567262" comment="xen-doc-html-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567263" comment="xen-doc-pdf-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567264" comment="xen-kmp-default-4.2.5_18_3.0.101_0.47.71-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567265" comment="xen-kmp-pae-4.2.5_18_3.0.101_0.47.71-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567266" comment="xen-libs-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567267" comment="xen-libs-32bit-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567268" comment="xen-tools-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567269" comment="xen-tools-domU-4.2.5_18-21.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567475" comment="xen-4.4.3_06-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567476" comment="xen-doc-html-4.4.3_06-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567477" comment="xen-kmp-default-4.4.3_06_3.0.101_65-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567478" comment="xen-kmp-pae-4.4.3_06_3.0.101_65-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567479" comment="xen-libs-4.4.3_06-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567480" comment="xen-libs-32bit-4.4.3_06-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567481" comment="xen-tools-4.4.3_06-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567482" comment="xen-tools-domU-4.4.3_06-29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7509</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7509" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7509" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7509" ref_url="https://www.suse.com/security/cve/CVE-2015-7509" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2339-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2350-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    fs/ext4/namei.c in the Linux kernel before 3.7 allows physically proximate attackers to cause a denial of service (system crash) via a crafted no-journal filesystem, a related issue to CVE-2013-2015.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7509/">CVE-2015-7509</cve>
	<bugzilla href="https://bugzilla.suse.com/956707">SUSE bug 956707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956709">SUSE bug 956709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956766">SUSE bug 956766</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567368" comment="kernel-default-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567369" comment="kernel-default-base-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567370" comment="kernel-default-devel-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567371" comment="kernel-default-extra-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567372" comment="kernel-pae-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567373" comment="kernel-pae-base-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567374" comment="kernel-pae-devel-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567375" comment="kernel-pae-extra-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567376" comment="kernel-source-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567377" comment="kernel-syms-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567378" comment="kernel-trace-devel-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567379" comment="kernel-xen-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567380" comment="kernel-xen-base-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567381" comment="kernel-xen-devel-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567382" comment="kernel-xen-extra-3.0.101-68.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7512</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7512" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7512" ref_url="https://www.suse.com/security/cve/CVE-2015-7512" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0536-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the pcnet_receive function in hw/net/pcnet.c in QEMU, when a guest NIC has a larger MTU, allows remote attackers to cause a denial of service (guest OS crash) or execute arbitrary code via a large packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7512/">CVE-2015-7512</cve>
	<bugzilla href="https://bugzilla.suse.com/957162">SUSE bug 957162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962360">SUSE bug 962360</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566780" comment="kvm-1.4.2-37.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567387" comment="kvm-1.4.2-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567467" comment="xen-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567468" comment="xen-doc-html-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567469" comment="xen-kmp-default-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567470" comment="xen-kmp-pae-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567471" comment="xen-libs-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567472" comment="xen-libs-32bit-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567473" comment="xen-tools-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567474" comment="xen-tools-domU-4.4.4_02-32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7515</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7515" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7515" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7515" ref_url="https://www.suse.com/security/cve/CVE-2015-7515" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    The aiptek_probe function in drivers/input/tablet/aiptek.c in the Linux kernel before 4.4 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted USB device that lacks endpoints.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-17"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7515/">CVE-2015-7515</cve>
	<bugzilla href="https://bugzilla.suse.com/956708">SUSE bug 956708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567353" comment="kernel-default-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567354" comment="kernel-default-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567355" comment="kernel-default-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567356" comment="kernel-default-extra-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567357" comment="kernel-pae-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567358" comment="kernel-pae-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567359" comment="kernel-pae-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567360" comment="kernel-pae-extra-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567361" comment="kernel-source-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567362" comment="kernel-syms-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567363" comment="kernel-trace-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567364" comment="kernel-xen-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567365" comment="kernel-xen-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567366" comment="kernel-xen-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567367" comment="kernel-xen-extra-3.0.101-71.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7540</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7540" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7540" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7540" ref_url="https://www.suse.com/security/cve/CVE-2015-7540" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:2356-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html" source="SUSE-SU"/>
    <description>
    The LDAP server in the AD domain controller in Samba 4.x before 4.1.22 does not check return values to ensure successful ASN.1 memory allocation, which allows remote attackers to cause a denial of service (memory consumption and daemon crash) via crafted packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7540/">CVE-2015-7540</cve>
	<bugzilla href="https://bugzilla.suse.com/958580">SUSE bug 958580</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333940" comment="samba is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7547</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7547" ref_url="https://www.suse.com/security/cve/CVE-2015-7547" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0472-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="TID7017265" ref_url="https://www.suse.com/support/kb/doc?id=7017265" source="SUSE-SU"/>
		<reference ref_id="TID7017273" ref_url="https://www.suse.com/support/kb/doc/?id=7017273" source="SUSE-SU"/>
		<reference ref_id="TID7017287" ref_url="https://www.suse.com/support/kb/doc?id=7017287" source="SUSE-SU"/>
		<reference ref_id="TID7017315" ref_url="https://www.suse.com/support/kb/doc/?id=7017315" source="SUSE-SU"/>
		<reference ref_id="TID7017329" ref_url="https://www.suse.com/support/kb/doc/?id=7017329" source="SUSE-SU"/>
		<reference ref_id="TID7021300" ref_url="https://www.suse.com/support/kb/doc/?id=7021300" source="SUSE-SU"/>
		<reference ref_id="TID7021823" ref_url="https://www.suse.com/support/kb/doc/?id=7021823" source="SUSE-SU"/>
		<reference ref_id="TID7022077" ref_url="https://www.suse.com/support/kb/doc/?id=7022077" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0511-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0512-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00044.html" source="SUSE-SU"/>
    <description>
    Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7547/">CVE-2015-7547</cve>
	<bugzilla href="https://bugzilla.suse.com/1077097">SUSE bug 1077097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/847227">SUSE bug 847227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961721">SUSE bug 961721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967023">SUSE bug 967023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967061">SUSE bug 967061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967072">SUSE bug 967072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967496">SUSE bug 967496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969216">SUSE bug 969216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969241">SUSE bug 969241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969591">SUSE bug 969591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986086">SUSE bug 986086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566593" comment="glibc-2.11.3-17.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566594" comment="glibc-32bit-2.11.3-17.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566595" comment="glibc-devel-2.11.3-17.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566596" comment="glibc-devel-32bit-2.11.3-17.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566597" comment="glibc-i18ndata-2.11.3-17.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566598" comment="glibc-locale-2.11.3-17.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566599" comment="glibc-locale-32bit-2.11.3-17.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566600" comment="nscd-2.11.3-17.95.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7549</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7549" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7549" ref_url="https://www.suse.com/security/cve/CVE-2015-7549" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
    <description>
    The MSI-X MMIO support in hw/pci/msix.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (NULL pointer dereference and QEMU process crash) by leveraging failure to define the .write method.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7549/">CVE-2015-7549</cve>
	<bugzilla href="https://bugzilla.suse.com/958917">SUSE bug 958917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958918">SUSE bug 958918</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567467" comment="xen-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567468" comment="xen-doc-html-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567469" comment="xen-kmp-default-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567470" comment="xen-kmp-pae-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567471" comment="xen-libs-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567472" comment="xen-libs-32bit-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567473" comment="xen-tools-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567474" comment="xen-tools-domU-4.4.4_02-32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7550</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7550" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7550" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7550" ref_url="https://www.suse.com/security/cve/CVE-2015-7550" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0585-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    The keyctl_read_key function in security/keys/keyctl.c in the Linux kernel before 4.3.4 does not properly use a semaphore, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted application that leverages a race condition between keyctl_revoke and keyctl_read calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7550/">CVE-2015-7550</cve>
	<bugzilla href="https://bugzilla.suse.com/1052256">SUSE bug 1052256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958951">SUSE bug 958951</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567353" comment="kernel-default-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567354" comment="kernel-default-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567355" comment="kernel-default-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567356" comment="kernel-default-extra-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567357" comment="kernel-pae-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567358" comment="kernel-pae-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567359" comment="kernel-pae-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567360" comment="kernel-pae-extra-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567361" comment="kernel-source-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567362" comment="kernel-syms-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567363" comment="kernel-trace-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567364" comment="kernel-xen-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567365" comment="kernel-xen-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567366" comment="kernel-xen-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567367" comment="kernel-xen-extra-3.0.101-71.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7552</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7552" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7552" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7552" ref_url="https://www.suse.com/security/cve/CVE-2015-7552" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001835.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0897-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00124.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1467-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00006.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the gdk_pixbuf_flip function in gdk-pixbuf-scale.c in gdk-pixbuf 2.30.x allows remote attackers to cause a denial of service or possibly execute arbitrary code via a crafted BMP file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7552/">CVE-2015-7552</cve>
	<bugzilla href="https://bugzilla.suse.com/958963">SUSE bug 958963</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566633" comment="gtk2-2.18.9-0.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566634" comment="gtk2-32bit-2.18.9-0.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566635" comment="gtk2-lang-2.18.9-0.39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7554</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7554" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7554" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7554" ref_url="https://www.suse.com/security/cve/CVE-2015-7554" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0073-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004228.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0212-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0215-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0252-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00100.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0097-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00041.html" source="SUSE-SU"/>
    <description>
    The _TIFFVGetField function in tif_dir.c in libtiff 4.0.6 allows attackers to cause a denial of service (invalid memory write and crash) or possibly have unspecified other impact via crafted field data in an extension tag in a TIFF image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7554/">CVE-2015-7554</cve>
	<bugzilla href="https://bugzilla.suse.com/1007276">SUSE bug 1007276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017690">SUSE bug 1017690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040322">SUSE bug 1040322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960341">SUSE bug 960341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974621">SUSE bug 974621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983436">SUSE bug 983436</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567449" comment="libtiff3-3.8.2-141.163.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567450" comment="libtiff3-32bit-3.8.2-141.163.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7555</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7555" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7555" ref_url="https://www.suse.com/security/cve/CVE-2015-7555" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001821.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0201-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0289-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00117.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in giffix.c in giffix in giflib 5.1.1 allows attackers to cause a denial of service (program crash) via crafted image and logical screen width fields in a GIF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7555/">CVE-2015-7555</cve>
	<bugzilla href="https://bugzilla.suse.com/960319">SUSE bug 960319</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566572" comment="giflib-4.1.6-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566573" comment="giflib-32bit-4.1.6-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7560</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7560" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7560" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7560" ref_url="https://www.suse.com/security/cve/CVE-2015-7560" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0816-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0837-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0813-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0877-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1106-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" source="SUSE-SU"/>
    <description>
    The SMB1 implementation in smbd in Samba 3.x and 4.x before 4.1.23, 4.2.x before 4.2.9, 4.3.x before 4.3.6, and 4.4.x before 4.4.0rc4 allows remote authenticated users to modify arbitrary ACLs by using a UNIX SMB1 call to create a symlink, and then using a non-UNIX SMB1 call to write to the ACL content.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7560/">CVE-2015-7560</cve>
	<bugzilla href="https://bugzilla.suse.com/968222">SUSE bug 968222</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567428" comment="libldb1-3.6.3-67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567429" comment="libldb1-32bit-3.6.3-67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567430" comment="libsmbclient0-3.6.3-67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567431" comment="libsmbclient0-32bit-3.6.3-67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567432" comment="libtalloc2-3.6.3-67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567433" comment="libtalloc2-32bit-3.6.3-67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567434" comment="libtdb1-3.6.3-67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567435" comment="libtdb1-32bit-3.6.3-67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567436" comment="libtevent0-3.6.3-67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567437" comment="libtevent0-32bit-3.6.3-67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567438" comment="libwbclient0-3.6.3-67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567439" comment="libwbclient0-32bit-3.6.3-67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567440" comment="samba-3.6.3-67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567441" comment="samba-32bit-3.6.3-67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567442" comment="samba-client-3.6.3-67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567443" comment="samba-client-32bit-3.6.3-67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567444" comment="samba-doc-3.6.3-67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567445" comment="samba-krb-printing-3.6.3-67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567446" comment="samba-winbind-3.6.3-67.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567447" comment="samba-winbind-32bit-3.6.3-67.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7575</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7575" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0399-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0428-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0431-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0433-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0636-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0770-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0776-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2405-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00139.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0007-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0161-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0162-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0307-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0308-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0488-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00101.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0605-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00166.html" source="SUSE-SU"/>
    <description>
    Mozilla Network Security Services (NSS) before 3.20.2, as used in Mozilla Firefox before 43.0.2 and Firefox ESR 38.x before 38.5.2, does not reject MD5 signatures in Server Key Exchange messages in TLS 1.2 Handshake Protocol traffic, which makes it easier for man-in-the-middle attackers to spoof servers by triggering a collision.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575</cve>
	<bugzilla href="https://bugzilla.suse.com/959888">SUSE bug 959888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960402">SUSE bug 960402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960996">SUSE bug 960996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961280">SUSE bug 961280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961281">SUSE bug 961281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961282">SUSE bug 961282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961283">SUSE bug 961283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961284">SUSE bug 961284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961290">SUSE bug 961290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961357">SUSE bug 961357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962743">SUSE bug 962743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967521">SUSE bug 967521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981087">SUSE bug 981087</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566649" comment="java-1_7_0-openjdk-1.7.0.95-0.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566650" comment="java-1_7_0-openjdk-demo-1.7.0.95-0.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566651" comment="java-1_7_0-openjdk-devel-1.7.0.95-0.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566957" comment="libfreebl3-3.19.2.2-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566958" comment="libfreebl3-32bit-3.19.2.2-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566959" comment="libsoftokn3-3.19.2.2-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566960" comment="libsoftokn3-32bit-3.19.2.2-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566961" comment="mozilla-nss-3.19.2.2-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566962" comment="mozilla-nss-32bit-3.19.2.2-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566963" comment="mozilla-nss-tools-3.19.2.2-22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7613</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7613" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7613" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7613" ref_url="https://www.suse.com/security/cve/CVE-2015-7613" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2085-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2087-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2089-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2090-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2091-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00032.html" source="SUSE-SU"/>
    <description>
    Race condition in the IPC object implementation in the Linux kernel through 4.2.3 allows local users to gain privileges by triggering an ipc_addid call that leads to uid and gid comparisons against uninitialized data, related to msg.c, shm.c, and util.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-7613/">CVE-2015-7613</cve>
	<bugzilla href="https://bugzilla.suse.com/923755">SUSE bug 923755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948536">SUSE bug 948536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948701">SUSE bug 948701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963994">SUSE bug 963994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7625</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7625" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7625" ref_url="https://www.suse.com/security/cve/CVE-2015-7625" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1740-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1742-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1744-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK &amp; Compiler before 19.0.0.213 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-7626, CVE-2015-7627, CVE-2015-7630, CVE-2015-7633, and CVE-2015-7634.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7625/">CVE-2015-7625</cve>
	<bugzilla href="https://bugzilla.suse.com/950169">SUSE bug 950169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566550" comment="flash-player-11.2.202.535-0.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566551" comment="flash-player-gnome-11.2.202.535-0.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566552" comment="flash-player-kde4-11.2.202.535-0.20.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7626</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7626" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7626" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7626" ref_url="https://www.suse.com/security/cve/CVE-2015-7626" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1740-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1742-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1744-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK &amp; Compiler before 19.0.0.213 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-7625, CVE-2015-7627, CVE-2015-7630, CVE-2015-7633, and CVE-2015-7634.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7626/">CVE-2015-7626</cve>
	<bugzilla href="https://bugzilla.suse.com/950169">SUSE bug 950169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566550" comment="flash-player-11.2.202.535-0.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566551" comment="flash-player-gnome-11.2.202.535-0.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566552" comment="flash-player-kde4-11.2.202.535-0.20.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7627</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7627" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7627" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7627" ref_url="https://www.suse.com/security/cve/CVE-2015-7627" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1740-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1742-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1744-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK &amp; Compiler before 19.0.0.213 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-7625, CVE-2015-7626, CVE-2015-7630, CVE-2015-7633, and CVE-2015-7634.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7627/">CVE-2015-7627</cve>
	<bugzilla href="https://bugzilla.suse.com/950169">SUSE bug 950169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566550" comment="flash-player-11.2.202.535-0.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566551" comment="flash-player-gnome-11.2.202.535-0.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566552" comment="flash-player-kde4-11.2.202.535-0.20.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7628</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7628" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7628" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7628" ref_url="https://www.suse.com/security/cve/CVE-2015-7628" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1740-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1742-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1744-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK &amp; Compiler before 19.0.0.213 allow remote attackers to bypass the Same Origin Policy and obtain sensitive information via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7628/">CVE-2015-7628</cve>
	<bugzilla href="https://bugzilla.suse.com/950169">SUSE bug 950169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566550" comment="flash-player-11.2.202.535-0.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566551" comment="flash-player-gnome-11.2.202.535-0.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566552" comment="flash-player-kde4-11.2.202.535-0.20.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7629</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7629" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7629" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7629" ref_url="https://www.suse.com/security/cve/CVE-2015-7629" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1740-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1742-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1744-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK &amp; Compiler before 19.0.0.213 allows attackers to execute arbitrary code via a TextFormat object with a crafted tabStops property, a different vulnerability than CVE-2015-7631, CVE-2015-7643, and CVE-2015-7644.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7629/">CVE-2015-7629</cve>
	<bugzilla href="https://bugzilla.suse.com/950169">SUSE bug 950169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566550" comment="flash-player-11.2.202.535-0.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566551" comment="flash-player-gnome-11.2.202.535-0.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566552" comment="flash-player-kde4-11.2.202.535-0.20.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7630</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7630" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7630" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7630" ref_url="https://www.suse.com/security/cve/CVE-2015-7630" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1740-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1742-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1744-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK &amp; Compiler before 19.0.0.213 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-7625, CVE-2015-7626, CVE-2015-7627, CVE-2015-7633, and CVE-2015-7634.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7630/">CVE-2015-7630</cve>
	<bugzilla href="https://bugzilla.suse.com/950169">SUSE bug 950169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566550" comment="flash-player-11.2.202.535-0.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566551" comment="flash-player-gnome-11.2.202.535-0.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566552" comment="flash-player-kde4-11.2.202.535-0.20.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7631</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7631" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7631" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7631" ref_url="https://www.suse.com/security/cve/CVE-2015-7631" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1740-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1742-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1744-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK &amp; Compiler before 19.0.0.213 allows attackers to execute arbitrary code via a TextLine object with a crafted validity property, a different vulnerability than CVE-2015-7629, CVE-2015-7643, and CVE-2015-7644.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7631/">CVE-2015-7631</cve>
	<bugzilla href="https://bugzilla.suse.com/950169">SUSE bug 950169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566550" comment="flash-player-11.2.202.535-0.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566551" comment="flash-player-gnome-11.2.202.535-0.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566552" comment="flash-player-kde4-11.2.202.535-0.20.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7632</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7632" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7632" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7632" ref_url="https://www.suse.com/security/cve/CVE-2015-7632" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1740-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1742-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1744-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK &amp; Compiler before 19.0.0.213 allows attackers to execute arbitrary code via a Loader object with a crafted loaderBytes property.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7632/">CVE-2015-7632</cve>
	<bugzilla href="https://bugzilla.suse.com/950169">SUSE bug 950169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566550" comment="flash-player-11.2.202.535-0.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566551" comment="flash-player-gnome-11.2.202.535-0.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566552" comment="flash-player-kde4-11.2.202.535-0.20.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7633</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7633" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7633" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7633" ref_url="https://www.suse.com/security/cve/CVE-2015-7633" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1740-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1742-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1744-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK &amp; Compiler before 19.0.0.213 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-7625, CVE-2015-7626, CVE-2015-7627, CVE-2015-7630, and CVE-2015-7634.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7633/">CVE-2015-7633</cve>
	<bugzilla href="https://bugzilla.suse.com/950169">SUSE bug 950169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566550" comment="flash-player-11.2.202.535-0.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566551" comment="flash-player-gnome-11.2.202.535-0.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566552" comment="flash-player-kde4-11.2.202.535-0.20.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7634</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7634" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7634" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7634" ref_url="https://www.suse.com/security/cve/CVE-2015-7634" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1740-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1742-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1744-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK &amp; Compiler before 19.0.0.213 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-7625, CVE-2015-7626, CVE-2015-7627, CVE-2015-7630, and CVE-2015-7633.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7634/">CVE-2015-7634</cve>
	<bugzilla href="https://bugzilla.suse.com/950169">SUSE bug 950169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566550" comment="flash-player-11.2.202.535-0.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566551" comment="flash-player-gnome-11.2.202.535-0.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566552" comment="flash-player-kde4-11.2.202.535-0.20.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7643</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7643" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7643" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7643" ref_url="https://www.suse.com/security/cve/CVE-2015-7643" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1740-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1742-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1744-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK &amp; Compiler before 19.0.0.213 allows attackers to execute arbitrary code via a Video object with a crafted deblocking property, a different vulnerability than CVE-2015-7629, CVE-2015-7631, and CVE-2015-7644.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7643/">CVE-2015-7643</cve>
	<bugzilla href="https://bugzilla.suse.com/950169">SUSE bug 950169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566550" comment="flash-player-11.2.202.535-0.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566551" comment="flash-player-gnome-11.2.202.535-0.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566552" comment="flash-player-kde4-11.2.202.535-0.20.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157644" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7644</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7644" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7644" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7644" ref_url="https://www.suse.com/security/cve/CVE-2015-7644" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1740-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1742-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1744-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK &amp; Compiler before 19.0.0.213 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-7629, CVE-2015-7631, and CVE-2015-7643.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7644/">CVE-2015-7644</cve>
	<bugzilla href="https://bugzilla.suse.com/950169">SUSE bug 950169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566550" comment="flash-player-11.2.202.535-0.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566551" comment="flash-player-gnome-11.2.202.535-0.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566552" comment="flash-player-kde4-11.2.202.535-0.20.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7645</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7645" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7645" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7645" ref_url="https://www.suse.com/security/cve/CVE-2015-7645" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1770-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1771-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1768-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player 18.x through 18.0.0.252 and 19.x through 19.0.0.207 on Windows and OS X and 11.x through 11.2.202.535 on Linux allows remote attackers to execute arbitrary code via a crafted SWF file, as exploited in the wild in October 2015.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7645/">CVE-2015-7645</cve>
	<bugzilla href="https://bugzilla.suse.com/950474">SUSE bug 950474</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566553" comment="flash-player-11.2.202.540-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566554" comment="flash-player-gnome-11.2.202.540-0.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566555" comment="flash-player-kde4-11.2.202.540-0.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7651</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7651" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7651" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7651" ref_url="https://www.suse.com/security/cve/CVE-2015-7651" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001674.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1984-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X and before 11.2.202.548 on Linux, Adobe AIR before 19.0.0.241, Adobe AIR SDK before 19.0.0.241, and Adobe AIR SDK &amp; Compiler before 19.0.0.241 allows attackers to execute arbitrary code via crafted DefineFunction atoms, a different vulnerability than CVE-2015-7652, CVE-2015-7653, CVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657, CVE-2015-7658, CVE-2015-7660, CVE-2015-7661, CVE-2015-7663, CVE-2015-8042, CVE-2015-8043, CVE-2015-8044, and CVE-2015-8046.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7651/">CVE-2015-7651</cve>
	<bugzilla href="https://bugzilla.suse.com/954512">SUSE bug 954512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566556" comment="flash-player-11.2.202.548-0.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566557" comment="flash-player-gnome-11.2.202.548-0.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566558" comment="flash-player-kde4-11.2.202.548-0.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7652</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7652" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7652" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7652" ref_url="https://www.suse.com/security/cve/CVE-2015-7652" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001674.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1984-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X and before 11.2.202.548 on Linux, Adobe AIR before 19.0.0.241, Adobe AIR SDK before 19.0.0.241, and Adobe AIR SDK &amp; Compiler before 19.0.0.241 allows attackers to execute arbitrary code via a crafted gridFitType property value, a different vulnerability than CVE-2015-7651, CVE-2015-7653, CVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657, CVE-2015-7658, CVE-2015-7660, CVE-2015-7661, CVE-2015-7663, CVE-2015-8042, CVE-2015-8043, CVE-2015-8044, and CVE-2015-8046.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7652/">CVE-2015-7652</cve>
	<bugzilla href="https://bugzilla.suse.com/954512">SUSE bug 954512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566556" comment="flash-player-11.2.202.548-0.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566557" comment="flash-player-gnome-11.2.202.548-0.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566558" comment="flash-player-kde4-11.2.202.548-0.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7653</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7653" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7653" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7653" ref_url="https://www.suse.com/security/cve/CVE-2015-7653" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001674.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1984-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X and before 11.2.202.548 on Linux, Adobe AIR before 19.0.0.241, Adobe AIR SDK before 19.0.0.241, and Adobe AIR SDK &amp; Compiler before 19.0.0.241 allows attackers to execute arbitrary code via crafted globalToLocal arguments, a different vulnerability than CVE-2015-7651, CVE-2015-7652, CVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657, CVE-2015-7658, CVE-2015-7660, CVE-2015-7661, CVE-2015-7663, CVE-2015-8042, CVE-2015-8043, CVE-2015-8044, and CVE-2015-8046.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7653/">CVE-2015-7653</cve>
	<bugzilla href="https://bugzilla.suse.com/954512">SUSE bug 954512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566556" comment="flash-player-11.2.202.548-0.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566557" comment="flash-player-gnome-11.2.202.548-0.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566558" comment="flash-player-kde4-11.2.202.548-0.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7654</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7654" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7654" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7654" ref_url="https://www.suse.com/security/cve/CVE-2015-7654" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001674.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1984-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X and before 11.2.202.548 on Linux, Adobe AIR before 19.0.0.241, Adobe AIR SDK before 19.0.0.241, and Adobe AIR SDK &amp; Compiler before 19.0.0.241 allows attackers to execute arbitrary code via crafted attachSound arguments, a different vulnerability than CVE-2015-7651, CVE-2015-7652, CVE-2015-7653, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657, CVE-2015-7658, CVE-2015-7660, CVE-2015-7661, CVE-2015-7663, CVE-2015-8042, CVE-2015-8043, CVE-2015-8044, and CVE-2015-8046.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7654/">CVE-2015-7654</cve>
	<bugzilla href="https://bugzilla.suse.com/954512">SUSE bug 954512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566556" comment="flash-player-11.2.202.548-0.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566557" comment="flash-player-gnome-11.2.202.548-0.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566558" comment="flash-player-kde4-11.2.202.548-0.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7655</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7655" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7655" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7655" ref_url="https://www.suse.com/security/cve/CVE-2015-7655" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001674.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1984-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X and before 11.2.202.548 on Linux, Adobe AIR before 19.0.0.241, Adobe AIR SDK before 19.0.0.241, and Adobe AIR SDK &amp; Compiler before 19.0.0.241 allows attackers to execute arbitrary code via crafted actionExtends arguments, a different vulnerability than CVE-2015-7651, CVE-2015-7652, CVE-2015-7653, CVE-2015-7654, CVE-2015-7656, CVE-2015-7657, CVE-2015-7658, CVE-2015-7660, CVE-2015-7661, CVE-2015-7663, CVE-2015-8042, CVE-2015-8043, CVE-2015-8044, and CVE-2015-8046.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7655/">CVE-2015-7655</cve>
	<bugzilla href="https://bugzilla.suse.com/954512">SUSE bug 954512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566556" comment="flash-player-11.2.202.548-0.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566557" comment="flash-player-gnome-11.2.202.548-0.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566558" comment="flash-player-kde4-11.2.202.548-0.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7656</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7656" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7656" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7656" ref_url="https://www.suse.com/security/cve/CVE-2015-7656" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001674.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1984-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X and before 11.2.202.548 on Linux, Adobe AIR before 19.0.0.241, Adobe AIR SDK before 19.0.0.241, and Adobe AIR SDK &amp; Compiler before 19.0.0.241 allows attackers to execute arbitrary code via crafted actionImplementsOp arguments, a different vulnerability than CVE-2015-7651, CVE-2015-7652, CVE-2015-7653, CVE-2015-7654, CVE-2015-7655, CVE-2015-7657, CVE-2015-7658, CVE-2015-7660, CVE-2015-7661, CVE-2015-7663, CVE-2015-8042, CVE-2015-8043, CVE-2015-8044, and CVE-2015-8046.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7656/">CVE-2015-7656</cve>
	<bugzilla href="https://bugzilla.suse.com/954512">SUSE bug 954512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566556" comment="flash-player-11.2.202.548-0.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566557" comment="flash-player-gnome-11.2.202.548-0.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566558" comment="flash-player-kde4-11.2.202.548-0.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157657" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7657</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7657" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7657" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7657" ref_url="https://www.suse.com/security/cve/CVE-2015-7657" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001674.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1984-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X and before 11.2.202.548 on Linux, Adobe AIR before 19.0.0.241, Adobe AIR SDK before 19.0.0.241, and Adobe AIR SDK &amp; Compiler before 19.0.0.241 allows attackers to execute arbitrary code via crafted actionCallMethod arguments, a different vulnerability than CVE-2015-7651, CVE-2015-7652, CVE-2015-7653, CVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7658, CVE-2015-7660, CVE-2015-7661, CVE-2015-7663, CVE-2015-8042, CVE-2015-8043, CVE-2015-8044, and CVE-2015-8046.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7657/">CVE-2015-7657</cve>
	<bugzilla href="https://bugzilla.suse.com/954512">SUSE bug 954512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566556" comment="flash-player-11.2.202.548-0.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566557" comment="flash-player-gnome-11.2.202.548-0.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566558" comment="flash-player-kde4-11.2.202.548-0.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7658</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7658" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7658" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7658" ref_url="https://www.suse.com/security/cve/CVE-2015-7658" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001674.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1984-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X and before 11.2.202.548 on Linux, Adobe AIR before 19.0.0.241, Adobe AIR SDK before 19.0.0.241, and Adobe AIR SDK &amp; Compiler before 19.0.0.241 allows attackers to execute arbitrary code via crafted actionInstanceOf arguments, a different vulnerability than CVE-2015-7651, CVE-2015-7652, CVE-2015-7653, CVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657, CVE-2015-7660, CVE-2015-7661, CVE-2015-7663, CVE-2015-8042, CVE-2015-8043, CVE-2015-8044, and CVE-2015-8046.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7658/">CVE-2015-7658</cve>
	<bugzilla href="https://bugzilla.suse.com/954512">SUSE bug 954512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566556" comment="flash-player-11.2.202.548-0.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566557" comment="flash-player-gnome-11.2.202.548-0.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566558" comment="flash-player-kde4-11.2.202.548-0.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7659</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7659" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7659" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7659" ref_url="https://www.suse.com/security/cve/CVE-2015-7659" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001674.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1984-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X and before 11.2.202.548 on Linux, Adobe AIR before 19.0.0.241, Adobe AIR SDK before 19.0.0.241, and Adobe AIR SDK &amp; Compiler before 19.0.0.241 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion" in the NetConnection object implementation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7659/">CVE-2015-7659</cve>
	<bugzilla href="https://bugzilla.suse.com/954512">SUSE bug 954512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566556" comment="flash-player-11.2.202.548-0.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566557" comment="flash-player-gnome-11.2.202.548-0.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566558" comment="flash-player-kde4-11.2.202.548-0.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7660</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7660" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7660" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7660" ref_url="https://www.suse.com/security/cve/CVE-2015-7660" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001674.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1984-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X and before 11.2.202.548 on Linux, Adobe AIR before 19.0.0.241, Adobe AIR SDK before 19.0.0.241, and Adobe AIR SDK &amp; Compiler before 19.0.0.241 allows attackers to execute arbitrary code via crafted setMask arguments, a different vulnerability than CVE-2015-7651, CVE-2015-7652, CVE-2015-7653, CVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657, CVE-2015-7658, CVE-2015-7661, CVE-2015-7663, CVE-2015-8042, CVE-2015-8043, CVE-2015-8044, and CVE-2015-8046.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7660/">CVE-2015-7660</cve>
	<bugzilla href="https://bugzilla.suse.com/954512">SUSE bug 954512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566556" comment="flash-player-11.2.202.548-0.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566557" comment="flash-player-gnome-11.2.202.548-0.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566558" comment="flash-player-kde4-11.2.202.548-0.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7661</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7661" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7661" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7661" ref_url="https://www.suse.com/security/cve/CVE-2015-7661" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001674.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1984-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X and before 11.2.202.548 on Linux, Adobe AIR before 19.0.0.241, Adobe AIR SDK before 19.0.0.241, and Adobe AIR SDK &amp; Compiler before 19.0.0.241 allows attackers to execute arbitrary code via a crafted getBounds call, a different vulnerability than CVE-2015-7651, CVE-2015-7652, CVE-2015-7653, CVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657, CVE-2015-7658, CVE-2015-7660, CVE-2015-7663, CVE-2015-8042, CVE-2015-8043, CVE-2015-8044, and CVE-2015-8046.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7661/">CVE-2015-7661</cve>
	<bugzilla href="https://bugzilla.suse.com/954512">SUSE bug 954512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566556" comment="flash-player-11.2.202.548-0.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566557" comment="flash-player-gnome-11.2.202.548-0.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566558" comment="flash-player-kde4-11.2.202.548-0.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7662</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7662" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7662" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7662" ref_url="https://www.suse.com/security/cve/CVE-2015-7662" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001674.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1984-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X and before 11.2.202.548 on Linux, Adobe AIR before 19.0.0.241, Adobe AIR SDK before 19.0.0.241, and Adobe AIR SDK &amp; Compiler before 19.0.0.241 allow remote attackers to bypass intended access restrictions and write to files via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7662/">CVE-2015-7662</cve>
	<bugzilla href="https://bugzilla.suse.com/954512">SUSE bug 954512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566556" comment="flash-player-11.2.202.548-0.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566557" comment="flash-player-gnome-11.2.202.548-0.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566558" comment="flash-player-kde4-11.2.202.548-0.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7663</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7663" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7663" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7663" ref_url="https://www.suse.com/security/cve/CVE-2015-7663" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001674.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1984-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X and before 11.2.202.548 on Linux, Adobe AIR before 19.0.0.241, Adobe AIR SDK before 19.0.0.241, and Adobe AIR SDK &amp; Compiler before 19.0.0.241 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-7651, CVE-2015-7652, CVE-2015-7653, CVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657, CVE-2015-7658, CVE-2015-7660, CVE-2015-7661, CVE-2015-8042, CVE-2015-8043, CVE-2015-8044, and CVE-2015-8046.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7663/">CVE-2015-7663</cve>
	<bugzilla href="https://bugzilla.suse.com/954512">SUSE bug 954512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566556" comment="flash-player-11.2.202.548-0.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566557" comment="flash-player-gnome-11.2.202.548-0.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566558" comment="flash-player-kde4-11.2.202.548-0.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7673</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7673" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7673" ref_url="https://www.suse.com/security/cve/CVE-2015-7673" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2195-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001761.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0897-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00124.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1467-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00006.html" source="SUSE-SU"/>
    <description>
    io-tga.c in gdk-pixbuf before 2.32.0 uses heap memory after its allocation failed, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) and possibly execute arbitrary code via a crafted Truevision TGA (TARGA) file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7673/">CVE-2015-7673</cve>
	<bugzilla href="https://bugzilla.suse.com/948790">SUSE bug 948790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333994" comment="gdk-pixbuf is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7674</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7674" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7674" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7674" ref_url="https://www.suse.com/security/cve/CVE-2015-7674" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2195-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001761.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0897-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00124.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1467-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00006.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the pixops_scale_nearest function in pixops/pixops.c in gdk-pixbuf before 2.32.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted GIF image file, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7674/">CVE-2015-7674</cve>
	<bugzilla href="https://bugzilla.suse.com/948791">SUSE bug 948791</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566630" comment="gtk2-2.18.9-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566631" comment="gtk2-32bit-2.18.9-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566632" comment="gtk2-lang-2.18.9-0.35.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7691</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7691" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7691" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7691" ref_url="https://www.suse.com/security/cve/CVE-2015-7691" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2016-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    The crypto_xmit function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash) via crafted packets containing particular autokey operations.  NOTE: This vulnerability exists due to an incomplete fix for CVE-2014-9750.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-14"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7691/">CVE-2015-7691</cve>
	<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911792">SUSE bug 911792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567412" comment="ntp-4.2.8p4-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567413" comment="ntp-doc-4.2.8p4-5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7692</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7692" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7692" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7692" ref_url="https://www.suse.com/security/cve/CVE-2015-7692" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2016-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    The crypto_xmit function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash).  NOTE: This vulnerability exists due to an incomplete fix for CVE-2014-9750.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-14"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7692/">CVE-2015-7692</cve>
	<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911792">SUSE bug 911792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567412" comment="ntp-4.2.8p4-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567413" comment="ntp-doc-4.2.8p4-5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157701" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7701</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7701" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7701" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7701" ref_url="https://www.suse.com/security/cve/CVE-2015-7701" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2016-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    Memory leak in the CRYPTO_ASSOC function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (memory consumption).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7701/">CVE-2015-7701</cve>
	<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567412" comment="ntp-4.2.8p4-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567413" comment="ntp-doc-4.2.8p4-5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7702</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7702" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7702" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7702" ref_url="https://www.suse.com/security/cve/CVE-2015-7702" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2016-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    The crypto_xmit function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash).  NOTE: This vulnerability exists due to an incomplete fix for CVE-2014-9750.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-14"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7702/">CVE-2015-7702</cve>
	<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911792">SUSE bug 911792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567412" comment="ntp-4.2.8p4-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567413" comment="ntp-doc-4.2.8p4-5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7703</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7703" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7703" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7703" ref_url="https://www.suse.com/security/cve/CVE-2015-7703" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2016-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    The "pidfile" or "driftfile" directives in NTP ntpd 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77, when ntpd is configured to allow remote configuration, allows remote attackers with an IP address that is allowed to send configuration requests, and with knowledge of the remote configuration password to write to arbitrary files via the :config command.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7703/">CVE-2015-7703</cve>
	<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943216">SUSE bug 943216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943218">SUSE bug 943218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943219">SUSE bug 943219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943221">SUSE bug 943221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567412" comment="ntp-4.2.8p4-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567413" comment="ntp-doc-4.2.8p4-5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7704</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7704" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7704" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7704" ref_url="https://www.suse.com/security/cve/CVE-2015-7704" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1291-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1568-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2016-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    The ntpd client in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service via a number of crafted "KOD" messages.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7704/">CVE-2015-7704</cve>
	<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952611">SUSE bug 952611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977446">SUSE bug 977446</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567412" comment="ntp-4.2.8p4-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567413" comment="ntp-doc-4.2.8p4-5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7705</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7705" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7705" ref_url="https://www.suse.com/security/cve/CVE-2015-7705" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1291-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1568-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2016-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    The rate limiting feature in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to have unspecified impact via a large number of crafted requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7705/">CVE-2015-7705</cve>
	<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952611">SUSE bug 952611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567412" comment="ntp-4.2.8p4-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567413" comment="ntp-doc-4.2.8p4-5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7744</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7744" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7744" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7744" ref_url="https://www.suse.com/security/cve/CVE-2015-7744" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001853.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0367-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html" source="SUSE-SU"/>
    <description>
    wolfSSL (formerly CyaSSL) before 3.6.8 does not properly handle faults associated with the Chinese Remainder Theorem (CRT) process when allowing ephemeral key exchange without low memory optimizations on a server, which makes it easier for remote attackers to obtain private RSA keys by capturing TLS handshakes, aka a Lenstra attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7744/">CVE-2015-7744</cve>
	<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962817">SUSE bug 962817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962930">SUSE bug 962930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962931">SUSE bug 962931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962932">SUSE bug 962932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962934">SUSE bug 962934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962935">SUSE bug 962935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962936">SUSE bug 962936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962937">SUSE bug 962937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962938">SUSE bug 962938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962939">SUSE bug 962939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962941">SUSE bug 962941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962942">SUSE bug 962942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962943">SUSE bug 962943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962944">SUSE bug 962944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962945">SUSE bug 962945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962946">SUSE bug 962946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962947">SUSE bug 962947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962948">SUSE bug 962948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962949">SUSE bug 962949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962950">SUSE bug 962950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962951">SUSE bug 962951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962952">SUSE bug 962952</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566984" comment="libmysql55client18-5.5.47-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566985" comment="libmysql55client18-32bit-5.5.47-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566986" comment="libmysql55client_r18-5.5.47-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566987" comment="libmysql55client_r18-32bit-5.5.47-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566988" comment="mysql-5.5.47-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566989" comment="mysql-client-5.5.47-0.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7799</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7799" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7799" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7799" ref_url="https://www.suse.com/security/cve/CVE-2015-7799" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2194-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2292-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2339-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2350-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0585-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2232-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    The slhc_init function in drivers/net/slip/slhc.c in the Linux kernel through 4.2.3 does not ensure that certain slot numbers are valid, which allows local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7799/">CVE-2015-7799</cve>
	<bugzilla href="https://bugzilla.suse.com/1052256">SUSE bug 1052256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949936">SUSE bug 949936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951638">SUSE bug 951638</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567368" comment="kernel-default-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567369" comment="kernel-default-base-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567370" comment="kernel-default-devel-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567371" comment="kernel-default-extra-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567372" comment="kernel-pae-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567373" comment="kernel-pae-base-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567374" comment="kernel-pae-devel-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567375" comment="kernel-pae-extra-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567376" comment="kernel-source-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567377" comment="kernel-syms-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567378" comment="kernel-trace-devel-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567379" comment="kernel-xen-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567380" comment="kernel-xen-base-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567381" comment="kernel-xen-devel-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567382" comment="kernel-xen-extra-3.0.101-68.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7805</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7805" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7805" ref_url="https://www.suse.com/security/cve/CVE-2015-7805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2000-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001763.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1995-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2119-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00145.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in libsndfile 1.0.25 allows remote attackers to have unspecified impact via the headindex value in the header in an AIFF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7805/">CVE-2015-7805</cve>
	<bugzilla href="https://bugzilla.suse.com/953516">SUSE bug 953516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953519">SUSE bug 953519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566914" comment="libsndfile-1.0.20-2.10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566915" comment="libsndfile-32bit-1.0.20-2.10.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7812</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7812" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7812" ref_url="https://www.suse.com/security/cve/CVE-2015-7812" source="SUSE CVE"/>
    <description>
    The hypercall_create_continuation function in arch/arm/domain.c in Xen 4.4.x through 4.6.x allows local guest users to cause a denial of service (host crash) via a preemptible hypercall to the multicall interface.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7812/">CVE-2015-7812</cve>
	<bugzilla href="https://bugzilla.suse.com/950171">SUSE bug 950171</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7813</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7813" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7813" ref_url="https://www.suse.com/security/cve/CVE-2015-7813" source="SUSE CVE"/>
    <description>
    Xen 4.4.x, 4.5.x, and 4.6.x does not limit the number of printk console messages when reporting unimplemented hypercalls, which allows local guests to cause a denial of service via a sequence of (1) HYPERVISOR_physdev_op hypercalls, which are not properly handled in the do_physdev_op function in arch/arm/physdev.c, or (2) HYPERVISOR_hvm_op hypercalls, which are not properly handled in the do_hvm_op function in arch/arm/hvm.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7813/">CVE-2015-7813</cve>
	<bugzilla href="https://bugzilla.suse.com/950172">SUSE bug 950172</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7814</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7814" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7814" ref_url="https://www.suse.com/security/cve/CVE-2015-7814" source="SUSE CVE"/>
    <description>
    Race condition in the relinquish_memory function in arch/arm/domain.c in Xen 4.6.x and earlier allows local domains with partial management control to cause a denial of service (host crash) via vectors involving the destruction of a domain and using XENMEM_decrease_reservation to reduce the memory of the domain.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7814/">CVE-2015-7814</cve>
	<bugzilla href="https://bugzilla.suse.com/950173">SUSE bug 950173</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7830</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7830" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7830" ref_url="https://www.suse.com/security/cve/CVE-2015-7830" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1836-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1836-2" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00057.html" source="SUSE-SU"/>
    <description>
    The pcapng_read_if_descr_block function in wiretap/pcapng.c in the pcapng parser in Wireshark 1.12.x before 1.12.8 uses too many levels of pointer indirection, which allows remote attackers to cause a denial of service (incorrect free and application crash) via a crafted packet that triggers interface-filter copying.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7830/">CVE-2015-7830</cve>
	<bugzilla href="https://bugzilla.suse.com/950437">SUSE bug 950437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563895" comment="wireshark-1.12.9-0.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7835</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7835" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7835" ref_url="https://www.suse.com/security/cve/CVE-2015-7835" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1952-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001754.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1965-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2003-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2249-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2250-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00053.html" source="SUSE-SU"/>
    <description>
    The mod_l2_entry function in arch/x86/mm.c in Xen 3.4 through 4.6.x does not properly validate level 2 page table entries, which allows local PV guest administrators to gain privileges via a crafted superpage mapping.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7835/">CVE-2015-7835</cve>
	<bugzilla href="https://bugzilla.suse.com/940929">SUSE bug 940929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947159">SUSE bug 947159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567189" comment="xen-4.2.5_14-18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567190" comment="xen-doc-html-4.2.5_14-18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567191" comment="xen-doc-pdf-4.2.5_14-18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567192" comment="xen-kmp-default-4.2.5_14_3.0.101_0.47.67-18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567193" comment="xen-kmp-pae-4.2.5_14_3.0.101_0.47.67-18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567194" comment="xen-libs-4.2.5_14-18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567195" comment="xen-libs-32bit-4.2.5_14-18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567196" comment="xen-tools-4.2.5_14-18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567197" comment="xen-tools-domU-4.2.5_14-18.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567475" comment="xen-4.4.3_06-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567476" comment="xen-doc-html-4.4.3_06-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567477" comment="xen-kmp-default-4.4.3_06_3.0.101_65-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567478" comment="xen-kmp-pae-4.4.3_06_3.0.101_65-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567479" comment="xen-libs-4.4.3_06-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567480" comment="xen-libs-32bit-4.4.3_06-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567481" comment="xen-tools-4.4.3_06-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567482" comment="xen-tools-domU-4.4.3_06-29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7837</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7837" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7837" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7837" ref_url="https://www.suse.com/security/cve/CVE-2015-7837" source="SUSE CVE"/>
    <description>
    The Linux kernel, as used in Red Hat Enterprise Linux 7, kernel-rt, and Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended securelevel/secureboot restrictions by leveraging improper handling of secure_boot flag across kexec reboot.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7837/">CVE-2015-7837</cve>
	<bugzilla href="https://bugzilla.suse.com/950804">SUSE bug 950804</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7848</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7848" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7848" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7848" ref_url="https://www.suse.com/security/cve/CVE-2015-7848" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2016-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    An integer overflow can occur in NTP-dev.4.3.70 leading to an out-of-bounds memory copy operation when processing a specially crafted private mode packet. The crafted packet needs to have the correct message authentication code and a valid timestamp. When processed by the NTP daemon, it leads to an immediate crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7848/">CVE-2015-7848</cve>
	<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567412" comment="ntp-4.2.8p4-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567413" comment="ntp-doc-4.2.8p4-5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7849</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7849" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7849" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7849" ref_url="https://www.suse.com/security/cve/CVE-2015-7849" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2016-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote authenticated users to possibly execute arbitrary code or cause a denial of service (crash) via crafted packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7849/">CVE-2015-7849</cve>
	<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567412" comment="ntp-4.2.8p4-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567413" comment="ntp-doc-4.2.8p4-5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7850</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7850" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7850" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7850" ref_url="https://www.suse.com/security/cve/CVE-2015-7850" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2016-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote authenticated users to cause a denial of service (infinite loop or crash) by pointing the key file at the log file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7850/">CVE-2015-7850</cve>
	<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567412" comment="ntp-4.2.8p4-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567413" comment="ntp-doc-4.2.8p4-5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7851</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7851" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7851" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7851" ref_url="https://www.suse.com/security/cve/CVE-2015-7851" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2016-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    Directory traversal vulnerability in the save_config function in ntpd in ntp_control.c in NTP before 4.2.8p4, when used on systems that do not use '\' or '/' characters for directory separation such as OpenVMS, allows remote authenticated users to overwrite arbitrary files.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7851/">CVE-2015-7851</cve>
	<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567412" comment="ntp-4.2.8p4-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567413" comment="ntp-doc-4.2.8p4-5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7852</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7852" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7852" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7852" ref_url="https://www.suse.com/security/cve/CVE-2015-7852" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2016-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    ntpq in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash) via crafted mode 6 response packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7852/">CVE-2015-7852</cve>
	<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567412" comment="ntp-4.2.8p4-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567413" comment="ntp-doc-4.2.8p4-5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7853</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7853" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7853" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7853" ref_url="https://www.suse.com/security/cve/CVE-2015-7853" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2016-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    The datalen parameter in the refclock driver in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a negative input value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7853/">CVE-2015-7853</cve>
	<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567412" comment="ntp-4.2.8p4-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567413" comment="ntp-doc-4.2.8p4-5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157854" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7854</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7854" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7854" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7854" ref_url="https://www.suse.com/security/cve/CVE-2015-7854" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2016-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the password management functionality in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted key file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7854/">CVE-2015-7854</cve>
	<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567412" comment="ntp-4.2.8p4-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567413" comment="ntp-doc-4.2.8p4-5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7855</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7855" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7855" ref_url="https://www.suse.com/security/cve/CVE-2015-7855" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2016-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    The decodenetnum function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (assertion failure) via a 6 or mode 7 packet containing a long data value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-14"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7855/">CVE-2015-7855</cve>
	<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567412" comment="ntp-4.2.8p4-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567413" comment="ntp-doc-4.2.8p4-5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7871</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7871" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7871" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7871" ref_url="https://www.suse.com/security/cve/CVE-2015-7871" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2016-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    Crypto-NAK packets in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to bypass authentication.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7871/">CVE-2015-7871</cve>
	<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952606">SUSE bug 952606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567412" comment="ntp-4.2.8p4-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567413" comment="ntp-doc-4.2.8p4-5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7872</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7872" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7872" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7872" ref_url="https://www.suse.com/security/cve/CVE-2015-7872" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2194-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2292-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2339-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2350-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0335-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0337-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0354-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0380-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0381-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0383-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0384-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0434-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1842-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 4.2.6 allows local users to cause a denial of service (OOPS) via crafted keyctl commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7872/">CVE-2015-7872</cve>
	<bugzilla href="https://bugzilla.suse.com/951440">SUSE bug 951440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951542">SUSE bug 951542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951638">SUSE bug 951638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958463">SUSE bug 958463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958601">SUSE bug 958601</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566744" comment="kernel-bigsmp-devel-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566745" comment="kernel-default-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566746" comment="kernel-default-base-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566747" comment="kernel-default-devel-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566748" comment="kernel-default-extra-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566749" comment="kernel-pae-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566750" comment="kernel-pae-base-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566751" comment="kernel-pae-devel-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566752" comment="kernel-pae-extra-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566753" comment="kernel-source-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566754" comment="kernel-syms-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566755" comment="kernel-trace-devel-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566756" comment="kernel-xen-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566757" comment="kernel-xen-base-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566758" comment="kernel-xen-devel-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566759" comment="kernel-xen-extra-3.0.101-0.47.71.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567368" comment="kernel-default-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567369" comment="kernel-default-base-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567370" comment="kernel-default-devel-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567371" comment="kernel-default-extra-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567372" comment="kernel-pae-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567373" comment="kernel-pae-base-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567374" comment="kernel-pae-devel-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567375" comment="kernel-pae-extra-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567376" comment="kernel-source-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567377" comment="kernel-syms-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567378" comment="kernel-trace-devel-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567379" comment="kernel-xen-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567380" comment="kernel-xen-base-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567381" comment="kernel-xen-devel-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567382" comment="kernel-xen-extra-3.0.101-68.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7884</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7884" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7884" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7884" ref_url="https://www.suse.com/security/cve/CVE-2015-7884" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html" source="SUSE-SU"/>
    <description>
    The vivid_fb_ioctl function in drivers/media/platform/vivid/vivid-osd.c in the Linux kernel through 4.3.3 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-18"/>
	<updated date="2021-11-18"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7884/">CVE-2015-7884</cve>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951626">SUSE bug 951626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951627">SUSE bug 951627</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7885</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7885" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7885" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7885" ref_url="https://www.suse.com/security/cve/CVE-2015-7885" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00005.html" source="SUSE-SU"/>
    <description>
    The dgnc_mgmt_ioctl function in drivers/staging/dgnc/dgnc_mgmt.c in the Linux kernel through 4.3.3 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-21"/>
	<updated date="2021-11-21"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7885/">CVE-2015-7885</cve>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951626">SUSE bug 951626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951627">SUSE bug 951627</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7941</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7941" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7941" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7941" ref_url="https://www.suse.com/security/cve/CVE-2015-7941" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2372-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0106-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html" source="SUSE-SU"/>
    <description>
    libxml2 2.9.2 does not properly stop parsing invalid input, which allows context-dependent attackers to cause a denial of service (out-of-bounds read and libxml2 crash) via crafted XML data to the (1) xmlParseEntityDecl or (2) xmlParseConditionalSections function in parser.c, as demonstrated by non-terminated entities.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-10"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7941/">CVE-2015-7941</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951734">SUSE bug 951734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951735">SUSE bug 951735</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566939" comment="libxml2-2.7.6-0.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566940" comment="libxml2-32bit-2.7.6-0.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566941" comment="libxml2-python-2.7.6-0.34.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7942</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7942" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7942" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7942" ref_url="https://www.suse.com/security/cve/CVE-2015-7942" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2372-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0106-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html" source="SUSE-SU"/>
    <description>
    The xmlParseConditionalSections function in parser.c in libxml2 does not properly skip intermediary entities when it stops parsing invalid input, which allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via crafted XML data, a different vulnerability than CVE-2015-7941.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-10"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7942/">CVE-2015-7942</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951735">SUSE bug 951735</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566939" comment="libxml2-2.7.6-0.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566940" comment="libxml2-32bit-2.7.6-0.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566941" comment="libxml2-python-2.7.6-0.34.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7969</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7969" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7969" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7969" ref_url="https://www.suse.com/security/cve/CVE-2015-7969" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1952-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001754.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1965-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2003-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00023.html" source="SUSE-SU"/>
    <description>
    Multiple memory leaks in Xen 4.0 through 4.6.x allow local guest administrators or domains with certain permission to cause a denial of service (memory consumption) via a large number of "teardowns" of domains with the vcpu pointer array allocated using the (1) XEN_DOMCTL_max_vcpus hypercall or the xenoprofile state vcpu pointer array allocated using the (2) XENOPROF_get_buffer or (3) XENOPROF_set_passive hypercall.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7969/">CVE-2015-7969</cve>
	<bugzilla href="https://bugzilla.suse.com/950703">SUSE bug 950703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950705">SUSE bug 950705</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567261" comment="xen-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567262" comment="xen-doc-html-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567263" comment="xen-doc-pdf-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567264" comment="xen-kmp-default-4.2.5_18_3.0.101_0.47.71-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567265" comment="xen-kmp-pae-4.2.5_18_3.0.101_0.47.71-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567266" comment="xen-libs-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567267" comment="xen-libs-32bit-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567268" comment="xen-tools-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567269" comment="xen-tools-domU-4.2.5_18-21.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567475" comment="xen-4.4.3_06-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567476" comment="xen-doc-html-4.4.3_06-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567477" comment="xen-kmp-default-4.4.3_06_3.0.101_65-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567478" comment="xen-kmp-pae-4.4.3_06_3.0.101_65-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567479" comment="xen-libs-4.4.3_06-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567480" comment="xen-libs-32bit-4.4.3_06-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567481" comment="xen-tools-4.4.3_06-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567482" comment="xen-tools-domU-4.4.3_06-29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7970</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7970" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7970" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7970" ref_url="https://www.suse.com/security/cve/CVE-2015-7970" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001754.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2249-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2250-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    The p2m_pod_emergency_sweep function in arch/x86/mm/p2m-pod.c in Xen 3.4.x, 3.5.x, and 3.6.x is not preemptible, which allows local x86 HVM guest administrators to cause a denial of service (CPU consumption and possibly reboot) via crafted memory contents that triggers a "time-consuming linear scan," related to Populate-on-Demand.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7970/">CVE-2015-7970</cve>
	<bugzilla href="https://bugzilla.suse.com/950704">SUSE bug 950704</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567261" comment="xen-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567262" comment="xen-doc-html-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567263" comment="xen-doc-pdf-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567264" comment="xen-kmp-default-4.2.5_18_3.0.101_0.47.71-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567265" comment="xen-kmp-pae-4.2.5_18_3.0.101_0.47.71-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567266" comment="xen-libs-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567267" comment="xen-libs-32bit-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567268" comment="xen-tools-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567269" comment="xen-tools-domU-4.2.5_18-21.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567475" comment="xen-4.4.3_06-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567476" comment="xen-doc-html-4.4.3_06-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567477" comment="xen-kmp-default-4.4.3_06_3.0.101_65-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567478" comment="xen-kmp-pae-4.4.3_06_3.0.101_65-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567479" comment="xen-libs-4.4.3_06-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567480" comment="xen-libs-32bit-4.4.3_06-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567481" comment="xen-tools-4.4.3_06-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567482" comment="xen-tools-domU-4.4.3_06-29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7971</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7971" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7971" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7971" ref_url="https://www.suse.com/security/cve/CVE-2015-7971" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1952-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1965-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2003-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00023.html" source="SUSE-SU"/>
    <description>
    Xen 3.2.x through 4.6.x does not limit the number of printk console messages when logging certain pmu and profiling hypercalls, which allows local guests to cause a denial of service via a sequence of crafted (1) HYPERCALL_xenoprof_op hypercalls, which are not properly handled in the do_xenoprof_op function in common/xenoprof.c, or (2) HYPERVISOR_xenpmu_op hypercalls, which are not properly handled in the do_xenpmu_op function in arch/x86/cpu/vpmu.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7971/">CVE-2015-7971</cve>
	<bugzilla href="https://bugzilla.suse.com/950706">SUSE bug 950706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567261" comment="xen-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567262" comment="xen-doc-html-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567263" comment="xen-doc-pdf-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567264" comment="xen-kmp-default-4.2.5_18_3.0.101_0.47.71-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567265" comment="xen-kmp-pae-4.2.5_18_3.0.101_0.47.71-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567266" comment="xen-libs-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567267" comment="xen-libs-32bit-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567268" comment="xen-tools-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567269" comment="xen-tools-domU-4.2.5_18-21.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567475" comment="xen-4.4.3_06-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567476" comment="xen-doc-html-4.4.3_06-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567477" comment="xen-kmp-default-4.4.3_06_3.0.101_65-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567478" comment="xen-kmp-pae-4.4.3_06_3.0.101_65-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567479" comment="xen-libs-4.4.3_06-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567480" comment="xen-libs-32bit-4.4.3_06-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567481" comment="xen-tools-4.4.3_06-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567482" comment="xen-tools-domU-4.4.3_06-29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7972</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7972" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7972" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7972" ref_url="https://www.suse.com/security/cve/CVE-2015-7972" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001754.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1965-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2003-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00023.html" source="SUSE-SU"/>
    <description>
    The (1) libxl_set_memory_target function in tools/libxl/libxl.c and (2) libxl__build_post function in tools/libxl/libxl_dom.c in Xen 3.4.x through 4.6.x do not properly calculate the balloon size when using the populate-on-demand (PoD) system, which allows local HVM guest users to cause a denial of service (guest crash) via unspecified vectors related to "heavy memory pressure."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7972/">CVE-2015-7972</cve>
	<bugzilla href="https://bugzilla.suse.com/950704">SUSE bug 950704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951845">SUSE bug 951845</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567261" comment="xen-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567262" comment="xen-doc-html-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567263" comment="xen-doc-pdf-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567264" comment="xen-kmp-default-4.2.5_18_3.0.101_0.47.71-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567265" comment="xen-kmp-pae-4.2.5_18_3.0.101_0.47.71-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567266" comment="xen-libs-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567267" comment="xen-libs-32bit-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567268" comment="xen-tools-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567269" comment="xen-tools-domU-4.2.5_18-21.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567475" comment="xen-4.4.3_06-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567476" comment="xen-doc-html-4.4.3_06-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567477" comment="xen-kmp-default-4.4.3_06_3.0.101_65-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567478" comment="xen-kmp-pae-4.4.3_06_3.0.101_65-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567479" comment="xen-libs-4.4.3_06-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567480" comment="xen-libs-32bit-4.4.3_06-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567481" comment="xen-tools-4.4.3_06-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567482" comment="xen-tools-domU-4.4.3_06-29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7981</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7981" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7981" ref_url="https://www.suse.com/security/cve/CVE-2015-7981" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0399-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0428-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0431-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0433-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0636-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0770-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0776-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2099-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2136-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00160.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1652-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00046.html" source="SUSE-SU"/>
    <description>
    The png_convert_to_rfc1123 function in png.c in libpng 1.0.x before 1.0.64, 1.2.x before 1.2.54, and 1.4.x before 1.4.17 allows remote attackers to obtain sensitive process memory information via crafted tIME chunk data in an image file, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7981/">CVE-2015-7981</cve>
	<bugzilla href="https://bugzilla.suse.com/952051">SUSE bug 952051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960402">SUSE bug 960402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566851" comment="libpng12-0-1.2.31-5.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566852" comment="libpng12-0-32bit-1.2.31-5.35.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7990</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7990" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7990" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7990" ref_url="https://www.suse.com/security/cve/CVE-2015-7990" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2194-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2292-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2339-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2350-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0335-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0337-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0354-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0380-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0381-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0383-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0384-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0434-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2232-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel before 4.3.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6937.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7990/">CVE-2015-7990</cve>
	<bugzilla href="https://bugzilla.suse.com/945825">SUSE bug 945825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952384">SUSE bug 952384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953052">SUSE bug 953052</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566744" comment="kernel-bigsmp-devel-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566745" comment="kernel-default-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566746" comment="kernel-default-base-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566747" comment="kernel-default-devel-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566748" comment="kernel-default-extra-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566749" comment="kernel-pae-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566750" comment="kernel-pae-base-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566751" comment="kernel-pae-devel-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566752" comment="kernel-pae-extra-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566753" comment="kernel-source-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566754" comment="kernel-syms-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566755" comment="kernel-trace-devel-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566756" comment="kernel-xen-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566757" comment="kernel-xen-base-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566758" comment="kernel-xen-devel-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566759" comment="kernel-xen-extra-3.0.101-0.47.71.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567368" comment="kernel-default-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567369" comment="kernel-default-base-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567370" comment="kernel-default-devel-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567371" comment="kernel-default-extra-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567372" comment="kernel-pae-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567373" comment="kernel-pae-base-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567374" comment="kernel-pae-devel-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567375" comment="kernel-pae-extra-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567376" comment="kernel-source-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567377" comment="kernel-syms-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567378" comment="kernel-trace-devel-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567379" comment="kernel-xen-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567380" comment="kernel-xen-base-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567381" comment="kernel-xen-devel-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567382" comment="kernel-xen-extra-3.0.101-68.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8000</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8000" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8000" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8000" ref_url="https://www.suse.com/security/cve/CVE-2015-8000" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2340-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2341-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0227-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2364-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2365-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00042.html" source="SUSE-SU"/>
    <description>
    db.c in named in ISC BIND 9.x before 9.9.8-P2 and 9.10.x before 9.10.3-P2 allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) via a malformed class attribute.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8000/">CVE-2015-8000</cve>
	<bugzilla href="https://bugzilla.suse.com/944066">SUSE bug 944066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958861">SUSE bug 958861</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566362" comment="bind-libs-9.9.6P1-0.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566363" comment="bind-libs-32bit-9.9.6P1-0.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566364" comment="bind-utils-9.9.6P1-0.19.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8019</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8019" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8019" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8019" ref_url="https://www.suse.com/security/cve/CVE-2015-8019" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1994-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2009-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00021.html" source="SUSE-SU"/>
    <description>
    The skb_copy_and_csum_datagram_iovec function in net/core/datagram.c in the Linux kernel 3.14.54 and 3.18.22 does not accept a length argument, which allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a write system call followed by a recvmsg system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8019/">CVE-2015-8019</cve>
	<bugzilla href="https://bugzilla.suse.com/1032268">SUSE bug 1032268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951199">SUSE bug 951199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952587">SUSE bug 952587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979078">SUSE bug 979078</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8023</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8023" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8023" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8023" ref_url="https://www.suse.com/security/cve/CVE-2015-8023" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2183-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001715.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2103-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00139.html" source="SUSE-SU"/>
    <description>
    The server implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2 plugin in strongSwan 4.2.12 through 5.x before 5.3.4 does not properly validate local state, which allows remote attackers to bypass authentication via an empty Success message in response to an initial Challenge message.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8023/">CVE-2015-8023</cve>
	<bugzilla href="https://bugzilla.suse.com/953817">SUSE bug 953817</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567148" comment="strongswan-4.4.0-6.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567149" comment="strongswan-doc-4.4.0-6.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158025" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8025</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8025" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8025" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8025" ref_url="https://www.suse.com/security/cve/CVE-2015-8025" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2053-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001686.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2032-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00102.html" source="SUSE-SU"/>
    <description>
    driver/subprocs.c in XScreenSaver before 5.34 does not properly perform an internal consistency check, which allows physically proximate attackers to bypass the lock screen by hot swapping monitors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-11"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8025/">CVE-2015-8025</cve>
	<bugzilla href="https://bugzilla.suse.com/952062">SUSE bug 952062</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567286" comment="xscreensaver-5.07-6.36.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158035" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8035</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8035" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8035" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8035" ref_url="https://www.suse.com/security/cve/CVE-2015-8035" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2372-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0106-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html" source="SUSE-SU"/>
    <description>
    The xz_decomp function in xzlib.c in libxml2 2.9.1 does not properly detect compression errors, which allows context-dependent attackers to cause a denial of service (process hang) via crafted XML data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8035/">CVE-2015-8035</cve>
	<bugzilla href="https://bugzilla.suse.com/1088279">SUSE bug 1088279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105166">SUSE bug 1105166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954429">SUSE bug 954429</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334009" comment="libxml2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8042</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8042" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8042" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8042" ref_url="https://www.suse.com/security/cve/CVE-2015-8042" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001674.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1984-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X and before 11.2.202.548 on Linux, Adobe AIR before 19.0.0.241, Adobe AIR SDK before 19.0.0.241, and Adobe AIR SDK &amp; Compiler before 19.0.0.241 allows attackers to execute arbitrary code via a crafted loadSound call, a different vulnerability than CVE-2015-7651, CVE-2015-7652, CVE-2015-7653, CVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657, CVE-2015-7658, CVE-2015-7660, CVE-2015-7661, CVE-2015-7663, CVE-2015-8043, CVE-2015-8044, and CVE-2015-8046.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8042/">CVE-2015-8042</cve>
	<bugzilla href="https://bugzilla.suse.com/954512">SUSE bug 954512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566556" comment="flash-player-11.2.202.548-0.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566557" comment="flash-player-gnome-11.2.202.548-0.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566558" comment="flash-player-kde4-11.2.202.548-0.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158043" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8043</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8043" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8043" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8043" ref_url="https://www.suse.com/security/cve/CVE-2015-8043" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001674.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1984-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X and before 11.2.202.548 on Linux, Adobe AIR before 19.0.0.241, Adobe AIR SDK before 19.0.0.241, and Adobe AIR SDK &amp; Compiler before 19.0.0.241 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-7651, CVE-2015-7652, CVE-2015-7653, CVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657, CVE-2015-7658, CVE-2015-7660, CVE-2015-7661, CVE-2015-7663, CVE-2015-8042, CVE-2015-8044, and CVE-2015-8046.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8043/">CVE-2015-8043</cve>
	<bugzilla href="https://bugzilla.suse.com/954512">SUSE bug 954512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566556" comment="flash-player-11.2.202.548-0.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566557" comment="flash-player-gnome-11.2.202.548-0.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566558" comment="flash-player-kde4-11.2.202.548-0.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8044</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8044" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8044" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8044" ref_url="https://www.suse.com/security/cve/CVE-2015-8044" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001674.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1984-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X and before 11.2.202.548 on Linux, Adobe AIR before 19.0.0.241, Adobe AIR SDK before 19.0.0.241, and Adobe AIR SDK &amp; Compiler before 19.0.0.241 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-7651, CVE-2015-7652, CVE-2015-7653, CVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657, CVE-2015-7658, CVE-2015-7660, CVE-2015-7661, CVE-2015-7663, CVE-2015-8042, CVE-2015-8043, and CVE-2015-8046.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8044/">CVE-2015-8044</cve>
	<bugzilla href="https://bugzilla.suse.com/954512">SUSE bug 954512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566556" comment="flash-player-11.2.202.548-0.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566557" comment="flash-player-gnome-11.2.202.548-0.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566558" comment="flash-player-kde4-11.2.202.548-0.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158045" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8045</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8045" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8045" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8045" ref_url="https://www.suse.com/security/cve/CVE-2015-8045" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-8047, CVE-2015-8060, CVE-2015-8408, CVE-2015-8416, CVE-2015-8417, CVE-2015-8418, CVE-2015-8419, CVE-2015-8443, CVE-2015-8444, CVE-2015-8451, and CVE-2015-8455.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8045/">CVE-2015-8045</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158046" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8046</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8046" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8046" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8046" ref_url="https://www.suse.com/security/cve/CVE-2015-8046" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001674.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1984-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X and before 11.2.202.548 on Linux, Adobe AIR before 19.0.0.241, Adobe AIR SDK before 19.0.0.241, and Adobe AIR SDK &amp; Compiler before 19.0.0.241 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-7651, CVE-2015-7652, CVE-2015-7653, CVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657, CVE-2015-7658, CVE-2015-7660, CVE-2015-7661, CVE-2015-7663, CVE-2015-8042, CVE-2015-8043, and CVE-2015-8044.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8046/">CVE-2015-8046</cve>
	<bugzilla href="https://bugzilla.suse.com/954512">SUSE bug 954512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566556" comment="flash-player-11.2.202.548-0.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566557" comment="flash-player-gnome-11.2.202.548-0.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566558" comment="flash-player-kde4-11.2.202.548-0.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158047" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8047</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8047" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8047" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8047" ref_url="https://www.suse.com/security/cve/CVE-2015-8047" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-8045, CVE-2015-8060, CVE-2015-8408, CVE-2015-8416, CVE-2015-8417, CVE-2015-8418, CVE-2015-8419, CVE-2015-8443, CVE-2015-8444, CVE-2015-8451, and CVE-2015-8455.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8047/">CVE-2015-8047</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158048" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8048</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8048" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8048" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8048" ref_url="https://www.suse.com/security/cve/CVE-2015-8048" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8048/">CVE-2015-8048</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8049</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8049" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8049" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8049" ref_url="https://www.suse.com/security/cve/CVE-2015-8049" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the TextField object implementation in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via a crafted autoSize property value, a different vulnerability than CVE-2015-8048, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8049/">CVE-2015-8049</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8050</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8050" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8050" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8050" ref_url="https://www.suse.com/security/cve/CVE-2015-8050" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the MovieClip object implementation in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via a crafted beginGradientFill call, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8050/">CVE-2015-8050</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8055</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8055" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8055" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8055" ref_url="https://www.suse.com/security/cve/CVE-2015-8055" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8055/">CVE-2015-8055</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8056</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8056" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8056" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8056" ref_url="https://www.suse.com/security/cve/CVE-2015-8056" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8056/">CVE-2015-8056</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158057" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8057</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8057" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8057" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8057" ref_url="https://www.suse.com/security/cve/CVE-2015-8057" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8057/">CVE-2015-8057</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8058</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8058" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8058" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8058" ref_url="https://www.suse.com/security/cve/CVE-2015-8058" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8058/">CVE-2015-8058</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8059</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8059" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8059" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8059" ref_url="https://www.suse.com/security/cve/CVE-2015-8059" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8059/">CVE-2015-8059</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8060</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8060" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8060" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8060" ref_url="https://www.suse.com/security/cve/CVE-2015-8060" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-8045, CVE-2015-8047, CVE-2015-8408, CVE-2015-8416, CVE-2015-8417, CVE-2015-8418, CVE-2015-8419, CVE-2015-8443, CVE-2015-8444, CVE-2015-8451, and CVE-2015-8455.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8060/">CVE-2015-8060</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8061</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8061" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8061" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8061" ref_url="https://www.suse.com/security/cve/CVE-2015-8061" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8061/">CVE-2015-8061</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8062</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8062" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8062" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8062" ref_url="https://www.suse.com/security/cve/CVE-2015-8062" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8062/">CVE-2015-8062</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8063</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8063" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8063" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8063" ref_url="https://www.suse.com/security/cve/CVE-2015-8063" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8063/">CVE-2015-8063</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8064</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8064" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8064" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8064" ref_url="https://www.suse.com/security/cve/CVE-2015-8064" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8064/">CVE-2015-8064</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8065</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8065" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8065" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8065" ref_url="https://www.suse.com/security/cve/CVE-2015-8065" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8065/">CVE-2015-8065</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8066</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8066" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8066" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8066" ref_url="https://www.suse.com/security/cve/CVE-2015-8066" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8066/">CVE-2015-8066</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8067</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8067" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8067" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8067" ref_url="https://www.suse.com/security/cve/CVE-2015-8067" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8067/">CVE-2015-8067</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8068</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8068" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8068" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8068" ref_url="https://www.suse.com/security/cve/CVE-2015-8068" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8068/">CVE-2015-8068</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8069</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8069" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8069" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8069" ref_url="https://www.suse.com/security/cve/CVE-2015-8069" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8069/">CVE-2015-8069</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8070</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8070" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8070" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8070" ref_url="https://www.suse.com/security/cve/CVE-2015-8070" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8070/">CVE-2015-8070</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8071</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8071" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8071" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8071" ref_url="https://www.suse.com/security/cve/CVE-2015-8071" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8071/">CVE-2015-8071</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8104</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8104" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8104" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8104" ref_url="https://www.suse.com/security/cve/CVE-2015-8104" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2194-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2339-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2350-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0354-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2232-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2249-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2250-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8104/">CVE-2015-8104</cve>
	<bugzilla href="https://bugzilla.suse.com/953527">SUSE bug 953527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954018">SUSE bug 954018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954404">SUSE bug 954404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954405">SUSE bug 954405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962977">SUSE bug 962977</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566744" comment="kernel-bigsmp-devel-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566745" comment="kernel-default-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566746" comment="kernel-default-base-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566747" comment="kernel-default-devel-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566748" comment="kernel-default-extra-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566749" comment="kernel-pae-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566750" comment="kernel-pae-base-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566751" comment="kernel-pae-devel-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566752" comment="kernel-pae-extra-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566753" comment="kernel-source-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566754" comment="kernel-syms-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566755" comment="kernel-trace-devel-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566756" comment="kernel-xen-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566757" comment="kernel-xen-base-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566758" comment="kernel-xen-devel-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566759" comment="kernel-xen-extra-3.0.101-0.47.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567261" comment="xen-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567262" comment="xen-doc-html-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567263" comment="xen-doc-pdf-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567264" comment="xen-kmp-default-4.2.5_18_3.0.101_0.47.71-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567265" comment="xen-kmp-pae-4.2.5_18_3.0.101_0.47.71-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567266" comment="xen-libs-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567267" comment="xen-libs-32bit-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567268" comment="xen-tools-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567269" comment="xen-tools-domU-4.2.5_18-21.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567368" comment="kernel-default-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567369" comment="kernel-default-base-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567370" comment="kernel-default-devel-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567371" comment="kernel-default-extra-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567372" comment="kernel-pae-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567373" comment="kernel-pae-base-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567374" comment="kernel-pae-devel-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567375" comment="kernel-pae-extra-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567376" comment="kernel-source-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567377" comment="kernel-syms-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567378" comment="kernel-trace-devel-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567379" comment="kernel-xen-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567380" comment="kernel-xen-base-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567381" comment="kernel-xen-devel-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567382" comment="kernel-xen-extra-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567475" comment="xen-4.4.3_06-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567476" comment="xen-doc-html-4.4.3_06-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567477" comment="xen-kmp-default-4.4.3_06_3.0.101_65-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567478" comment="xen-kmp-pae-4.4.3_06_3.0.101_65-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567479" comment="xen-libs-4.4.3_06-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567480" comment="xen-libs-32bit-4.4.3_06-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567481" comment="xen-tools-4.4.3_06-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567482" comment="xen-tools-domU-4.4.3_06-29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8126</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8126" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0399-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0428-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0431-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0433-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0636-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0665-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0770-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0776-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2099-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2135-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00159.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2136-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00160.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2262-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2263-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0103-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0104-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0105-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0684-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0729-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1652-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00046.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in the (1) png_set_PLTE and (2) png_get_PLTE functions in libpng before 1.0.64, 1.1.x and 1.2.x before 1.2.54, 1.3.x and 1.4.x before 1.4.17, 1.5.x before 1.5.24, and 1.6.x before 1.6.19 allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a small bit-depth value in an IHDR (aka image header) chunk in a PNG image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<bugzilla href="https://bugzilla.suse.com/954980">SUSE bug 954980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958198">SUSE bug 958198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960402">SUSE bug 960402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962743">SUSE bug 962743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969333">SUSE bug 969333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566649" comment="java-1_7_0-openjdk-1.7.0.95-0.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566650" comment="java-1_7_0-openjdk-demo-1.7.0.95-0.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566651" comment="java-1_7_0-openjdk-devel-1.7.0.95-0.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566853" comment="libpng12-0-1.2.31-5.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566854" comment="libpng12-0-32bit-1.2.31-5.38.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8215</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8215" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8215" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8215" ref_url="https://www.suse.com/security/cve/CVE-2015-8215" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2292-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2339-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2350-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0354-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0585-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    net/ipv6/addrconf.c in the IPv6 stack in the Linux kernel before 4.0 does not validate attempted changes to the MTU value, which allows context-dependent attackers to cause a denial of service (packet loss) via a value that is (1) smaller than the minimum compliant value or (2) larger than the MTU of an interface, as demonstrated by a Router Advertisement (RA) message that is not validated by a daemon, a different vulnerability than CVE-2015-0272.  NOTE: the scope of CVE-2015-0272 is limited to the NetworkManager product.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8215/">CVE-2015-8215</cve>
	<bugzilla href="https://bugzilla.suse.com/1052256">SUSE bug 1052256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944296">SUSE bug 944296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951638">SUSE bug 951638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955354">SUSE bug 955354</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567368" comment="kernel-default-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567369" comment="kernel-default-base-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567370" comment="kernel-default-devel-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567371" comment="kernel-default-extra-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567372" comment="kernel-pae-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567373" comment="kernel-pae-base-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567374" comment="kernel-pae-devel-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567375" comment="kernel-pae-extra-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567376" comment="kernel-source-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567377" comment="kernel-syms-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567378" comment="kernel-trace-devel-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567379" comment="kernel-xen-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567380" comment="kernel-xen-base-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567381" comment="kernel-xen-devel-3.0.101-68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567382" comment="kernel-xen-extra-3.0.101-68.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8239</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8239" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8239" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8239" ref_url="https://www.suse.com/security/cve/CVE-2015-8239" source="SUSE CVE"/>
    <description>
    The SHA-2 digest support in the sudoers plugin in sudo after 1.8.7 allows local users with write permissions to parts of the called command to replace them before it is executed.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8239/">CVE-2015-8239</cve>
	<bugzilla href="https://bugzilla.suse.com/955994">SUSE bug 955994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334290" comment="sudo is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8241</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8241" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8241" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8241" ref_url="https://www.suse.com/security/cve/CVE-2015-8241" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2372-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0106-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html" source="SUSE-SU"/>
    <description>
    The xmlNextChar function in libxml2 2.9.2 does not properly check the state, which allows context-dependent attackers to cause a denial of service (heap-based buffer over-read and application crash) or obtain sensitive information via crafted XML data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-10"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8241/">CVE-2015-8241</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956018">SUSE bug 956018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959469">SUSE bug 959469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566939" comment="libxml2-2.7.6-0.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566940" comment="libxml2-32bit-2.7.6-0.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566941" comment="libxml2-python-2.7.6-0.34.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8242</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8242" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8242" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8242" ref_url="https://www.suse.com/security/cve/CVE-2015-8242" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2372-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0106-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html" source="SUSE-SU"/>
    <description>
    The xmlSAX2TextNode function in SAX2.c in the push interface in the HTML parser in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service (stack-based buffer over-read and application crash) or obtain sensitive information via crafted XML data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-10"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8242/">CVE-2015-8242</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956021">SUSE bug 956021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959469">SUSE bug 959469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566939" comment="libxml2-2.7.6-0.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566940" comment="libxml2-32bit-2.7.6-0.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566941" comment="libxml2-python-2.7.6-0.34.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8313</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8313" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8313" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8313" ref_url="https://www.suse.com/security/cve/CVE-2015-8313" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001791.html" source="SUSE-SU"/>
    <description>
    GnuTLS incorrectly validates the first byte of padding in CBC modes
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8313/">CVE-2015-8313</cve>
	<bugzilla href="https://bugzilla.suse.com/957568">SUSE bug 957568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566607" comment="gnutls-2.4.1-24.39.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566608" comment="libgnutls26-2.4.1-24.39.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566609" comment="libgnutls26-32bit-2.4.1-24.39.60.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8317</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8317" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8317" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8317" ref_url="https://www.suse.com/security/cve/CVE-2015-8317" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2372-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0106-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html" source="SUSE-SU"/>
    <description>
    The xmlParseXMLDecl function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to obtain sensitive information via an (1) unterminated encoding value or (2) incomplete XML declaration in XML data, which triggers an out-of-bounds heap read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-10"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8317/">CVE-2015-8317</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956260">SUSE bug 956260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959469">SUSE bug 959469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566939" comment="libxml2-2.7.6-0.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566940" comment="libxml2-32bit-2.7.6-0.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566941" comment="libxml2-python-2.7.6-0.34.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8327</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8327" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8327" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8327" ref_url="https://www.suse.com/security/cve/CVE-2015-8327" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001799.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2367-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00115.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0179-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00065.html" source="SUSE-SU"/>
    <description>
    Incomplete blacklist vulnerability in util.c in foomatic-rip in cups-filters 1.0.42 before 1.2.0 and in foomatic-filters in Foomatic 4.0.x allows remote attackers to execute arbitrary commands via ` (backtick) characters in a print job.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8327/">CVE-2015-8327</cve>
	<bugzilla href="https://bugzilla.suse.com/1027197">SUSE bug 1027197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957531">SUSE bug 957531</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566565" comment="foomatic-filters-3.0.2-269.39.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8339</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8339" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8339" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8339" ref_url="https://www.suse.com/security/cve/CVE-2015-8339" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html" source="SUSE-SU"/>
    <description>
    The memory_exchange function in common/memory.c in Xen 3.2.x through 4.6.x does not properly hand back pages to a domain, which might allow guest OS administrators to cause a denial of service (host crash) via unspecified vectors related to domain teardown.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8339/">CVE-2015-8339</cve>
	<bugzilla href="https://bugzilla.suse.com/956408">SUSE bug 956408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567261" comment="xen-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567262" comment="xen-doc-html-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567263" comment="xen-doc-pdf-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567264" comment="xen-kmp-default-4.2.5_18_3.0.101_0.47.71-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567265" comment="xen-kmp-pae-4.2.5_18_3.0.101_0.47.71-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567266" comment="xen-libs-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567267" comment="xen-libs-32bit-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567268" comment="xen-tools-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567269" comment="xen-tools-domU-4.2.5_18-21.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567475" comment="xen-4.4.3_06-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567476" comment="xen-doc-html-4.4.3_06-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567477" comment="xen-kmp-default-4.4.3_06_3.0.101_65-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567478" comment="xen-kmp-pae-4.4.3_06_3.0.101_65-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567479" comment="xen-libs-4.4.3_06-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567480" comment="xen-libs-32bit-4.4.3_06-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567481" comment="xen-tools-4.4.3_06-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567482" comment="xen-tools-domU-4.4.3_06-29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8340</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8340" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8340" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8340" ref_url="https://www.suse.com/security/cve/CVE-2015-8340" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html" source="SUSE-SU"/>
    <description>
    The memory_exchange function in common/memory.c in Xen 3.2.x through 4.6.x does not properly release locks, which might allow guest OS administrators to cause a denial of service (deadlock or host crash) via unspecified vectors, related to XENMEM_exchange error handling.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8340/">CVE-2015-8340</cve>
	<bugzilla href="https://bugzilla.suse.com/956408">SUSE bug 956408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567261" comment="xen-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567262" comment="xen-doc-html-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567263" comment="xen-doc-pdf-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567264" comment="xen-kmp-default-4.2.5_18_3.0.101_0.47.71-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567265" comment="xen-kmp-pae-4.2.5_18_3.0.101_0.47.71-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567266" comment="xen-libs-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567267" comment="xen-libs-32bit-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567268" comment="xen-tools-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567269" comment="xen-tools-domU-4.2.5_18-21.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567475" comment="xen-4.4.3_06-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567476" comment="xen-doc-html-4.4.3_06-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567477" comment="xen-kmp-default-4.4.3_06_3.0.101_65-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567478" comment="xen-kmp-pae-4.4.3_06_3.0.101_65-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567479" comment="xen-libs-4.4.3_06-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567480" comment="xen-libs-32bit-4.4.3_06-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567481" comment="xen-tools-4.4.3_06-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567482" comment="xen-tools-domU-4.4.3_06-29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8341</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8341" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8341" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8341" ref_url="https://www.suse.com/security/cve/CVE-2015-8341" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001754.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html" source="SUSE-SU"/>
    <description>
    The libxl toolstack library in Xen 4.1.x through 4.6.x does not properly release mappings of files used as kernels and initial ramdisks when managing multiple domains in the same process, which allows attackers to cause a denial of service (memory and disk consumption) by starting domains.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8341/">CVE-2015-8341</cve>
	<bugzilla href="https://bugzilla.suse.com/956409">SUSE bug 956409</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567261" comment="xen-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567262" comment="xen-doc-html-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567263" comment="xen-doc-pdf-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567264" comment="xen-kmp-default-4.2.5_18_3.0.101_0.47.71-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567265" comment="xen-kmp-pae-4.2.5_18_3.0.101_0.47.71-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567266" comment="xen-libs-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567267" comment="xen-libs-32bit-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567268" comment="xen-tools-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567269" comment="xen-tools-domU-4.2.5_18-21.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567475" comment="xen-4.4.3_06-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567476" comment="xen-doc-html-4.4.3_06-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567477" comment="xen-kmp-default-4.4.3_06_3.0.101_65-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567478" comment="xen-kmp-pae-4.4.3_06_3.0.101_65-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567479" comment="xen-libs-4.4.3_06-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567480" comment="xen-libs-32bit-4.4.3_06-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567481" comment="xen-tools-4.4.3_06-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567482" comment="xen-tools-domU-4.4.3_06-29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8345</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8345" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8345" ref_url="https://www.suse.com/security/cve/CVE-2015-8345" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0536-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
    <description>
    The eepro100 emulator in QEMU qemu-kvm blank allows local guest users to cause a denial of service (application crash and infinite loop) via vectors involving the command block list.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8345/">CVE-2015-8345</cve>
	<bugzilla href="https://bugzilla.suse.com/956829">SUSE bug 956829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956832">SUSE bug 956832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566780" comment="kvm-1.4.2-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567261" comment="xen-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567262" comment="xen-doc-html-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567263" comment="xen-doc-pdf-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567264" comment="xen-kmp-default-4.2.5_18_3.0.101_0.47.71-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567265" comment="xen-kmp-pae-4.2.5_18_3.0.101_0.47.71-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567266" comment="xen-libs-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567267" comment="xen-libs-32bit-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567268" comment="xen-tools-4.2.5_18-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567269" comment="xen-tools-domU-4.2.5_18-21.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567387" comment="kvm-1.4.2-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567467" comment="xen-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567468" comment="xen-doc-html-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567469" comment="xen-kmp-default-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567470" comment="xen-kmp-pae-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567471" comment="xen-libs-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567472" comment="xen-libs-32bit-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567473" comment="xen-tools-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567474" comment="xen-tools-domU-4.4.4_02-32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8370</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8370" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8370" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8370" ref_url="https://www.suse.com/security/cve/CVE-2015-8370" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2385-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2399-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2392-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00003.html" source="SUSE-SU"/>
    <description>
    Multiple integer underflows in Grub2 1.98 through 2.02 allow physically proximate attackers to bypass authentication, obtain sensitive information, or cause a denial of service (disk corruption) via backspace characters in the (1) grub_username_get function in grub-core/normal/auth.c or the (2) grub_password_get function in lib/crypto.c, which trigger an "Off-by-two" or "Out of bounds overwrite" memory error.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8370/">CVE-2015-8370</cve>
	<bugzilla href="https://bugzilla.suse.com/956631">SUSE bug 956631</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566616" comment="grub2-x86_64-efi-2.00-0.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566617" comment="grub2-x86_64-xen-2.00-0.49.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567331" comment="grub2-x86_64-efi-2.00-0.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567332" comment="grub2-x86_64-xen-2.00-0.54.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8374</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8374" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8374" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8374" ref_url="https://www.suse.com/security/cve/CVE-2015-8374" source="SUSE CVE"/>
    <description>
    fs/btrfs/inode.c in the Linux kernel before 4.3.3 mishandles compressed inline extents, which allows local users to obtain sensitive pre-truncation information from a file via a clone action.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8374/">CVE-2015-8374</cve>
	<bugzilla href="https://bugzilla.suse.com/923755">SUSE bug 923755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956053">SUSE bug 956053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963994">SUSE bug 963994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8380</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8380" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8380" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8380" ref_url="https://www.suse.com/security/cve/CVE-2015-8380" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2805-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00076.html" source="SUSE-SU"/>
    <description>
    The pcre_exec function in pcre_exec.c in PCRE before 8.38 mishandles a // pattern with a \01 string, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8380/">CVE-2015-8380</cve>
	<bugzilla href="https://bugzilla.suse.com/957566">SUSE bug 957566</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334068" comment="pcre is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8381</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8381" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8381" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8381" ref_url="https://www.suse.com/security/cve/CVE-2015-8381" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00076.html" source="SUSE-SU"/>
    <description>
    The compile_regex function in pcre_compile.c in PCRE before 8.38 and pcre2_compile.c in PCRE2 before 10.2x mishandles the /(?J:(?|(:(?|(?'R')(\k'R')|((?'R')))H'Rk'Rf)|s(?'R'))))/ and /(?J:(?|(:(?|(?'R')(\z(?|(?'R')(\k'R')|((?'R')))k'R')|((?'R')))H'Ak'Rf)|s(?'R')))/ patterns, and related patterns with certain group references, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8381/">CVE-2015-8381</cve>
	<bugzilla href="https://bugzilla.suse.com/906574">SUSE bug 906574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957598">SUSE bug 957598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958373">SUSE bug 958373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334068" comment="pcre is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8392</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8392" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8392" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8392" ref_url="https://www.suse.com/security/cve/CVE-2015-8392" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00076.html" source="SUSE-SU"/>
    <description>
    PCRE before 8.38 mishandles certain instances of the (?| substring, which allows remote attackers to cause a denial of service (unintended recursion and buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, a related issue to CVE-2015-8384 and CVE-2015-8395.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8392/">CVE-2015-8392</cve>
	<bugzilla href="https://bugzilla.suse.com/906574">SUSE bug 906574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957598">SUSE bug 957598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958373">SUSE bug 958373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334068" comment="pcre is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8401</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8401" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8401" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8401" ref_url="https://www.suse.com/security/cve/CVE-2015-8401" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8401/">CVE-2015-8401</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8402</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8402" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8402" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8402" ref_url="https://www.suse.com/security/cve/CVE-2015-8402" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8402/">CVE-2015-8402</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158403" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8403</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8403" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8403" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8403" ref_url="https://www.suse.com/security/cve/CVE-2015-8403" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8403/">CVE-2015-8403</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158404" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8404</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8404" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8404" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8404" ref_url="https://www.suse.com/security/cve/CVE-2015-8404" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8404/">CVE-2015-8404</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8405</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8405" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8405" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8405" ref_url="https://www.suse.com/security/cve/CVE-2015-8405" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8405/">CVE-2015-8405</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158406" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8406</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8406" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8406" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8406" ref_url="https://www.suse.com/security/cve/CVE-2015-8406" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8406/">CVE-2015-8406</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8407</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8407" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8407" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8407" ref_url="https://www.suse.com/security/cve/CVE-2015-8407" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8457.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8407/">CVE-2015-8407</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8408</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8408" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8408" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8408" ref_url="https://www.suse.com/security/cve/CVE-2015-8408" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-8045, CVE-2015-8047, CVE-2015-8060, CVE-2015-8416, CVE-2015-8417, CVE-2015-8418, CVE-2015-8419, CVE-2015-8443, CVE-2015-8444, CVE-2015-8451, and CVE-2015-8455.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8408/">CVE-2015-8408</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8409</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8409" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8409" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8409" ref_url="https://www.suse.com/security/cve/CVE-2015-8409" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allow attackers to bypass intended access restrictions via unspecified vectors, a different vulnerability than CVE-2015-8440 and CVE-2015-8453.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8409/">CVE-2015-8409</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8410</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8410" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8410" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8410" ref_url="https://www.suse.com/security/cve/CVE-2015-8410" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8410/">CVE-2015-8410</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8411</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8411" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8411" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8411" ref_url="https://www.suse.com/security/cve/CVE-2015-8411" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8411/">CVE-2015-8411</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8412</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8412" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8412" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8412" ref_url="https://www.suse.com/security/cve/CVE-2015-8412" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8412/">CVE-2015-8412</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158413" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8413</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8413" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8413" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8413" ref_url="https://www.suse.com/security/cve/CVE-2015-8413" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8413/">CVE-2015-8413</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8414</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8414" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8414" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8414" ref_url="https://www.suse.com/security/cve/CVE-2015-8414" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8414/">CVE-2015-8414</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8415</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8415" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8415" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8415" ref_url="https://www.suse.com/security/cve/CVE-2015-8415" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8415/">CVE-2015-8415</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8416</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8416" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8416" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8416" ref_url="https://www.suse.com/security/cve/CVE-2015-8416" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-8045, CVE-2015-8047, CVE-2015-8060, CVE-2015-8408, CVE-2015-8417, CVE-2015-8418, CVE-2015-8419, CVE-2015-8443, CVE-2015-8444, CVE-2015-8451, and CVE-2015-8455.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8416/">CVE-2015-8416</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8417</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8417" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8417" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8417" ref_url="https://www.suse.com/security/cve/CVE-2015-8417" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-8045, CVE-2015-8047, CVE-2015-8060, CVE-2015-8408, CVE-2015-8416, CVE-2015-8418, CVE-2015-8419, CVE-2015-8443, CVE-2015-8444, CVE-2015-8451, and CVE-2015-8455.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8417/">CVE-2015-8417</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8418</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8418" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8418" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8418" ref_url="https://www.suse.com/security/cve/CVE-2015-8418" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-8045, CVE-2015-8047, CVE-2015-8060, CVE-2015-8408, CVE-2015-8416, CVE-2015-8417, CVE-2015-8419, CVE-2015-8443, CVE-2015-8444, CVE-2015-8451, and CVE-2015-8455.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8418/">CVE-2015-8418</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8419</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8419" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8419" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8419" ref_url="https://www.suse.com/security/cve/CVE-2015-8419" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-8045, CVE-2015-8047, CVE-2015-8060, CVE-2015-8408, CVE-2015-8416, CVE-2015-8417, CVE-2015-8418, CVE-2015-8443, CVE-2015-8444, CVE-2015-8451, and CVE-2015-8455.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8419/">CVE-2015-8419</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8420</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8420" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8420" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8420" ref_url="https://www.suse.com/security/cve/CVE-2015-8420" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8420/">CVE-2015-8420</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8421</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8421" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8421" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8421" ref_url="https://www.suse.com/security/cve/CVE-2015-8421" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8421/">CVE-2015-8421</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8422</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8422" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8422" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8422" ref_url="https://www.suse.com/security/cve/CVE-2015-8422" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8422/">CVE-2015-8422</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8423</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8423" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8423" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8423" ref_url="https://www.suse.com/security/cve/CVE-2015-8423" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8423/">CVE-2015-8423</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8424</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8424" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8424" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8424" ref_url="https://www.suse.com/security/cve/CVE-2015-8424" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8424/">CVE-2015-8424</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8425</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8425" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8425" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8425" ref_url="https://www.suse.com/security/cve/CVE-2015-8425" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8425/">CVE-2015-8425</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8426</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8426" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8426" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8426" ref_url="https://www.suse.com/security/cve/CVE-2015-8426" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8426/">CVE-2015-8426</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8427</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8427" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8427" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8427" ref_url="https://www.suse.com/security/cve/CVE-2015-8427" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8427/">CVE-2015-8427</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8428</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8428" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8428" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8428" ref_url="https://www.suse.com/security/cve/CVE-2015-8428" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8428/">CVE-2015-8428</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8429</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8429" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8429" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8429" ref_url="https://www.suse.com/security/cve/CVE-2015-8429" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8429/">CVE-2015-8429</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8430</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8430" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8430" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8430" ref_url="https://www.suse.com/security/cve/CVE-2015-8430" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8430/">CVE-2015-8430</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8431</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8431" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8431" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8431" ref_url="https://www.suse.com/security/cve/CVE-2015-8431" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8431/">CVE-2015-8431</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8432</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8432" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8432" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8432" ref_url="https://www.suse.com/security/cve/CVE-2015-8432" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8432/">CVE-2015-8432</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8433</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8433" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8433" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8433" ref_url="https://www.suse.com/security/cve/CVE-2015-8433" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8433/">CVE-2015-8433</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8434</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8434" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8434" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8434" ref_url="https://www.suse.com/security/cve/CVE-2015-8434" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8434/">CVE-2015-8434</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8435</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8435" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8435" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8435" ref_url="https://www.suse.com/security/cve/CVE-2015-8435" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8435/">CVE-2015-8435</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8436</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8436" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8436" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8436" ref_url="https://www.suse.com/security/cve/CVE-2015-8436" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the PrintJob object implementation in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via crafted addPage arguments, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8436/">CVE-2015-8436</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158437" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8437</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8437" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8437" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8437" ref_url="https://www.suse.com/security/cve/CVE-2015-8437" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the Selection object implementation in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via a crafted setFocus call, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8437/">CVE-2015-8437</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8438</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8438" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8438" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8438" ref_url="https://www.suse.com/security/cve/CVE-2015-8438" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via a crafted XML object that is mishandled during a toString call, a different vulnerability than CVE-2015-8446.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8438/">CVE-2015-8438</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8439</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8439" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8439" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8439" ref_url="https://www.suse.com/security/cve/CVE-2015-8439" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    The SharedObject object implementation in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code by leveraging an unspecified "type confusion" during a getRemote call, a different vulnerability than CVE-2015-8456.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8439/">CVE-2015-8439</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8440</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8440" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8440" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8440" ref_url="https://www.suse.com/security/cve/CVE-2015-8440" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allow attackers to bypass intended access restrictions via unspecified vectors, a different vulnerability than CVE-2015-8409 and CVE-2015-8453.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8440/">CVE-2015-8440</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8441</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8441" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8441" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8441" ref_url="https://www.suse.com/security/cve/CVE-2015-8441" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8441/">CVE-2015-8441</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8442</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8442" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8442" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8442" ref_url="https://www.suse.com/security/cve/CVE-2015-8442" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the MovieClip object implementation in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via a crafted filters property value, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8442/">CVE-2015-8442</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8443</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8443" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8443" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8443" ref_url="https://www.suse.com/security/cve/CVE-2015-8443" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-8045, CVE-2015-8047, CVE-2015-8060, CVE-2015-8408, CVE-2015-8416, CVE-2015-8417, CVE-2015-8418, CVE-2015-8419, CVE-2015-8444, CVE-2015-8451, and CVE-2015-8455.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8443/">CVE-2015-8443</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8444</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8444" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8444" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8444" ref_url="https://www.suse.com/security/cve/CVE-2015-8444" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-8045, CVE-2015-8047, CVE-2015-8060, CVE-2015-8408, CVE-2015-8416, CVE-2015-8417, CVE-2015-8418, CVE-2015-8419, CVE-2015-8443, CVE-2015-8451, and CVE-2015-8455.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8444/">CVE-2015-8444</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8445</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8445" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8445" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8445" ref_url="https://www.suse.com/security/cve/CVE-2015-8445" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the Shader filter implementation in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via a large BitmapData source object.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8445/">CVE-2015-8445</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8446</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8446" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8446" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8446" ref_url="https://www.suse.com/security/cve/CVE-2015-8446" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via an MP3 file with COMM tags that are mishandled during memory allocation, a different vulnerability than CVE-2015-8438.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8446/">CVE-2015-8446</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8447</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8447" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8447" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8447" ref_url="https://www.suse.com/security/cve/CVE-2015-8447" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the Color object implementation in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via crafted setTransform arguments, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8447/">CVE-2015-8447</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8448</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8448" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8448" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8448" ref_url="https://www.suse.com/security/cve/CVE-2015-8448" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the DisplacementMapFilter object implementation in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via a crafted mapBitmap property value, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8448/">CVE-2015-8448</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8449</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8449" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8449" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8449" ref_url="https://www.suse.com/security/cve/CVE-2015-8449" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the MovieClip object implementation in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via a crafted lineTo method call, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8449/">CVE-2015-8449</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8450</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8450" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8450" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8450" ref_url="https://www.suse.com/security/cve/CVE-2015-8450" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via a crafted filters property value in a TextField object, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8452, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8450/">CVE-2015-8450</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8451</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8451" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8451" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8451" ref_url="https://www.suse.com/security/cve/CVE-2015-8451" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-8045, CVE-2015-8047, CVE-2015-8060, CVE-2015-8408, CVE-2015-8416, CVE-2015-8417, CVE-2015-8418, CVE-2015-8419, CVE-2015-8443, CVE-2015-8444, and CVE-2015-8455.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8451/">CVE-2015-8451</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8452</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8452" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8452" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8452" ref_url="https://www.suse.com/security/cve/CVE-2015-8452" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, and CVE-2015-8454.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8452/">CVE-2015-8452</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8453</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8453" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8453" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8453" ref_url="https://www.suse.com/security/cve/CVE-2015-8453" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allow attackers to bypass the ASLR protection mechanism via JIT data, a different vulnerability than CVE-2015-8409 and CVE-2015-8440.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8453/">CVE-2015-8453</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8454</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8454" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8454" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8454" ref_url="https://www.suse.com/security/cve/CVE-2015-8454" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, and CVE-2015-8452.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8454/">CVE-2015-8454</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8455</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8455" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8455" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8455" ref_url="https://www.suse.com/security/cve/CVE-2015-8455" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-8045, CVE-2015-8047, CVE-2015-8060, CVE-2015-8408, CVE-2015-8416, CVE-2015-8417, CVE-2015-8418, CVE-2015-8419, CVE-2015-8443, CVE-2015-8444, and CVE-2015-8451.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8455/">CVE-2015-8455</cve>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8459</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8459" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8459" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8459" ref_url="https://www.suse.com/security/cve/CVE-2015-8459" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2402-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2403-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00048.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK &amp; Compiler before 20.0.0.233 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-8460, CVE-2015-8636, and CVE-2015-8645.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8459/">CVE-2015-8459</cve>
	<bugzilla href="https://bugzilla.suse.com/960317">SUSE bug 960317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566562" comment="flash-player-11.2.202.559-0.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566563" comment="flash-player-gnome-11.2.202.559-0.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566564" comment="flash-player-kde4-11.2.202.559-0.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8460</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8460" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8460" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8460" ref_url="https://www.suse.com/security/cve/CVE-2015-8460" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2402-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2403-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00048.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK &amp; Compiler before 20.0.0.233 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-8459, CVE-2015-8636, and CVE-2015-8645.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8460/">CVE-2015-8460</cve>
	<bugzilla href="https://bugzilla.suse.com/960317">SUSE bug 960317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566562" comment="flash-player-11.2.202.559-0.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566563" comment="flash-player-gnome-11.2.202.559-0.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566564" comment="flash-player-kde4-11.2.202.559-0.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8472</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8472" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8472" ref_url="https://www.suse.com/security/cve/CVE-2015-8472" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0399-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0428-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0431-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0433-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0636-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0770-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0776-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the png_set_PLTE function in libpng before 1.0.65, 1.1.x and 1.2.x before 1.2.55, 1.3.x, 1.4.x before 1.4.18, 1.5.x before 1.5.25, and 1.6.x before 1.6.20 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a small bit-depth value in an IHDR (aka image header) chunk in a PNG image.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8126.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8472/">CVE-2015-8472</cve>
	<bugzilla href="https://bugzilla.suse.com/954980">SUSE bug 954980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958198">SUSE bug 958198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960402">SUSE bug 960402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566649" comment="java-1_7_0-openjdk-1.7.0.95-0.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566650" comment="java-1_7_0-openjdk-demo-1.7.0.95-0.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566651" comment="java-1_7_0-openjdk-devel-1.7.0.95-0.17.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8504</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8504" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8504" ref_url="https://www.suse.com/security/cve/CVE-2015-8504" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
    <description>
    Qemu, when built with VNC display driver support, allows remote attackers to cause a denial of service (arithmetic exception and application crash) via crafted SetPixelFormat messages from a client.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8504/">CVE-2015-8504</cve>
	<bugzilla href="https://bugzilla.suse.com/958491">SUSE bug 958491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958493">SUSE bug 958493</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567467" comment="xen-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567468" comment="xen-doc-html-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567469" comment="xen-kmp-default-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567470" comment="xen-kmp-pae-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567471" comment="xen-libs-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567472" comment="xen-libs-32bit-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567473" comment="xen-tools-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567474" comment="xen-tools-domU-4.4.4_02-32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8539</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8539" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8539" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8539" ref_url="https://www.suse.com/security/cve/CVE-2015-8539" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0335-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0337-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0339-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0380-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0381-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0383-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0384-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0434-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0585-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    The KEYS subsystem in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (BUG) via crafted keyctl commands that negatively instantiate a key, related to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and security/keys/user_defined.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8539/">CVE-2015-8539</cve>
	<bugzilla href="https://bugzilla.suse.com/781018">SUSE bug 781018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958463">SUSE bug 958463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958601">SUSE bug 958601</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567353" comment="kernel-default-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567354" comment="kernel-default-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567355" comment="kernel-default-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567356" comment="kernel-default-extra-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567357" comment="kernel-pae-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567358" comment="kernel-pae-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567359" comment="kernel-pae-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567360" comment="kernel-pae-extra-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567361" comment="kernel-source-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567362" comment="kernel-syms-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567363" comment="kernel-trace-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567364" comment="kernel-xen-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567365" comment="kernel-xen-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567366" comment="kernel-xen-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567367" comment="kernel-xen-extra-3.0.101-71.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8543</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8543" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8543" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8543" ref_url="https://www.suse.com/security/cve/CVE-2015-8543" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0585-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    The networking implementation in the Linux kernel through 4.3.3, as used in Android and other products, does not validate protocol identifiers for certain protocol families, which allows local users to cause a denial of service (NULL function pointer dereference and system crash) or possibly gain privileges by leveraging CLONE_NEWUSER support to execute a crafted SOCK_RAW application.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8543/">CVE-2015-8543</cve>
	<bugzilla href="https://bugzilla.suse.com/1052256">SUSE bug 1052256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923755">SUSE bug 923755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958886">SUSE bug 958886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963994">SUSE bug 963994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969522">SUSE bug 969522</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567353" comment="kernel-default-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567354" comment="kernel-default-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567355" comment="kernel-default-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567356" comment="kernel-default-extra-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567357" comment="kernel-pae-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567358" comment="kernel-pae-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567359" comment="kernel-pae-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567360" comment="kernel-pae-extra-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567361" comment="kernel-source-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567362" comment="kernel-syms-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567363" comment="kernel-trace-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567364" comment="kernel-xen-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567365" comment="kernel-xen-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567366" comment="kernel-xen-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567367" comment="kernel-xen-extra-3.0.101-71.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8550</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8550" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8550" ref_url="https://www.suse.com/security/cve/CVE-2015-8550" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0585-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00005.html" source="SUSE-SU"/>
    <description>
    Xen, when used on a system providing PV backends, allows local guest OS administrators to cause a denial of service (host OS crash) or gain privileges by writing to memory shared between the frontend and backend, aka a double fetch vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8550/">CVE-2015-8550</cve>
	<bugzilla href="https://bugzilla.suse.com/1052256">SUSE bug 1052256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957988">SUSE bug 957988</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567353" comment="kernel-default-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567354" comment="kernel-default-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567355" comment="kernel-default-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567356" comment="kernel-default-extra-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567357" comment="kernel-pae-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567358" comment="kernel-pae-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567359" comment="kernel-pae-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567360" comment="kernel-pae-extra-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567361" comment="kernel-source-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567362" comment="kernel-syms-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567363" comment="kernel-trace-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567364" comment="kernel-xen-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567365" comment="kernel-xen-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567366" comment="kernel-xen-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567367" comment="kernel-xen-extra-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567467" comment="xen-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567468" comment="xen-doc-html-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567469" comment="xen-kmp-default-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567470" comment="xen-kmp-pae-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567471" comment="xen-libs-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567472" comment="xen-libs-32bit-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567473" comment="xen-tools-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567474" comment="xen-tools-domU-4.4.4_02-32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8551</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8551" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8551" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8551" ref_url="https://www.suse.com/security/cve/CVE-2015-8551" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0585-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html" source="SUSE-SU"/>
    <description>
    The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to hit BUG conditions and cause a denial of service (NULL pointer dereference and host OS crash) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and a crafted sequence of XEN_PCI_OP_* operations, aka "Linux pciback missing sanity checks."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-13"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8551/">CVE-2015-8551</cve>
	<bugzilla href="https://bugzilla.suse.com/957990">SUSE bug 957990</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567353" comment="kernel-default-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567354" comment="kernel-default-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567355" comment="kernel-default-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567356" comment="kernel-default-extra-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567357" comment="kernel-pae-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567358" comment="kernel-pae-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567359" comment="kernel-pae-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567360" comment="kernel-pae-extra-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567361" comment="kernel-source-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567362" comment="kernel-syms-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567363" comment="kernel-trace-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567364" comment="kernel-xen-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567365" comment="kernel-xen-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567366" comment="kernel-xen-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567367" comment="kernel-xen-extra-3.0.101-71.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8552</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8552" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8552" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8552" ref_url="https://www.suse.com/security/cve/CVE-2015-8552" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html" source="SUSE-SU"/>
    <description>
    The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to generate a continuous stream of WARN messages and cause a denial of service (disk consumption) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and XEN_PCI_OP_enable_msi operations, aka "Linux pciback missing sanity checks."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-13"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8552/">CVE-2015-8552</cve>
	<bugzilla href="https://bugzilla.suse.com/957990">SUSE bug 957990</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567353" comment="kernel-default-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567354" comment="kernel-default-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567355" comment="kernel-default-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567356" comment="kernel-default-extra-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567357" comment="kernel-pae-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567358" comment="kernel-pae-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567359" comment="kernel-pae-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567360" comment="kernel-pae-extra-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567361" comment="kernel-source-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567362" comment="kernel-syms-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567363" comment="kernel-trace-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567364" comment="kernel-xen-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567365" comment="kernel-xen-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567366" comment="kernel-xen-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567367" comment="kernel-xen-extra-3.0.101-71.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8554</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8554" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8554" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8554" ref_url="https://www.suse.com/security/cve/CVE-2015-8554" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in hw/pt-msi.c in Xen 4.6.x and earlier, when using the qemu-xen-traditional (aka qemu-dm) device model, allows local x86 HVM guest administrators to gain privileges by leveraging a system with access to a passed-through MSI-X capable physical PCI device and MSI-X table entries, related to a "write path."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8554/">CVE-2015-8554</cve>
	<bugzilla href="https://bugzilla.suse.com/958007">SUSE bug 958007</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567467" comment="xen-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567468" comment="xen-doc-html-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567469" comment="xen-kmp-default-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567470" comment="xen-kmp-pae-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567471" comment="xen-libs-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567472" comment="xen-libs-32bit-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567473" comment="xen-tools-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567474" comment="xen-tools-domU-4.4.4_02-32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8555</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8555" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8555" ref_url="https://www.suse.com/security/cve/CVE-2015-8555" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html" source="SUSE-SU"/>
    <description>
    Xen 4.6.x, 4.5.x, 4.4.x, 4.3.x, and earlier do not initialize x86 FPU stack and XMM registers when XSAVE/XRSTOR are not used to manage guest extended register state, which allows local guest domains to obtain sensitive information from other domains via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8555/">CVE-2015-8555</cve>
	<bugzilla href="https://bugzilla.suse.com/958009">SUSE bug 958009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567467" comment="xen-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567468" comment="xen-doc-html-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567469" comment="xen-kmp-default-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567470" comment="xen-kmp-pae-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567471" comment="xen-libs-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567472" comment="xen-libs-32bit-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567473" comment="xen-tools-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567474" comment="xen-tools-domU-4.4.4_02-32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8556</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8556" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8556" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8556" ref_url="https://www.suse.com/security/cve/CVE-2015-8556" source="SUSE CVE"/>
    <description>
    Local privilege escalation vulnerability in the Gentoo QEMU package before 2.5.0-r1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8556/">CVE-2015-8556</cve>
	<bugzilla href="https://bugzilla.suse.com/958993">SUSE bug 958993</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334251" comment="kvm is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8558</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8558" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8558" ref_url="https://www.suse.com/security/cve/CVE-2015-8558" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
    <description>
    The ehci_process_itd function in hw/usb/hcd-ehci.c in QEMU allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via a circular isochronous transfer descriptor (iTD) list.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8558/">CVE-2015-8558</cve>
	<bugzilla href="https://bugzilla.suse.com/959005">SUSE bug 959005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959006">SUSE bug 959006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976109">SUSE bug 976109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976111">SUSE bug 976111</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567467" comment="xen-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567468" comment="xen-doc-html-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567469" comment="xen-kmp-default-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567470" comment="xen-kmp-pae-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567471" comment="xen-libs-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567472" comment="xen-libs-32bit-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567473" comment="xen-tools-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567474" comment="xen-tools-domU-4.4.4_02-32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8560</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8560" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8560" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8560" ref_url="https://www.suse.com/security/cve/CVE-2015-8560" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001799.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2367-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00115.html" source="SUSE-SU"/>
    <description>
    Incomplete blacklist vulnerability in util.c in foomatic-rip in cups-filters 1.0.42 before 1.4.0 and in foomatic-filters in Foomatic 4.0.x allows remote attackers to execute arbitrary commands via a ; (semicolon) character in a print job, a different vulnerability than CVE-2015-8327.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8560/">CVE-2015-8560</cve>
	<bugzilla href="https://bugzilla.suse.com/1027197">SUSE bug 1027197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957531">SUSE bug 957531</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566565" comment="foomatic-filters-3.0.2-269.39.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8567</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8567" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8567" ref_url="https://www.suse.com/security/cve/CVE-2015-8567" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
    <description>
    Memory leak in net/vmxnet3.c in QEMU allows remote attackers to cause a denial of service (memory consumption).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8567/">CVE-2015-8567</cve>
	<bugzilla href="https://bugzilla.suse.com/959386">SUSE bug 959386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959387">SUSE bug 959387</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567467" comment="xen-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567468" comment="xen-doc-html-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567469" comment="xen-kmp-default-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567470" comment="xen-kmp-pae-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567471" comment="xen-libs-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567472" comment="xen-libs-32bit-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567473" comment="xen-tools-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567474" comment="xen-tools-domU-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334251" comment="kvm is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8568</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8568" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8568" ref_url="https://www.suse.com/security/cve/CVE-2015-8568" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
    <description>
    Memory leak in QEMU, when built with a VMWARE VMXNET3 paravirtual NIC emulator support, allows local guest users to cause a denial of service (host memory consumption) by trying to activate the vmxnet3 device repeatedly.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8568/">CVE-2015-8568</cve>
	<bugzilla href="https://bugzilla.suse.com/959386">SUSE bug 959386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959387">SUSE bug 959387</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567467" comment="xen-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567468" comment="xen-doc-html-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567469" comment="xen-kmp-default-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567470" comment="xen-kmp-pae-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567471" comment="xen-libs-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567472" comment="xen-libs-32bit-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567473" comment="xen-tools-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567474" comment="xen-tools-domU-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334251" comment="kvm is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8569</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8569" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8569" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8569" ref_url="https://www.suse.com/security/cve/CVE-2015-8569" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0585-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    The (1) pptp_bind and (2) pptp_connect functions in drivers/net/ppp/pptp.c in the Linux kernel through 4.3.3 do not verify an address length, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8569/">CVE-2015-8569</cve>
	<bugzilla href="https://bugzilla.suse.com/923755">SUSE bug 923755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959190">SUSE bug 959190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959399">SUSE bug 959399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963994">SUSE bug 963994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567353" comment="kernel-default-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567354" comment="kernel-default-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567355" comment="kernel-default-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567356" comment="kernel-default-extra-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567357" comment="kernel-pae-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567358" comment="kernel-pae-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567359" comment="kernel-pae-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567360" comment="kernel-pae-extra-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567361" comment="kernel-source-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567362" comment="kernel-syms-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567363" comment="kernel-trace-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567364" comment="kernel-xen-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567365" comment="kernel-xen-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567366" comment="kernel-xen-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567367" comment="kernel-xen-extra-3.0.101-71.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8575</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8575" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8575" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8575" ref_url="https://www.suse.com/security/cve/CVE-2015-8575" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0585-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    The sco_sock_bind function in net/bluetooth/sco.c in the Linux kernel before 4.3.4 does not verify an address length, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8575/">CVE-2015-8575</cve>
	<bugzilla href="https://bugzilla.suse.com/959190">SUSE bug 959190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959399">SUSE bug 959399</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567353" comment="kernel-default-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567354" comment="kernel-default-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567355" comment="kernel-default-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567356" comment="kernel-default-extra-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567357" comment="kernel-pae-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567358" comment="kernel-pae-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567359" comment="kernel-pae-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567360" comment="kernel-pae-extra-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567361" comment="kernel-source-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567362" comment="kernel-syms-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567363" comment="kernel-trace-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567364" comment="kernel-xen-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567365" comment="kernel-xen-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567366" comment="kernel-xen-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567367" comment="kernel-xen-extra-3.0.101-71.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8605</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8605" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8605" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8605" ref_url="https://www.suse.com/security/cve/CVE-2015-8605" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001890.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0601-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00162.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0610-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00168.html" source="SUSE-SU"/>
    <description>
    ISC DHCP 4.x before 4.1-ESV-R12-P1, 4.2.x, and 4.3.x before 4.3.3-P1 allows remote attackers to cause a denial of service (application crash) via an invalid length field in a UDP IPv4 packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8605/">CVE-2015-8605</cve>
	<bugzilla href="https://bugzilla.suse.com/961305">SUSE bug 961305</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566396" comment="dhcp-4.2.4.P2-0.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566397" comment="dhcp-client-4.2.4.P2-0.24.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8613</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8613" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8613" ref_url="https://www.suse.com/security/cve/CVE-2015-8613" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the megasas_ctrl_get_info function in QEMU, when built with SCSI MegaRAID SAS HBA emulation support, allows local guest users to cause a denial of service (QEMU instance crash) via a crafted SCSI controller CTRL_GET_INFO command.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8613/">CVE-2015-8613</cve>
	<bugzilla href="https://bugzilla.suse.com/961358">SUSE bug 961358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961556">SUSE bug 961556</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567467" comment="xen-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567468" comment="xen-doc-html-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567469" comment="xen-kmp-default-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567470" comment="xen-kmp-pae-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567471" comment="xen-libs-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567472" comment="xen-libs-32bit-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567473" comment="xen-tools-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567474" comment="xen-tools-domU-4.4.4_02-32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8619</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8619" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8619" ref_url="https://www.suse.com/security/cve/CVE-2015-8619" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
    <description>
    The Human Monitor Interface support in QEMU allows remote attackers to cause a denial of service (out-of-bounds write and application crash).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8619/">CVE-2015-8619</cve>
	<bugzilla href="https://bugzilla.suse.com/960334">SUSE bug 960334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965269">SUSE bug 965269</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567467" comment="xen-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567468" comment="xen-doc-html-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567469" comment="xen-kmp-default-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567470" comment="xen-kmp-pae-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567471" comment="xen-libs-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567472" comment="xen-libs-32bit-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567473" comment="xen-tools-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567474" comment="xen-tools-domU-4.4.4_02-32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8629</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8629" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8629" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8629" ref_url="https://www.suse.com/security/cve/CVE-2015-8629" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001871.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0406-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0501-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00110.html" source="SUSE-SU"/>
    <description>
    The xdr_nullstring function in lib/kadm5/kadm_rpc_xdr.c in kadmind in MIT Kerberos 5 (aka krb5) before 1.13.4 and 1.14.x before 1.14.1 does not verify whether '\0' characters exist as expected, which allows remote authenticated users to obtain sensitive information or cause a denial of service (out-of-bounds read) via a crafted string.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8629/">CVE-2015-8629</cve>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963968">SUSE bug 963968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567383" comment="krb5-1.6.3-133.49.106.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567384" comment="krb5-32bit-1.6.3-133.49.106.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567385" comment="krb5-client-1.6.3-133.49.106.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8630</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8630" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8630" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8630" ref_url="https://www.suse.com/security/cve/CVE-2015-8630" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001870.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0406-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0501-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00110.html" source="SUSE-SU"/>
    <description>
    The (1) kadm5_create_principal_3 and (2) kadm5_modify_principal functions in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.12.x and 1.13.x before 1.13.4 and 1.14.x before 1.14.1 allow remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by specifying KADM5_POLICY with a NULL policy name.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8630/">CVE-2015-8630</cve>
	<bugzilla href="https://bugzilla.suse.com/963964">SUSE bug 963964</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333953" comment="krb5 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8631</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8631" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8631" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8631" ref_url="https://www.suse.com/security/cve/CVE-2015-8631" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001871.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0406-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0501-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00110.html" source="SUSE-SU"/>
    <description>
    Multiple memory leaks in kadmin/server/server_stubs.c in kadmind in MIT Kerberos 5 (aka krb5) before 1.13.4 and 1.14.x before 1.14.1 allow remote authenticated users to cause a denial of service (memory consumption) via a request specifying a NULL principal name.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8631/">CVE-2015-8631</cve>
	<bugzilla href="https://bugzilla.suse.com/963975">SUSE bug 963975</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567383" comment="krb5-1.6.3-133.49.106.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567384" comment="krb5-32bit-1.6.3-133.49.106.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567385" comment="krb5-client-1.6.3-133.49.106.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8634</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8634" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8634" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8634" ref_url="https://www.suse.com/security/cve/CVE-2015-8634" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2402-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2403-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00048.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK &amp; Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8635, CVE-2015-8638, CVE-2015-8639, CVE-2015-8640, CVE-2015-8641, CVE-2015-8642, CVE-2015-8643, CVE-2015-8646, CVE-2015-8647, CVE-2015-8648, CVE-2015-8649, and CVE-2015-8650.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8634/">CVE-2015-8634</cve>
	<bugzilla href="https://bugzilla.suse.com/960317">SUSE bug 960317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566562" comment="flash-player-11.2.202.559-0.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566563" comment="flash-player-gnome-11.2.202.559-0.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566564" comment="flash-player-kde4-11.2.202.559-0.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8635</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8635" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8635" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8635" ref_url="https://www.suse.com/security/cve/CVE-2015-8635" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2402-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2403-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00048.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK &amp; Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8634, CVE-2015-8638, CVE-2015-8639, CVE-2015-8640, CVE-2015-8641, CVE-2015-8642, CVE-2015-8643, CVE-2015-8646, CVE-2015-8647, CVE-2015-8648, CVE-2015-8649, and CVE-2015-8650.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8635/">CVE-2015-8635</cve>
	<bugzilla href="https://bugzilla.suse.com/960317">SUSE bug 960317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566562" comment="flash-player-11.2.202.559-0.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566563" comment="flash-player-gnome-11.2.202.559-0.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566564" comment="flash-player-kde4-11.2.202.559-0.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8636</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8636" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8636" ref_url="https://www.suse.com/security/cve/CVE-2015-8636" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2402-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2403-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00048.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK &amp; Compiler before 20.0.0.233 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-8459, CVE-2015-8460, and CVE-2015-8645.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8636/">CVE-2015-8636</cve>
	<bugzilla href="https://bugzilla.suse.com/960317">SUSE bug 960317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566562" comment="flash-player-11.2.202.559-0.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566563" comment="flash-player-gnome-11.2.202.559-0.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566564" comment="flash-player-kde4-11.2.202.559-0.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8638</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8638" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8638" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8638" ref_url="https://www.suse.com/security/cve/CVE-2015-8638" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2402-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2403-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00048.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK &amp; Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8634, CVE-2015-8635, CVE-2015-8639, CVE-2015-8640, CVE-2015-8641, CVE-2015-8642, CVE-2015-8643, CVE-2015-8646, CVE-2015-8647, CVE-2015-8648, CVE-2015-8649, and CVE-2015-8650.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8638/">CVE-2015-8638</cve>
	<bugzilla href="https://bugzilla.suse.com/960317">SUSE bug 960317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566562" comment="flash-player-11.2.202.559-0.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566563" comment="flash-player-gnome-11.2.202.559-0.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566564" comment="flash-player-kde4-11.2.202.559-0.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8639</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8639" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8639" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8639" ref_url="https://www.suse.com/security/cve/CVE-2015-8639" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2402-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2403-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00048.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK &amp; Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8634, CVE-2015-8635, CVE-2015-8638, CVE-2015-8640, CVE-2015-8641, CVE-2015-8642, CVE-2015-8643, CVE-2015-8646, CVE-2015-8647, CVE-2015-8648, CVE-2015-8649, and CVE-2015-8650.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8639/">CVE-2015-8639</cve>
	<bugzilla href="https://bugzilla.suse.com/960317">SUSE bug 960317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566562" comment="flash-player-11.2.202.559-0.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566563" comment="flash-player-gnome-11.2.202.559-0.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566564" comment="flash-player-kde4-11.2.202.559-0.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8640</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8640" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8640" ref_url="https://www.suse.com/security/cve/CVE-2015-8640" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2402-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2403-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00048.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK &amp; Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8634, CVE-2015-8635, CVE-2015-8638, CVE-2015-8639, CVE-2015-8641, CVE-2015-8642, CVE-2015-8643, CVE-2015-8646, CVE-2015-8647, CVE-2015-8648, CVE-2015-8649, and CVE-2015-8650.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8640/">CVE-2015-8640</cve>
	<bugzilla href="https://bugzilla.suse.com/960317">SUSE bug 960317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566562" comment="flash-player-11.2.202.559-0.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566563" comment="flash-player-gnome-11.2.202.559-0.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566564" comment="flash-player-kde4-11.2.202.559-0.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8641</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8641" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8641" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8641" ref_url="https://www.suse.com/security/cve/CVE-2015-8641" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2402-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2403-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00048.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK &amp; Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8634, CVE-2015-8635, CVE-2015-8638, CVE-2015-8639, CVE-2015-8640, CVE-2015-8642, CVE-2015-8643, CVE-2015-8646, CVE-2015-8647, CVE-2015-8648, CVE-2015-8649, and CVE-2015-8650.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8641/">CVE-2015-8641</cve>
	<bugzilla href="https://bugzilla.suse.com/960317">SUSE bug 960317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566562" comment="flash-player-11.2.202.559-0.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566563" comment="flash-player-gnome-11.2.202.559-0.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566564" comment="flash-player-kde4-11.2.202.559-0.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8642</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8642" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8642" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8642" ref_url="https://www.suse.com/security/cve/CVE-2015-8642" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2402-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2403-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00048.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK &amp; Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8634, CVE-2015-8635, CVE-2015-8638, CVE-2015-8639, CVE-2015-8640, CVE-2015-8641, CVE-2015-8643, CVE-2015-8646, CVE-2015-8647, CVE-2015-8648, CVE-2015-8649, and CVE-2015-8650.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8642/">CVE-2015-8642</cve>
	<bugzilla href="https://bugzilla.suse.com/960317">SUSE bug 960317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566562" comment="flash-player-11.2.202.559-0.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566563" comment="flash-player-gnome-11.2.202.559-0.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566564" comment="flash-player-kde4-11.2.202.559-0.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8643</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8643" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8643" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8643" ref_url="https://www.suse.com/security/cve/CVE-2015-8643" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2402-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2403-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00048.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK &amp; Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8634, CVE-2015-8635, CVE-2015-8638, CVE-2015-8639, CVE-2015-8640, CVE-2015-8641, CVE-2015-8642, CVE-2015-8646, CVE-2015-8647, CVE-2015-8648, CVE-2015-8649, and CVE-2015-8650.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8643/">CVE-2015-8643</cve>
	<bugzilla href="https://bugzilla.suse.com/960317">SUSE bug 960317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566562" comment="flash-player-11.2.202.559-0.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566563" comment="flash-player-gnome-11.2.202.559-0.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566564" comment="flash-player-kde4-11.2.202.559-0.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158644" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8644</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8644" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8644" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8644" ref_url="https://www.suse.com/security/cve/CVE-2015-8644" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2402-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2403-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00048.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK &amp; Compiler before 20.0.0.233 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8644/">CVE-2015-8644</cve>
	<bugzilla href="https://bugzilla.suse.com/960317">SUSE bug 960317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566562" comment="flash-player-11.2.202.559-0.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566563" comment="flash-player-gnome-11.2.202.559-0.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566564" comment="flash-player-kde4-11.2.202.559-0.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8645</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8645" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8645" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8645" ref_url="https://www.suse.com/security/cve/CVE-2015-8645" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2402-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2403-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00048.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK &amp; Compiler before 20.0.0.233 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-8459, CVE-2015-8460, and CVE-2015-8636.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8645/">CVE-2015-8645</cve>
	<bugzilla href="https://bugzilla.suse.com/960317">SUSE bug 960317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566562" comment="flash-player-11.2.202.559-0.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566563" comment="flash-player-gnome-11.2.202.559-0.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566564" comment="flash-player-kde4-11.2.202.559-0.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8646</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8646" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8646" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8646" ref_url="https://www.suse.com/security/cve/CVE-2015-8646" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2402-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2403-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00048.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK &amp; Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8634, CVE-2015-8635, CVE-2015-8638, CVE-2015-8639, CVE-2015-8640, CVE-2015-8641, CVE-2015-8642, CVE-2015-8643, CVE-2015-8647, CVE-2015-8648, CVE-2015-8649, and CVE-2015-8650.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8646/">CVE-2015-8646</cve>
	<bugzilla href="https://bugzilla.suse.com/960317">SUSE bug 960317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566562" comment="flash-player-11.2.202.559-0.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566563" comment="flash-player-gnome-11.2.202.559-0.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566564" comment="flash-player-kde4-11.2.202.559-0.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8647</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8647" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8647" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8647" ref_url="https://www.suse.com/security/cve/CVE-2015-8647" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2402-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2403-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00048.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK &amp; Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8634, CVE-2015-8635, CVE-2015-8638, CVE-2015-8639, CVE-2015-8640, CVE-2015-8641, CVE-2015-8642, CVE-2015-8643, CVE-2015-8646, CVE-2015-8648, CVE-2015-8649, and CVE-2015-8650.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8647/">CVE-2015-8647</cve>
	<bugzilla href="https://bugzilla.suse.com/960317">SUSE bug 960317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566562" comment="flash-player-11.2.202.559-0.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566563" comment="flash-player-gnome-11.2.202.559-0.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566564" comment="flash-player-kde4-11.2.202.559-0.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8648</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8648" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8648" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8648" ref_url="https://www.suse.com/security/cve/CVE-2015-8648" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2402-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2403-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00048.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK &amp; Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8634, CVE-2015-8635, CVE-2015-8638, CVE-2015-8639, CVE-2015-8640, CVE-2015-8641, CVE-2015-8642, CVE-2015-8643, CVE-2015-8646, CVE-2015-8647, CVE-2015-8649, and CVE-2015-8650.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8648/">CVE-2015-8648</cve>
	<bugzilla href="https://bugzilla.suse.com/960317">SUSE bug 960317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566562" comment="flash-player-11.2.202.559-0.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566563" comment="flash-player-gnome-11.2.202.559-0.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566564" comment="flash-player-kde4-11.2.202.559-0.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158649" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8649</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8649" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8649" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8649" ref_url="https://www.suse.com/security/cve/CVE-2015-8649" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2402-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2403-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00048.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK &amp; Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8634, CVE-2015-8635, CVE-2015-8638, CVE-2015-8639, CVE-2015-8640, CVE-2015-8641, CVE-2015-8642, CVE-2015-8643, CVE-2015-8646, CVE-2015-8647, CVE-2015-8648, and CVE-2015-8650.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8649/">CVE-2015-8649</cve>
	<bugzilla href="https://bugzilla.suse.com/960317">SUSE bug 960317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566562" comment="flash-player-11.2.202.559-0.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566563" comment="flash-player-gnome-11.2.202.559-0.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566564" comment="flash-player-kde4-11.2.202.559-0.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8650</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8650" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8650" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8650" ref_url="https://www.suse.com/security/cve/CVE-2015-8650" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2402-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2403-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00048.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK &amp; Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8634, CVE-2015-8635, CVE-2015-8638, CVE-2015-8639, CVE-2015-8640, CVE-2015-8641, CVE-2015-8642, CVE-2015-8643, CVE-2015-8646, CVE-2015-8647, CVE-2015-8648, and CVE-2015-8649.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8650/">CVE-2015-8650</cve>
	<bugzilla href="https://bugzilla.suse.com/960317">SUSE bug 960317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566562" comment="flash-player-11.2.202.559-0.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566563" comment="flash-player-gnome-11.2.202.559-0.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566564" comment="flash-player-kde4-11.2.202.559-0.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8651</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8651" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8651" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8651" ref_url="https://www.suse.com/security/cve/CVE-2015-8651" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2402-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2403-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00048.html" source="SUSE-SU"/>
    <description>
    Integer overflow in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK &amp; Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8651/">CVE-2015-8651</cve>
	<bugzilla href="https://bugzilla.suse.com/960317">SUSE bug 960317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566562" comment="flash-player-11.2.202.559-0.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566563" comment="flash-player-gnome-11.2.202.559-0.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566564" comment="flash-player-kde4-11.2.202.559-0.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8704</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8704" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8704" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8704" ref_url="https://www.suse.com/security/cve/CVE-2015-8704" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0200-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0227-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0197-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0199-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0204-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00025.html" source="SUSE-SU"/>
    <description>
    apl_42.c in ISC BIND 9.x before 9.9.8-P3, 9.9.x, and 9.10.x before 9.10.3-P3 allows remote authenticated users to cause a denial of service (INSIST assertion failure and daemon exit) via a malformed Address Prefix List (APL) record.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-10"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8704/">CVE-2015-8704</cve>
	<bugzilla href="https://bugzilla.suse.com/962189">SUSE bug 962189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962190">SUSE bug 962190</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566365" comment="bind-libs-9.9.6P1-0.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566366" comment="bind-libs-32bit-9.9.6P1-0.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566367" comment="bind-utils-9.9.6P1-0.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8705</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8705" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8705" ref_url="https://www.suse.com/security/cve/CVE-2015-8705" source="SUSE CVE"/>
    <description>
    buffer.c in named in ISC BIND 9.10.x before 9.10.3-P3, when debug logging is enabled, allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit, or daemon crash) or possibly have unspecified other impact via (1) OPT data or (2) an ECS option.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8705/">CVE-2015-8705</cve>
	<bugzilla href="https://bugzilla.suse.com/962189">SUSE bug 962189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962190">SUSE bug 962190</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333958" comment="bind is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8710</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8710" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8710" ref_url="https://www.suse.com/security/cve/CVE-2015-8710" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0188-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00066.html" source="SUSE-SU"/>
    <description>
    The htmlParseComment function in HTMLparser.c in libxml2 allows attackers to obtain sensitive information, cause a denial of service (out-of-bounds heap memory access and application crash), or possibly have unspecified other impact via an unclosed HTML comment.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-10"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8710/">CVE-2015-8710</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960674">SUSE bug 960674</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566942" comment="libxml2-2.7.6-0.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566943" comment="libxml2-32bit-2.7.6-0.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566944" comment="libxml2-python-2.7.6-0.37.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8711</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8711" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8711" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8711" ref_url="https://www.suse.com/security/cve/CVE-2015-8711" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate conversation data, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8711/">CVE-2015-8711</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563895" comment="wireshark-1.12.9-0.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8712</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8712" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8712" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8712" ref_url="https://www.suse.com/security/cve/CVE-2015-8712" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    The dissect_hsdsch_channel_info function in epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.9 does not validate the number of PDUs, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8712/">CVE-2015-8712</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563895" comment="wireshark-1.12.9-0.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8713</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8713" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8713" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8713" ref_url="https://www.suse.com/security/cve/CVE-2015-8713" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.9 does not properly reserve memory for channel ID mappings, which allows remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8713/">CVE-2015-8713</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563895" comment="wireshark-1.12.9-0.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8714</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8714" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8714" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8714" ref_url="https://www.suse.com/security/cve/CVE-2015-8714" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    The dissect_dcom_OBJREF function in epan/dissectors/packet-dcom.c in the DCOM dissector in Wireshark 1.12.x before 1.12.9 does not initialize a certain IPv4 data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8714/">CVE-2015-8714</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563895" comment="wireshark-1.12.9-0.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8715</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8715" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8715" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8715" ref_url="https://www.suse.com/security/cve/CVE-2015-8715" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-alljoyn.c in the AllJoyn dissector in Wireshark 1.12.x before 1.12.9 does not check for empty arguments, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8715/">CVE-2015-8715</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563895" comment="wireshark-1.12.9-0.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158716" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8716</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8716" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8716" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8716" ref_url="https://www.suse.com/security/cve/CVE-2015-8716" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    The init_t38_info_conv function in epan/dissectors/packet-t38.c in the T.38 dissector in Wireshark 1.12.x before 1.12.9 does not ensure that a conversation exists, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8716/">CVE-2015-8716</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563895" comment="wireshark-1.12.9-0.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8717</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8717" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8717" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8717" ref_url="https://www.suse.com/security/cve/CVE-2015-8717" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    The dissect_sdp function in epan/dissectors/packet-sdp.c in the SDP dissector in Wireshark 1.12.x before 1.12.9 does not prevent use of a negative media count, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8717/">CVE-2015-8717</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563895" comment="wireshark-1.12.9-0.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8718</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8718" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8718" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8718" ref_url="https://www.suse.com/security/cve/CVE-2015-8718" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in epan/dissectors/packet-nlm.c in the NLM dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1, when the "Match MSG/RES packets for async NLM" option is enabled, allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8718/">CVE-2015-8718</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563895" comment="wireshark-1.12.9-0.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8719</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8719" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8719" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8719" ref_url="https://www.suse.com/security/cve/CVE-2015-8719" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    The dissect_dns_answer function in epan/dissectors/packet-dns.c in the DNS dissector in Wireshark 1.12.x before 1.12.9 mishandles the EDNS0 Client Subnet option, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8719/">CVE-2015-8719</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563895" comment="wireshark-1.12.9-0.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8720</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8720" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8720" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8720" ref_url="https://www.suse.com/security/cve/CVE-2015-8720" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    The dissect_ber_GeneralizedTime function in epan/dissectors/packet-ber.c in the BER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 improperly checks an sscanf return value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8720/">CVE-2015-8720</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563895" comment="wireshark-1.12.9-0.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8721</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8721" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8721" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8721" ref_url="https://www.suse.com/security/cve/CVE-2015-8721" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the tvb_uncompress function in epan/tvbuff_zlib.c in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet with zlib compression.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8721/">CVE-2015-8721</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563895" comment="wireshark-1.12.9-0.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8722</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8722" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8722" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8722" ref_url="https://www.suse.com/security/cve/CVE-2015-8722" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-sctp.c in the SCTP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the frame pointer, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8722/">CVE-2015-8722</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563895" comment="wireshark-1.12.9-0.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158723" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8723</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8723" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8723" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8723" ref_url="https://www.suse.com/security/cve/CVE-2015-8723" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    The AirPDcapPacketProcess function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationship between the total length and the capture length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8723/">CVE-2015-8723</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563895" comment="wireshark-1.12.9-0.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158724" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8724</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8724" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8724" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8724" ref_url="https://www.suse.com/security/cve/CVE-2015-8724" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    The AirPDcapDecryptWPABroadcastKey function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not verify the WPA broadcast key length, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8724/">CVE-2015-8724</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563895" comment="wireshark-1.12.9-0.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8725</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8725" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8725" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8725" ref_url="https://www.suse.com/security/cve/CVE-2015-8725" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    The dissect_diameter_base_framed_ipv6_prefix function in epan/dissectors/packet-diameter.c in the DIAMETER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the IPv6 prefix length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8725/">CVE-2015-8725</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563895" comment="wireshark-1.12.9-0.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8726</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8726" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8726" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8726" ref_url="https://www.suse.com/security/cve/CVE-2015-8726" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    wiretap/vwr.c in the VeriWave file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate certain signature and Modulation and Coding Scheme (MCS) data, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8726/">CVE-2015-8726</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563895" comment="wireshark-1.12.9-0.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8727</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8727" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8727" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8727" ref_url="https://www.suse.com/security/cve/CVE-2015-8727" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    The dissect_rsvp_common function in epan/dissectors/packet-rsvp.c in the RSVP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not properly maintain request-key data, which allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8727/">CVE-2015-8727</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563895" comment="wireshark-1.12.9-0.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8728</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8728" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8728" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8728" ref_url="https://www.suse.com/security/cve/CVE-2015-8728" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    The Mobile Identity parser in (1) epan/dissectors/packet-ansi_a.c in the ANSI A dissector and (2) epan/dissectors/packet-gsm_a_common.c in the GSM A dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 improperly uses the tvb_bcd_dig_to_wmem_packet_str function, which allows remote attackers to cause a denial of service (buffer overflow and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8728/">CVE-2015-8728</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563895" comment="wireshark-1.12.9-0.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8729</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8729" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8729" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8729" ref_url="https://www.suse.com/security/cve/CVE-2015-8729" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    The ascend_seek function in wiretap/ascendtext.c in the Ascend file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not ensure the presence of a '\0' character at the end of a date string, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8729/">CVE-2015-8729</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563895" comment="wireshark-1.12.9-0.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8730</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8730" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8730" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8730" ref_url="https://www.suse.com/security/cve/CVE-2015-8730" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the number of items, which allows remote attackers to cause a denial of service (invalid read operation and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8730/">CVE-2015-8730</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563895" comment="wireshark-1.12.9-0.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8731</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8731" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8731" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8731" ref_url="https://www.suse.com/security/cve/CVE-2015-8731" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    The dissct_rsl_ipaccess_msg function in epan/dissectors/packet-rsl.c in the RSL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not reject unknown TLV types, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8731/">CVE-2015-8731</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563895" comment="wireshark-1.12.9-0.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8732</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8732" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8732" ref_url="https://www.suse.com/security/cve/CVE-2015-8732" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    The dissect_zcl_pwr_prof_pwrprofstatersp function in epan/dissectors/packet-zbee-zcl-general.c in the ZigBee ZCL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the Total Profile Number field, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8732/">CVE-2015-8732</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563895" comment="wireshark-1.12.9-0.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8733</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8733" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8733" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8733" ref_url="https://www.suse.com/security/cve/CVE-2015-8733" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    The ngsniffer_process_record function in wiretap/ngsniffer.c in the Sniffer file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationships between record lengths and record header lengths, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8733/">CVE-2015-8733</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009563895" comment="wireshark-1.12.9-0.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8743</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8743" ref_url="https://www.suse.com/security/cve/CVE-2015-8743" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1445-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
    <description>
    QEMU (aka Quick Emulator) built with the NE2000 device emulation support is vulnerable to an OOB r/w access issue. It could occur while performing 'ioport' r/w operations. A privileged (CAP_SYS_RAWIO) user/process could use this flaw to leak or corrupt QEMU memory bytes.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8743/">CVE-2015-8743</cve>
	<bugzilla href="https://bugzilla.suse.com/960725">SUSE bug 960725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960726">SUSE bug 960726</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567467" comment="xen-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567468" comment="xen-doc-html-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567469" comment="xen-kmp-default-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567470" comment="xen-kmp-pae-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567471" comment="xen-libs-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567472" comment="xen-libs-32bit-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567473" comment="xen-tools-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567474" comment="xen-tools-domU-4.4.4_02-32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8744</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8744" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8744" ref_url="https://www.suse.com/security/cve/CVE-2015-8744" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
    <description>
    QEMU (aka Quick Emulator) built with a VMWARE VMXNET3 paravirtual NIC emulator support is vulnerable to crash issue. It occurs when a guest sends a Layer-2 packet smaller than 22 bytes. A privileged (CAP_SYS_RAWIO) guest user could use this flaw to crash the QEMU process instance resulting in DoS.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8744/">CVE-2015-8744</cve>
	<bugzilla href="https://bugzilla.suse.com/960835">SUSE bug 960835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960836">SUSE bug 960836</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567467" comment="xen-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567468" comment="xen-doc-html-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567469" comment="xen-kmp-default-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567470" comment="xen-kmp-pae-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567471" comment="xen-libs-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567472" comment="xen-libs-32bit-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567473" comment="xen-tools-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567474" comment="xen-tools-domU-4.4.4_02-32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8745</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8745" ref_url="https://www.suse.com/security/cve/CVE-2015-8745" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
    <description>
    QEMU (aka Quick Emulator) built with a VMWARE VMXNET3 paravirtual NIC emulator support is vulnerable to crash issue. It could occur while reading Interrupt Mask Registers (IMR). A privileged (CAP_SYS_RAWIO) guest user could use this flaw to crash the QEMU process instance resulting in DoS.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8745/">CVE-2015-8745</cve>
	<bugzilla href="https://bugzilla.suse.com/960707">SUSE bug 960707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960708">SUSE bug 960708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567467" comment="xen-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567468" comment="xen-doc-html-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567469" comment="xen-kmp-default-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567470" comment="xen-kmp-pae-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567471" comment="xen-libs-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567472" comment="xen-libs-32bit-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567473" comment="xen-tools-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567474" comment="xen-tools-domU-4.4.4_02-32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8746</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8746" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8746" ref_url="https://www.suse.com/security/cve/CVE-2015-8746" source="SUSE CVE"/>
    <description>
    fs/nfs/nfs4proc.c in the NFS client in the Linux kernel before 4.2.2 does not properly initialize memory for migration recovery operations, which allows remote NFS servers to cause a denial of service (NULL pointer dereference and panic) via crafted network traffic.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8746/">CVE-2015-8746</cve>
	<bugzilla href="https://bugzilla.suse.com/960839">SUSE bug 960839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8767</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8767" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8767" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8767" ref_url="https://www.suse.com/security/cve/CVE-2015-8767" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0585-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    net/sctp/sm_sideeffect.c in the Linux kernel before 4.3 does not properly manage the relationship between a lock and a socket, which allows local users to cause a denial of service (deadlock) via a crafted sctp_accept call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8767/">CVE-2015-8767</cve>
	<bugzilla href="https://bugzilla.suse.com/961509">SUSE bug 961509</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567353" comment="kernel-default-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567354" comment="kernel-default-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567355" comment="kernel-default-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567356" comment="kernel-default-extra-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567357" comment="kernel-pae-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567358" comment="kernel-pae-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567359" comment="kernel-pae-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567360" comment="kernel-pae-extra-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567361" comment="kernel-source-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567362" comment="kernel-syms-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567363" comment="kernel-trace-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567364" comment="kernel-xen-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567365" comment="kernel-xen-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567366" comment="kernel-xen-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567367" comment="kernel-xen-extra-3.0.101-71.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8776</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8776" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8776" ref_url="https://www.suse.com/security/cve/CVE-2015-8776" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0472-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="TID7017287" ref_url="https://www.suse.com/support/kb/doc?id=7017287" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html" source="SUSE-SU"/>
    <description>
    The strftime function in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly obtain sensitive information via an out-of-range time value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8776/">CVE-2015-8776</cve>
	<bugzilla href="https://bugzilla.suse.com/962736">SUSE bug 962736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986086">SUSE bug 986086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566593" comment="glibc-2.11.3-17.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566594" comment="glibc-32bit-2.11.3-17.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566595" comment="glibc-devel-2.11.3-17.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566596" comment="glibc-devel-32bit-2.11.3-17.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566597" comment="glibc-i18ndata-2.11.3-17.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566598" comment="glibc-locale-2.11.3-17.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566599" comment="glibc-locale-32bit-2.11.3-17.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566600" comment="nscd-2.11.3-17.95.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8777</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8777" ref_url="https://www.suse.com/security/cve/CVE-2015-8777" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0472-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="TID7017287" ref_url="https://www.suse.com/support/kb/doc?id=7017287" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00041.html" source="SUSE-SU"/>
    <description>
    The process_envvars function in elf/rtld.c in the GNU C Library (aka glibc or libc6) before 2.23 allows local users to bypass a pointer-guarding protection mechanism via a zero value of the LD_POINTER_GUARD environment variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8777/">CVE-2015-8777</cve>
	<bugzilla href="https://bugzilla.suse.com/950944">SUSE bug 950944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962735">SUSE bug 962735</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566593" comment="glibc-2.11.3-17.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566594" comment="glibc-32bit-2.11.3-17.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566595" comment="glibc-devel-2.11.3-17.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566596" comment="glibc-devel-32bit-2.11.3-17.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566597" comment="glibc-i18ndata-2.11.3-17.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566598" comment="glibc-locale-2.11.3-17.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566599" comment="glibc-locale-32bit-2.11.3-17.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566600" comment="nscd-2.11.3-17.95.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8778</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8778" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8778" ref_url="https://www.suse.com/security/cve/CVE-2015-8778" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0472-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="TID7017287" ref_url="https://www.suse.com/support/kb/doc?id=7017287" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via the size argument to the __hcreate_r function, which triggers out-of-bounds heap-memory access.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8778/">CVE-2015-8778</cve>
	<bugzilla href="https://bugzilla.suse.com/962737">SUSE bug 962737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986086">SUSE bug 986086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566593" comment="glibc-2.11.3-17.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566594" comment="glibc-32bit-2.11.3-17.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566595" comment="glibc-devel-2.11.3-17.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566596" comment="glibc-devel-32bit-2.11.3-17.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566597" comment="glibc-i18ndata-2.11.3-17.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566598" comment="glibc-locale-2.11.3-17.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566599" comment="glibc-locale-32bit-2.11.3-17.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566600" comment="nscd-2.11.3-17.95.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8779</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8779" ref_url="https://www.suse.com/security/cve/CVE-2015-8779" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0472-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="TID7017287" ref_url="https://www.suse.com/support/kb/doc?id=7017287" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the catopen function in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long catalog name.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8779/">CVE-2015-8779</cve>
	<bugzilla href="https://bugzilla.suse.com/962739">SUSE bug 962739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965453">SUSE bug 965453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986086">SUSE bug 986086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566593" comment="glibc-2.11.3-17.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566594" comment="glibc-32bit-2.11.3-17.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566595" comment="glibc-devel-2.11.3-17.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566596" comment="glibc-devel-32bit-2.11.3-17.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566597" comment="glibc-i18ndata-2.11.3-17.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566598" comment="glibc-locale-2.11.3-17.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566599" comment="glibc-locale-32bit-2.11.3-17.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566600" comment="nscd-2.11.3-17.95.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8781</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8781" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8781" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8781" ref_url="https://www.suse.com/security/cve/CVE-2015-8781" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002264.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0405-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0414-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2321-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00060.html" source="SUSE-SU"/>
    <description>
    tif_luv.c in libtiff allows attackers to cause a denial of service (out-of-bounds write) via an invalid number of samples per pixel in a LogL compressed TIFF image, a different vulnerability than CVE-2015-8782.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8781/">CVE-2015-8781</cve>
	<bugzilla href="https://bugzilla.suse.com/964213">SUSE bug 964213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964225">SUSE bug 964225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567449" comment="libtiff3-3.8.2-141.163.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567450" comment="libtiff3-32bit-3.8.2-141.163.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8782</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8782" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8782" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8782" ref_url="https://www.suse.com/security/cve/CVE-2015-8782" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002264.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0405-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0414-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2321-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00060.html" source="SUSE-SU"/>
    <description>
    tif_luv.c in libtiff allows attackers to cause a denial of service (out-of-bounds writes) via a crafted TIFF image, a different vulnerability than CVE-2015-8781.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8782/">CVE-2015-8782</cve>
	<bugzilla href="https://bugzilla.suse.com/964213">SUSE bug 964213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964225">SUSE bug 964225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567449" comment="libtiff3-3.8.2-141.163.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567450" comment="libtiff3-32bit-3.8.2-141.163.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8783</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8783" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8783" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8783" ref_url="https://www.suse.com/security/cve/CVE-2015-8783" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002264.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0405-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0414-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2321-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00060.html" source="SUSE-SU"/>
    <description>
    tif_luv.c in libtiff allows attackers to cause a denial of service (out-of-bounds reads) via a crafted TIFF image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8783/">CVE-2015-8783</cve>
	<bugzilla href="https://bugzilla.suse.com/964213">SUSE bug 964213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964225">SUSE bug 964225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567449" comment="libtiff3-3.8.2-141.163.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567450" comment="libtiff3-32bit-3.8.2-141.163.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158785" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8785</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8785" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8785" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8785" ref_url="https://www.suse.com/security/cve/CVE-2015-8785" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0585-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    The fuse_fill_write_pages function in fs/fuse/file.c in the Linux kernel before 4.4 allows local users to cause a denial of service (infinite loop) via a writev system call that triggers a zero length for the first segment of an iov.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8785/">CVE-2015-8785</cve>
	<bugzilla href="https://bugzilla.suse.com/963765">SUSE bug 963765</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567353" comment="kernel-default-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567354" comment="kernel-default-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567355" comment="kernel-default-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567356" comment="kernel-default-extra-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567357" comment="kernel-pae-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567358" comment="kernel-pae-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567359" comment="kernel-pae-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567360" comment="kernel-pae-extra-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567361" comment="kernel-source-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567362" comment="kernel-syms-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567363" comment="kernel-trace-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567364" comment="kernel-xen-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567365" comment="kernel-xen-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567366" comment="kernel-xen-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567367" comment="kernel-xen-extra-3.0.101-71.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8812</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8812" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8812" ref_url="https://www.suse.com/security/cve/CVE-2015-8812" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1019-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1031-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1032-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1033-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1034-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1037-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1038-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1039-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1041-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1046-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    drivers/infiniband/hw/cxgb3/iwch_cm.c in the Linux kernel before 4.5 does not properly identify error conditions, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via crafted packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8812/">CVE-2015-8812</cve>
	<bugzilla href="https://bugzilla.suse.com/966437">SUSE bug 966437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966683">SUSE bug 966683</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567353" comment="kernel-default-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567354" comment="kernel-default-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567355" comment="kernel-default-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567356" comment="kernel-default-extra-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567357" comment="kernel-pae-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567358" comment="kernel-pae-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567359" comment="kernel-pae-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567360" comment="kernel-pae-extra-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567361" comment="kernel-source-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567362" comment="kernel-syms-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567363" comment="kernel-trace-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567364" comment="kernel-xen-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567365" comment="kernel-xen-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567366" comment="kernel-xen-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567367" comment="kernel-xen-extra-3.0.101-71.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8817</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8817" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8817" ref_url="https://www.suse.com/security/cve/CVE-2015-8817" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
    <description>
    QEMU (aka Quick Emulator) built to use 'address_space_translate' to map an address to a MemoryRegionSection is vulnerable to an OOB r/w access issue. It could occur while doing pci_dma_read/write calls. Affects QEMU versions &gt;= 1.6.0 and &lt;= 2.3.1. A privileged user inside guest could use this flaw to crash the guest instance resulting in DoS.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8817/">CVE-2015-8817</cve>
	<bugzilla href="https://bugzilla.suse.com/969121">SUSE bug 969121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969122">SUSE bug 969122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969125">SUSE bug 969125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969126">SUSE bug 969126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567467" comment="xen-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567468" comment="xen-doc-html-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567469" comment="xen-kmp-default-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567470" comment="xen-kmp-pae-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567471" comment="xen-libs-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567472" comment="xen-libs-32bit-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567473" comment="xen-tools-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567474" comment="xen-tools-domU-4.4.4_02-32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8818</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8818" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8818" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8818" ref_url="https://www.suse.com/security/cve/CVE-2015-8818" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
    <description>
    The cpu_physical_memory_write_rom_internal function in exec.c in QEMU (aka Quick Emulator) does not properly skip MMIO regions, which allows local privileged guest users to cause a denial of service (guest crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8818/">CVE-2015-8818</cve>
	<bugzilla href="https://bugzilla.suse.com/969122">SUSE bug 969122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969125">SUSE bug 969125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969126">SUSE bug 969126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567467" comment="xen-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567468" comment="xen-doc-html-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567469" comment="xen-kmp-default-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567470" comment="xen-kmp-pae-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567471" comment="xen-libs-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567472" comment="xen-libs-32bit-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567473" comment="xen-tools-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567474" comment="xen-tools-domU-4.4.4_02-32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8830</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8830" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8830" ref_url="https://www.suse.com/security/cve/CVE-2015-8830" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the aio_setup_single_vector function in fs/aio.c in the Linux kernel 4.0 allows local users to cause a denial of service or possibly have unspecified other impact via a large AIO iovec.  NOTE: this vulnerability exists because of a CVE-2012-6701 regression.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8830/">CVE-2015-8830</cve>
	<bugzilla href="https://bugzilla.suse.com/969354">SUSE bug 969354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969355">SUSE bug 969355</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8833</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8833" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8833" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8833" ref_url="https://www.suse.com/security/cve/CVE-2015-8833" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00095.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0878-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00109.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the create_smp_dialog function in gtk-dialog.c in the Off-the-Record Messaging (OTR) pidgin-otr plugin before 4.0.2 for Pidgin allows remote attackers to execute arbitrary code via vectors related to the "Authenticate buddy" menu item.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8833/">CVE-2015-8833</cve>
	<bugzilla href="https://bugzilla.suse.com/970498">SUSE bug 970498</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334265" comment="pidgin-otr is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8844</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8844" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8844" ref_url="https://www.suse.com/security/cve/CVE-2015-8844" source="SUSE CVE"/>
    <description>
    The signal implementation in the Linux kernel before 4.3.5 on powerpc platforms does not check for an MSR with both the S and T bits set, which allows local users to cause a denial of service (TM Bad Thing exception and panic) via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-18"/>
	<updated date="2021-11-18"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8844/">CVE-2015-8844</cve>
	<bugzilla href="https://bugzilla.suse.com/975531">SUSE bug 975531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975533">SUSE bug 975533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8845</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8845" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8845" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8845" ref_url="https://www.suse.com/security/cve/CVE-2015-8845" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html" source="SUSE-SU"/>
    <description>
    The tm_reclaim_thread function in arch/powerpc/kernel/process.c in the Linux kernel before 4.4.1 on powerpc platforms does not ensure that TM suspend mode exists before proceeding with a tm_reclaim call, which allows local users to cause a denial of service (TM Bad Thing exception and panic) via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-18"/>
	<updated date="2021-11-18"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8845/">CVE-2015-8845</cve>
	<bugzilla href="https://bugzilla.suse.com/975531">SUSE bug 975531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975533">SUSE bug 975533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8960</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8960" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8960" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8960" ref_url="https://www.suse.com/security/cve/CVE-2015-8960" source="SUSE CVE"/>
    <description>
    The TLS protocol 1.2 and earlier supports the rsa_fixed_dh, dss_fixed_dh, rsa_fixed_ecdh, and ecdsa_fixed_ecdh values for ClientCertificateType but does not directly document the ability to compute the master secret in certain situations with a client secret key and server public key but not a server secret key, which makes it easier for man-in-the-middle attackers to spoof TLS servers by leveraging knowledge of the secret key for an arbitrary installed client X.509 certificate, aka the "Key Compromise Impersonation (KCI)" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8960/">CVE-2015-8960</cve>
	<bugzilla href="https://bugzilla.suse.com/941124">SUSE bug 941124</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8961</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8961" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8961" ref_url="https://www.suse.com/security/cve/CVE-2015-8961" source="SUSE CVE"/>
    <description>
    The __ext4_journal_stop function in fs/ext4/ext4_jbd2.c in the Linux kernel before 4.3.3 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging improper access to a certain error field.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-14"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8961/">CVE-2015-8961</cve>
	<bugzilla href="https://bugzilla.suse.com/1010492">SUSE bug 1010492</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158963" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8963</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8963" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8963" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8963" ref_url="https://www.suse.com/security/cve/CVE-2015-8963" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00029.html" source="SUSE-SU"/>
    <description>
    Race condition in kernel/events/core.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging incorrect handling of an swevent data structure during a CPU unplug operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-08-26"/>
	<updated date="2021-08-26"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-8963/">CVE-2015-8963</cve>
	<bugzilla href="https://bugzilla.suse.com/1010502">SUSE bug 1010502</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20159104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-9104</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-9104" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9104" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-9104" ref_url="https://www.suse.com/security/cve/CVE-2015-9104" source="SUSE CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerabilities in Synology Audio Station 5.1 before 5.1-2550 and 5.4 before 5.4-2857 allows remote authenticated attackers to inject arbitrary web script or HTML via the album title.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-06-15"/>
	<updated date="2021-06-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-9104/">CVE-2015-9104</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334068" comment="pcre is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20159105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-9105</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-9105" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9105" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-9105" ref_url="https://www.suse.com/security/cve/CVE-2015-9105" source="SUSE CVE"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in Synology Video Station 1.2 before 1.2-0455, 1.5 before 1.5-0772, and 1.6 before 1.6-0847 allow remote authenticated attackers to inject arbitrary web script or HTML via the (1) file name or (2) collection name of videos.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-06-15"/>
	<updated date="2021-06-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-9105/">CVE-2015-9105</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334068" comment="pcre is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0402</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0402" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0402" ref_url="https://www.suse.com/security/cve/CVE-2016-0402" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0399-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0428-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0431-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0433-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0636-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0770-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0776-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java SE and Java SE Embedded components in Oracle Java SE 6u105, 7u91, and 8u66 and Java SE Embedded 8u65 allows remote attackers to affect integrity via unknown vectors related to Networking.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0402/">CVE-2016-0402</cve>
	<bugzilla href="https://bugzilla.suse.com/960402">SUSE bug 960402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962743">SUSE bug 962743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566649" comment="java-1_7_0-openjdk-1.7.0.95-0.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566650" comment="java-1_7_0-openjdk-demo-1.7.0.95-0.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566651" comment="java-1_7_0-openjdk-devel-1.7.0.95-0.17.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0448</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0448" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0448" ref_url="https://www.suse.com/security/cve/CVE-2016-0448" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0399-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0428-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0431-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0433-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0636-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0770-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0776-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java SE and Java SE Embedded components in Oracle Java SE 6u105, 7u91, and 8u66, and Java SE Embedded 8u65 allows remote authenticated users to affect confidentiality via vectors related to JMX.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0448/">CVE-2016-0448</cve>
	<bugzilla href="https://bugzilla.suse.com/960402">SUSE bug 960402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962743">SUSE bug 962743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566649" comment="java-1_7_0-openjdk-1.7.0.95-0.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566650" comment="java-1_7_0-openjdk-demo-1.7.0.95-0.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566651" comment="java-1_7_0-openjdk-devel-1.7.0.95-0.17.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0466</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0466" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0466" ref_url="https://www.suse.com/security/cve/CVE-2016-0466" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0399-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0428-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0431-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0433-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0636-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0770-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0776-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java SE, Java SE Embedded, and JRockit components in Oracle Java SE 6u105, 7u91, and 8u66; Java SE Embedded 8u65; and JRockit R28.3.8 allows remote attackers to affect availability via vectors related to JAXP.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0466/">CVE-2016-0466</cve>
	<bugzilla href="https://bugzilla.suse.com/960402">SUSE bug 960402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962743">SUSE bug 962743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566649" comment="java-1_7_0-openjdk-1.7.0.95-0.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566650" comment="java-1_7_0-openjdk-demo-1.7.0.95-0.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566651" comment="java-1_7_0-openjdk-devel-1.7.0.95-0.17.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0483</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0483" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0483" ref_url="https://www.suse.com/security/cve/CVE-2016-0483" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0399-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0428-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0431-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0433-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0636-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0770-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0776-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u105, 7u91, and 8u66; Java SE Embedded 8u65; and JRockit R28.3.8 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT.  NOTE: the previous information is from the January 2016 CPU. Oracle has not commented on third-party claims that this is a heap-based buffer overflow in the readImage function, which allows remote attackers to execute arbitrary code via crafted image data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0483/">CVE-2016-0483</cve>
	<bugzilla href="https://bugzilla.suse.com/960402">SUSE bug 960402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962743">SUSE bug 962743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566649" comment="java-1_7_0-openjdk-1.7.0.95-0.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566650" comment="java-1_7_0-openjdk-demo-1.7.0.95-0.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566651" comment="java-1_7_0-openjdk-devel-1.7.0.95-0.17.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0494</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0494" ref_url="https://www.suse.com/security/cve/CVE-2016-0494" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0399-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0428-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0431-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0433-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0636-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0770-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0776-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java SE and Java SE Embedded components in Oracle Java SE 6u105, 7u91, and 8u66 and Java SE Embedded 8u65 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0494/">CVE-2016-0494</cve>
	<bugzilla href="https://bugzilla.suse.com/962743">SUSE bug 962743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566649" comment="java-1_7_0-openjdk-1.7.0.95-0.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566650" comment="java-1_7_0-openjdk-demo-1.7.0.95-0.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566651" comment="java-1_7_0-openjdk-devel-1.7.0.95-0.17.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0502</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0502" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0502" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0502" ref_url="https://www.suse.com/security/cve/CVE-2016-0502" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001853.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0367-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.31 and earlier and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0502/">CVE-2016-0502</cve>
	<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962817">SUSE bug 962817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962930">SUSE bug 962930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962931">SUSE bug 962931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962932">SUSE bug 962932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962934">SUSE bug 962934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962935">SUSE bug 962935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962936">SUSE bug 962936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962937">SUSE bug 962937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962938">SUSE bug 962938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962939">SUSE bug 962939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962941">SUSE bug 962941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962942">SUSE bug 962942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962943">SUSE bug 962943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962944">SUSE bug 962944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962945">SUSE bug 962945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962946">SUSE bug 962946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962947">SUSE bug 962947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962948">SUSE bug 962948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962949">SUSE bug 962949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962950">SUSE bug 962950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962951">SUSE bug 962951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962952">SUSE bug 962952</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566984" comment="libmysql55client18-5.5.47-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566985" comment="libmysql55client18-32bit-5.5.47-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566986" comment="libmysql55client_r18-5.5.47-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566987" comment="libmysql55client_r18-32bit-5.5.47-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566988" comment="mysql-5.5.47-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566989" comment="mysql-client-5.5.47-0.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0505</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0505" ref_url="https://www.suse.com/security/cve/CVE-2016-0505" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0367-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to Options.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0505/">CVE-2016-0505</cve>
	<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962817">SUSE bug 962817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962930">SUSE bug 962930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962931">SUSE bug 962931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962932">SUSE bug 962932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962934">SUSE bug 962934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962935">SUSE bug 962935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962936">SUSE bug 962936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962937">SUSE bug 962937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962938">SUSE bug 962938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962939">SUSE bug 962939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962941">SUSE bug 962941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962942">SUSE bug 962942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962943">SUSE bug 962943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962944">SUSE bug 962944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962945">SUSE bug 962945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962946">SUSE bug 962946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962947">SUSE bug 962947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962948">SUSE bug 962948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962949">SUSE bug 962949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962950">SUSE bug 962950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962951">SUSE bug 962951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962952">SUSE bug 962952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566984" comment="libmysql55client18-5.5.47-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566985" comment="libmysql55client18-32bit-5.5.47-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566986" comment="libmysql55client_r18-5.5.47-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566987" comment="libmysql55client_r18-32bit-5.5.47-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566988" comment="mysql-5.5.47-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566989" comment="mysql-client-5.5.47-0.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0546</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0546" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0546" ref_url="https://www.suse.com/security/cve/CVE-2016-0546" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0367-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Client.  NOTE: the previous information is from the January 2016 CPU. Oracle has not commented on third-party claims that these are multiple buffer overflows in the mysqlshow tool that allow remote database servers to have unspecified impact via a long table or database name.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0546/">CVE-2016-0546</cve>
	<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962817">SUSE bug 962817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962930">SUSE bug 962930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962931">SUSE bug 962931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962932">SUSE bug 962932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962934">SUSE bug 962934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962935">SUSE bug 962935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962936">SUSE bug 962936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962937">SUSE bug 962937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962938">SUSE bug 962938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962939">SUSE bug 962939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962941">SUSE bug 962941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962942">SUSE bug 962942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962943">SUSE bug 962943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962944">SUSE bug 962944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962945">SUSE bug 962945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962946">SUSE bug 962946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962947">SUSE bug 962947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962948">SUSE bug 962948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962949">SUSE bug 962949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962950">SUSE bug 962950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962951">SUSE bug 962951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962952">SUSE bug 962952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566984" comment="libmysql55client18-5.5.47-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566985" comment="libmysql55client18-32bit-5.5.47-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566986" comment="libmysql55client_r18-5.5.47-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566987" comment="libmysql55client_r18-32bit-5.5.47-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566988" comment="mysql-5.5.47-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566989" comment="mysql-client-5.5.47-0.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0596</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0596" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0596" ref_url="https://www.suse.com/security/cve/CVE-2016-0596" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0367-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier and 5.6.27 and earlier and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via vectors related to DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0596/">CVE-2016-0596</cve>
	<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962817">SUSE bug 962817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962930">SUSE bug 962930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962931">SUSE bug 962931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962932">SUSE bug 962932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962934">SUSE bug 962934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962935">SUSE bug 962935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962936">SUSE bug 962936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962937">SUSE bug 962937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962938">SUSE bug 962938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962939">SUSE bug 962939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962941">SUSE bug 962941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962942">SUSE bug 962942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962943">SUSE bug 962943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962944">SUSE bug 962944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962945">SUSE bug 962945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962946">SUSE bug 962946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962947">SUSE bug 962947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962948">SUSE bug 962948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962949">SUSE bug 962949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962950">SUSE bug 962950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962951">SUSE bug 962951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962952">SUSE bug 962952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566984" comment="libmysql55client18-5.5.47-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566985" comment="libmysql55client18-32bit-5.5.47-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566986" comment="libmysql55client_r18-5.5.47-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566987" comment="libmysql55client_r18-32bit-5.5.47-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566988" comment="mysql-5.5.47-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566989" comment="mysql-client-5.5.47-0.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0597</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0597" ref_url="https://www.suse.com/security/cve/CVE-2016-0597" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0367-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to Optimizer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0597/">CVE-2016-0597</cve>
	<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962817">SUSE bug 962817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962930">SUSE bug 962930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962931">SUSE bug 962931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962932">SUSE bug 962932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962934">SUSE bug 962934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962935">SUSE bug 962935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962936">SUSE bug 962936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962937">SUSE bug 962937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962938">SUSE bug 962938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962939">SUSE bug 962939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962941">SUSE bug 962941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962942">SUSE bug 962942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962943">SUSE bug 962943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962944">SUSE bug 962944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962945">SUSE bug 962945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962946">SUSE bug 962946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962947">SUSE bug 962947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962948">SUSE bug 962948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962949">SUSE bug 962949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962950">SUSE bug 962950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962951">SUSE bug 962951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962952">SUSE bug 962952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566984" comment="libmysql55client18-5.5.47-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566985" comment="libmysql55client18-32bit-5.5.47-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566986" comment="libmysql55client_r18-5.5.47-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566987" comment="libmysql55client_r18-32bit-5.5.47-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566988" comment="mysql-5.5.47-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566989" comment="mysql-client-5.5.47-0.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0598</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0598" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0598" ref_url="https://www.suse.com/security/cve/CVE-2016-0598" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0367-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via vectors related to DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0598/">CVE-2016-0598</cve>
	<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962817">SUSE bug 962817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962930">SUSE bug 962930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962931">SUSE bug 962931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962932">SUSE bug 962932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962934">SUSE bug 962934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962935">SUSE bug 962935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962936">SUSE bug 962936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962937">SUSE bug 962937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962938">SUSE bug 962938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962939">SUSE bug 962939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962941">SUSE bug 962941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962942">SUSE bug 962942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962943">SUSE bug 962943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962944">SUSE bug 962944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962945">SUSE bug 962945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962946">SUSE bug 962946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962947">SUSE bug 962947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962948">SUSE bug 962948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962949">SUSE bug 962949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962950">SUSE bug 962950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962951">SUSE bug 962951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962952">SUSE bug 962952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566984" comment="libmysql55client18-5.5.47-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566985" comment="libmysql55client18-32bit-5.5.47-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566986" comment="libmysql55client_r18-5.5.47-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566987" comment="libmysql55client_r18-32bit-5.5.47-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566988" comment="mysql-5.5.47-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566989" comment="mysql-client-5.5.47-0.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0600</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0600" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0600" ref_url="https://www.suse.com/security/cve/CVE-2016-0600" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0367-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to InnoDB.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0600/">CVE-2016-0600</cve>
	<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962817">SUSE bug 962817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962930">SUSE bug 962930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962931">SUSE bug 962931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962932">SUSE bug 962932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962934">SUSE bug 962934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962935">SUSE bug 962935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962936">SUSE bug 962936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962937">SUSE bug 962937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962938">SUSE bug 962938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962939">SUSE bug 962939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962941">SUSE bug 962941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962942">SUSE bug 962942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962943">SUSE bug 962943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962944">SUSE bug 962944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962945">SUSE bug 962945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962946">SUSE bug 962946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962947">SUSE bug 962947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962948">SUSE bug 962948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962949">SUSE bug 962949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962950">SUSE bug 962950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962951">SUSE bug 962951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962952">SUSE bug 962952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566984" comment="libmysql55client18-5.5.47-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566985" comment="libmysql55client18-32bit-5.5.47-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566986" comment="libmysql55client_r18-5.5.47-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566987" comment="libmysql55client_r18-32bit-5.5.47-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566988" comment="mysql-5.5.47-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566989" comment="mysql-client-5.5.47-0.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160606" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0606</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0606" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0606" ref_url="https://www.suse.com/security/cve/CVE-2016-0606" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0367-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect integrity via unknown vectors related to encryption.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0606/">CVE-2016-0606</cve>
	<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962817">SUSE bug 962817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962930">SUSE bug 962930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962931">SUSE bug 962931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962932">SUSE bug 962932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962934">SUSE bug 962934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962935">SUSE bug 962935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962936">SUSE bug 962936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962937">SUSE bug 962937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962938">SUSE bug 962938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962939">SUSE bug 962939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962941">SUSE bug 962941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962942">SUSE bug 962942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962943">SUSE bug 962943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962944">SUSE bug 962944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962945">SUSE bug 962945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962946">SUSE bug 962946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962947">SUSE bug 962947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962948">SUSE bug 962948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962949">SUSE bug 962949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962950">SUSE bug 962950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962951">SUSE bug 962951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962952">SUSE bug 962952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566984" comment="libmysql55client18-5.5.47-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566985" comment="libmysql55client18-32bit-5.5.47-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566986" comment="libmysql55client_r18-5.5.47-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566987" comment="libmysql55client_r18-32bit-5.5.47-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566988" comment="mysql-5.5.47-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566989" comment="mysql-client-5.5.47-0.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0608</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0608" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0608" ref_url="https://www.suse.com/security/cve/CVE-2016-0608" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0367-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via vectors related to UDF.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0608/">CVE-2016-0608</cve>
	<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962817">SUSE bug 962817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962930">SUSE bug 962930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962931">SUSE bug 962931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962932">SUSE bug 962932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962934">SUSE bug 962934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962935">SUSE bug 962935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962936">SUSE bug 962936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962937">SUSE bug 962937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962938">SUSE bug 962938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962939">SUSE bug 962939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962941">SUSE bug 962941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962942">SUSE bug 962942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962943">SUSE bug 962943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962944">SUSE bug 962944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962945">SUSE bug 962945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962946">SUSE bug 962946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962947">SUSE bug 962947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962948">SUSE bug 962948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962949">SUSE bug 962949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962950">SUSE bug 962950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962951">SUSE bug 962951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962952">SUSE bug 962952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566984" comment="libmysql55client18-5.5.47-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566985" comment="libmysql55client18-32bit-5.5.47-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566986" comment="libmysql55client_r18-5.5.47-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566987" comment="libmysql55client_r18-32bit-5.5.47-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566988" comment="mysql-5.5.47-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566989" comment="mysql-client-5.5.47-0.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0609</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0609" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0609" ref_url="https://www.suse.com/security/cve/CVE-2016-0609" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0367-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0609/">CVE-2016-0609</cve>
	<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962817">SUSE bug 962817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962930">SUSE bug 962930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962931">SUSE bug 962931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962932">SUSE bug 962932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962934">SUSE bug 962934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962935">SUSE bug 962935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962936">SUSE bug 962936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962937">SUSE bug 962937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962938">SUSE bug 962938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962939">SUSE bug 962939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962941">SUSE bug 962941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962942">SUSE bug 962942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962943">SUSE bug 962943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962944">SUSE bug 962944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962945">SUSE bug 962945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962946">SUSE bug 962946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962947">SUSE bug 962947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962948">SUSE bug 962948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962949">SUSE bug 962949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962950">SUSE bug 962950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962951">SUSE bug 962951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962952">SUSE bug 962952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566984" comment="libmysql55client18-5.5.47-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566985" comment="libmysql55client18-32bit-5.5.47-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566986" comment="libmysql55client_r18-5.5.47-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566987" comment="libmysql55client_r18-32bit-5.5.47-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566988" comment="mysql-5.5.47-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566989" comment="mysql-client-5.5.47-0.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0616</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0616" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0616" ref_url="https://www.suse.com/security/cve/CVE-2016-0616" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to Optimizer.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0616/">CVE-2016-0616</cve>
	<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962817">SUSE bug 962817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962930">SUSE bug 962930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962931">SUSE bug 962931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962932">SUSE bug 962932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962934">SUSE bug 962934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962935">SUSE bug 962935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962936">SUSE bug 962936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962937">SUSE bug 962937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962938">SUSE bug 962938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962939">SUSE bug 962939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962941">SUSE bug 962941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962942">SUSE bug 962942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962943">SUSE bug 962943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962944">SUSE bug 962944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962945">SUSE bug 962945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962946">SUSE bug 962946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962947">SUSE bug 962947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962948">SUSE bug 962948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962949">SUSE bug 962949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962950">SUSE bug 962950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962951">SUSE bug 962951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962952">SUSE bug 962952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566984" comment="libmysql55client18-5.5.47-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566985" comment="libmysql55client18-32bit-5.5.47-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566986" comment="libmysql55client_r18-5.5.47-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566987" comment="libmysql55client_r18-32bit-5.5.47-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566988" comment="mysql-5.5.47-0.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566989" comment="mysql-client-5.5.47-0.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0636</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0636" ref_url="https://www.suse.com/security/cve/CVE-2016-0636" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0956-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0957-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0959-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="TID7010166" ref_url="https://www.suse.com/support/kb/doc/?id=7010166" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0971-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1004-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00035.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u97, 8u73, and 8u74 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to the Hotspot sub-component.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0636/">CVE-2016-0636</cve>
	<bugzilla href="https://bugzilla.suse.com/972468">SUSE bug 972468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979252">SUSE bug 979252</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567335" comment="java-1_7_0-openjdk-1.7.0.99-0.20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567336" comment="java-1_7_0-openjdk-demo-1.7.0.99-0.20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567337" comment="java-1_7_0-openjdk-devel-1.7.0.99-0.20.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160701" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0701</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0701" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0701" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0701" ref_url="https://www.suse.com/security/cve/CVE-2016-0701" source="SUSE CVE"/>
		<reference ref_id="TID7022627" ref_url="https://www.suse.com/support/kb/doc/?id=7022627" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0637-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html" source="SUSE-SU"/>
    <description>
    The DH_check_pub_key function in crypto/dh/dh_check.c in OpenSSL 1.0.2 before 1.0.2f does not ensure that prime numbers are appropriate for Diffie-Hellman (DH) key exchange, which makes it easier for remote attackers to discover a private DH exponent by making multiple handshakes with a peer that chose an inappropriate number, as demonstrated by a number in an X9.42 file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-02"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0701/">CVE-2016-0701</cve>
	<bugzilla href="https://bugzilla.suse.com/1071906">SUSE bug 1071906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176331">SUSE bug 1176331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195379">SUSE bug 1195379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963410">SUSE bug 963410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963413">SUSE bug 963413</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0702</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0702" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0702" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0702" ref_url="https://www.suse.com/security/cve/CVE-2016-0702" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0617-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0624-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0631-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0641-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1057-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1267-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7021744" ref_url="https://www.suse.com/support/kb/doc/?id=7021744" source="SUSE-SU"/>
		<reference ref_id="TID7021994" ref_url="https://www.suse.com/support/kb/doc/?id=7021994" source="SUSE-SU"/>
		<reference ref_id="TID7021995" ref_url="https://www.suse.com/support/kb/doc/?id=7021995" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0627-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0628-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0637-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0720-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1242-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1211-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1212-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00027.html" source="SUSE-SU"/>
    <description>
    The MOD_EXP_CTIME_COPY_FROM_PREBUF function in crypto/bn/bn_exp.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not properly consider cache-bank access times during modular exponentiation, which makes it easier for local users to discover RSA keys by running a crafted application on the same Intel Sandy Bridge CPU core as a victim and leveraging cache-bank conflicts, aka a "CacheBleed" attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0702/">CVE-2016-0702</cve>
	<bugzilla href="https://bugzilla.suse.com/1007806">SUSE bug 1007806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968044">SUSE bug 968044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968050">SUSE bug 968050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971238">SUSE bug 971238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990370">SUSE bug 990370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567311" comment="compat-openssl097g-0.9.7g-146.22.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567312" comment="compat-openssl097g-32bit-0.9.7g-146.22.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567420" comment="libopenssl0_9_8-0.9.8j-0.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567421" comment="libopenssl0_9_8-32bit-0.9.8j-0.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567422" comment="openssl-0.9.8j-0.89.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0703</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0703" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0703" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0703" ref_url="https://www.suse.com/security/cve/CVE-2016-0703" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0617-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0624-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0631-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0641-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1057-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0628-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0720-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00025.html" source="SUSE-SU"/>
    <description>
    The get_client_master_key function in s2_srvr.c in the SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a accepts a nonzero CLIENT-MASTER-KEY CLEAR-KEY-LENGTH value for an arbitrary cipher, which allows man-in-the-middle attackers to determine the MASTER-KEY value and decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, a related issue to CVE-2016-0800.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0703/">CVE-2016-0703</cve>
	<bugzilla href="https://bugzilla.suse.com/968044">SUSE bug 968044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968046">SUSE bug 968046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968051">SUSE bug 968051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986238">SUSE bug 986238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567311" comment="compat-openssl097g-0.9.7g-146.22.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567312" comment="compat-openssl097g-32bit-0.9.7g-146.22.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567420" comment="libopenssl0_9_8-0.9.8j-0.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567421" comment="libopenssl0_9_8-32bit-0.9.8j-0.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567422" comment="openssl-0.9.8j-0.89.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0705</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0705" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0705" ref_url="https://www.suse.com/security/cve/CVE-2016-0705" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0617-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0624-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1057-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2839-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004658.html" source="SUSE-SU"/>
		<reference ref_id="TID7021744" ref_url="https://www.suse.com/support/kb/doc/?id=7021744" source="SUSE-SU"/>
		<reference ref_id="TID7021994" ref_url="https://www.suse.com/support/kb/doc/?id=7021994" source="SUSE-SU"/>
		<reference ref_id="TID7021995" ref_url="https://www.suse.com/support/kb/doc/?id=7021995" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0627-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0628-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0637-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1332-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00019.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in the dsa_priv_decode function in crypto/dsa/dsa_ameth.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a malformed DSA private key.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0705/">CVE-2016-0705</cve>
	<bugzilla href="https://bugzilla.suse.com/968044">SUSE bug 968044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968047">SUSE bug 968047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971238">SUSE bug 971238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567420" comment="libopenssl0_9_8-0.9.8j-0.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567421" comment="libopenssl0_9_8-32bit-0.9.8j-0.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567422" comment="openssl-0.9.8j-0.89.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160723" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0723</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0723" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0723" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0723" ref_url="https://www.suse.com/security/cve/CVE-2016-0723" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0585-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0537-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    Race condition in the tty_ioctl function in drivers/tty/tty_io.c in the Linux kernel through 4.4.1 allows local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free and system crash) by making a TIOCGETD ioctl call during processing of a TIOCSETD ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0723/">CVE-2016-0723</cve>
	<bugzilla href="https://bugzilla.suse.com/961500">SUSE bug 961500</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567353" comment="kernel-default-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567354" comment="kernel-default-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567355" comment="kernel-default-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567356" comment="kernel-default-extra-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567357" comment="kernel-pae-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567358" comment="kernel-pae-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567359" comment="kernel-pae-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567360" comment="kernel-pae-extra-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567361" comment="kernel-source-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567362" comment="kernel-syms-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567363" comment="kernel-trace-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567364" comment="kernel-xen-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567365" comment="kernel-xen-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567366" comment="kernel-xen-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567367" comment="kernel-xen-extra-3.0.101-71.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0728</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0728" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0728" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0728" ref_url="https://www.suse.com/security/cve/CVE-2016-0728" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0186-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0205-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0341-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0746-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0747-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0751-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0752-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0753-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0755-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0756-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0757-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="TID7017169" ref_url="https://www.suse.com/support/kb/doc?id=7017169" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00005.html" source="SUSE-SU"/>
    <description>
    The join_session_keyring function in security/keys/process_keys.c in the Linux kernel before 4.4.1 mishandles object references in a certain error case, which allows local users to gain privileges or cause a denial of service (integer overflow and use-after-free) via crafted keyctl commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0728/">CVE-2016-0728</cve>
	<bugzilla href="https://bugzilla.suse.com/923755">SUSE bug 923755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962075">SUSE bug 962075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962078">SUSE bug 962078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963994">SUSE bug 963994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0739</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0739" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0739" ref_url="https://www.suse.com/security/cve/CVE-2016-0739" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001908.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0722-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0880-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00111.html" source="SUSE-SU"/>
    <description>
    libssh before 0.7.3 improperly truncates ephemeral secrets generated for the (1) diffie-hellman-group1 and (2) diffie-hellman-group14 key exchange methods to 128 bits, which makes it easier for man-in-the-middle attackers to decrypt or intercept SSH sessions via unspecified vectors, aka a "bits/bytes confusion bug."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0739/">CVE-2016-0739</cve>
	<bugzilla href="https://bugzilla.suse.com/965875">SUSE bug 965875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967026">SUSE bug 967026</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567389" comment="libssh2-0.2-5.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0755</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0755" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0755" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0755" ref_url="https://www.suse.com/security/cve/CVE-2016-0755" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0360-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0373-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0376-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00047.html" source="SUSE-SU"/>
    <description>
    The ConnectionExists function in lib/url.c in libcurl before 7.47.0 does not properly re-use NTLM-authenticated proxy connections, which might allow remote attackers to authenticate as other users via a request, a similar issue to CVE-2014-0015.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0755/">CVE-2016-0755</cve>
	<bugzilla href="https://bugzilla.suse.com/962983">SUSE bug 962983</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566387" comment="curl-7.19.7-1.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566388" comment="libcurl4-7.19.7-1.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566389" comment="libcurl4-32bit-7.19.7-1.46.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0766</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0766" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0766" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0766" ref_url="https://www.suse.com/security/cve/CVE-2016-0766" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0539-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0555-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0531-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0578-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00056.html" source="SUSE-SU"/>
    <description>
    PostgreSQL before 9.1.20, 9.2.x before 9.2.15, 9.3.x before 9.3.11, 9.4.x before 9.4.6, and 9.5.x before 9.5.1 does not properly restrict access to unspecified custom configuration settings (GUCS) for PL/Java, which allows attackers to gain privileges via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0766/">CVE-2016-0766</cve>
	<bugzilla href="https://bugzilla.suse.com/966435">SUSE bug 966435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966436">SUSE bug 966436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978323">SUSE bug 978323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567423" comment="libecpg6-9.4.6-0.14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567424" comment="libpq5-9.4.6-0.14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567425" comment="libpq5-32bit-9.4.6-0.14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567426" comment="postgresql94-9.4.6-0.14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567427" comment="postgresql94-docs-9.4.6-0.14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0771</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0771" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0771" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0771" ref_url="https://www.suse.com/security/cve/CVE-2016-0771" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0813-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00063.html" source="SUSE-SU"/>
    <description>
    The internal DNS server in Samba 4.x before 4.1.23, 4.2.x before 4.2.9, 4.3.x before 4.3.6, and 4.4.x before 4.4.0rc4, when an AD DC is configured, allows remote authenticated users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from process memory by uploading a crafted DNS TXT record.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0771/">CVE-2016-0771</cve>
	<bugzilla href="https://bugzilla.suse.com/968223">SUSE bug 968223</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333940" comment="samba is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0773</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0773" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0773" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0773" ref_url="https://www.suse.com/security/cve/CVE-2016-0773" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0539-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0555-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0531-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0578-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00056.html" source="SUSE-SU"/>
    <description>
    PostgreSQL before 9.1.20, 9.2.x before 9.2.15, 9.3.x before 9.3.11, 9.4.x before 9.4.6, and 9.5.x before 9.5.1 allows remote attackers to cause a denial of service (infinite loop or buffer overflow and crash) via a large Unicode character range in a regular expression.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0773/">CVE-2016-0773</cve>
	<bugzilla href="https://bugzilla.suse.com/966435">SUSE bug 966435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966436">SUSE bug 966436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978323">SUSE bug 978323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983246">SUSE bug 983246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986409">SUSE bug 986409</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567423" comment="libecpg6-9.4.6-0.14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567424" comment="libpq5-9.4.6-0.14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567425" comment="libpq5-32bit-9.4.6-0.14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567426" comment="postgresql94-9.4.6-0.14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567427" comment="postgresql94-docs-9.4.6-0.14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0774</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0774" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0774" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0774" ref_url="https://www.suse.com/security/cve/CVE-2016-0774" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1031-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1032-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1033-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1034-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1037-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1038-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1039-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1041-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1046-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00037.html" source="SUSE-SU"/>
    <description>
    The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in a certain Linux kernel backport in the linux package before 3.2.73-2+deb7u3 on Debian wheezy and the kernel package before 3.10.0-229.26.2 on Red Hat Enterprise Linux (RHEL) 7.1 do not properly consider the side effects of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls, which allows local users to cause a denial of service (system crash) or possibly gain privileges via a crafted application, aka an "I/O vector array overrun." NOTE: this vulnerability exists because of an incorrect fix for CVE-2015-1805.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0774/">CVE-2016-0774</cve>
	<bugzilla href="https://bugzilla.suse.com/917839">SUSE bug 917839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964730">SUSE bug 964730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964732">SUSE bug 964732</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0777</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0777" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0777" ref_url="https://www.suse.com/security/cve/CVE-2016-0777" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0117-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0118-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0120-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="TID7017154" ref_url="https://www.suse.com/support/kb/doc?id=7017154" source="SUSE-SU"/>
		<reference ref_id="TID7017155" ref_url="https://www.suse.com/support/kb/doc?id=7017155" source="SUSE-SU"/>
		<reference ref_id="TID7017180" ref_url="https://www.suse.com/support/kb/doc/?id=7017180" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0127-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0128-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0145-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00016.html" source="SUSE-SU"/>
    <description>
    The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstrated by reading a private key.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-11"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0777/">CVE-2016-0777</cve>
	<bugzilla href="https://bugzilla.suse.com/961642">SUSE bug 961642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996040">SUSE bug 996040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567021" comment="openssh-6.2p2-0.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567022" comment="openssh-askpass-6.2p2-0.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567023" comment="openssh-askpass-gnome-6.2p2-0.24.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567417" comment="openssh-6.6p1-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567418" comment="openssh-askpass-gnome-6.6p1-16.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567419" comment="openssh-helpers-6.6p1-16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0778</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0778" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0778" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0778" ref_url="https://www.suse.com/security/cve/CVE-2016-0778" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0117-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0118-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0120-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="TID7017154" ref_url="https://www.suse.com/support/kb/doc?id=7017154" source="SUSE-SU"/>
		<reference ref_id="TID7017155" ref_url="https://www.suse.com/support/kb/doc?id=7017155" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0127-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0128-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0145-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00016.html" source="SUSE-SU"/>
    <description>
    The (1) roaming_read and (2) roaming_write functions in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2, when certain proxy and forward options are enabled, do not properly maintain connection file descriptors, which allows remote servers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact by requesting many forwardings.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-11"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0778/">CVE-2016-0778</cve>
	<bugzilla href="https://bugzilla.suse.com/961645">SUSE bug 961645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996040">SUSE bug 996040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567021" comment="openssh-6.2p2-0.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567022" comment="openssh-askpass-6.2p2-0.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567023" comment="openssh-askpass-gnome-6.2p2-0.24.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567417" comment="openssh-6.6p1-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567418" comment="openssh-askpass-gnome-6.6p1-16.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567419" comment="openssh-helpers-6.6p1-16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0787</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0787" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0787" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0787" ref_url="https://www.suse.com/security/cve/CVE-2016-0787" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0639-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00008.html" source="SUSE-SU"/>
    <description>
    The diffie_hellman_sha256 function in kex.c in libssh2 before 1.7.0 improperly truncates secrets to 128 or 256 bits, which makes it easier for man-in-the-middle attackers to decrypt or intercept SSH sessions via unspecified vectors, aka a "bits/bytes confusion bug."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0787/">CVE-2016-0787</cve>
	<bugzilla href="https://bugzilla.suse.com/1149968">SUSE bug 1149968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967026">SUSE bug 967026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968174">SUSE bug 968174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974691">SUSE bug 974691</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009564877" comment="libssh2-1-1.2.9-4.2.6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0797</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0797" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0797" ref_url="https://www.suse.com/security/cve/CVE-2016-0797" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0617-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0624-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0631-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0641-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1057-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0627-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0628-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0637-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0720-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00019.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allow remote attackers to cause a denial of service (heap memory corruption or NULL pointer dereference) or possibly have unspecified other impact via a long digit string that is mishandled by the (1) BN_dec2bn or (2) BN_hex2bn function, related to crypto/bn/bn.h and crypto/bn/bn_print.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0797/">CVE-2016-0797</cve>
	<bugzilla href="https://bugzilla.suse.com/968044">SUSE bug 968044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968048">SUSE bug 968048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990370">SUSE bug 990370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567311" comment="compat-openssl097g-0.9.7g-146.22.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567312" comment="compat-openssl097g-32bit-0.9.7g-146.22.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567420" comment="libopenssl0_9_8-0.9.8j-0.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567421" comment="libopenssl0_9_8-32bit-0.9.8j-0.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567422" comment="openssl-0.9.8j-0.89.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0798</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0798" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0798" ref_url="https://www.suse.com/security/cve/CVE-2016-0798" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0617-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0627-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0628-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0637-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html" source="SUSE-SU"/>
    <description>
    Memory leak in the SRP_VBASE_get_by_user implementation in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allows remote attackers to cause a denial of service (memory consumption) by providing an invalid username in a connection attempt, related to apps/s_server.c and crypto/srp/srp_vfy.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0798/">CVE-2016-0798</cve>
	<bugzilla href="https://bugzilla.suse.com/968044">SUSE bug 968044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968265">SUSE bug 968265</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0799</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0799" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0799" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0799" ref_url="https://www.suse.com/security/cve/CVE-2016-0799" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0617-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0624-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0631-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0641-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1057-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0627-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0628-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0637-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0720-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html" source="SUSE-SU"/>
    <description>
    The fmtstr function in crypto/bio/b_print.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g improperly calculates string lengths, which allows remote attackers to cause a denial of service (overflow and out-of-bounds read) or possibly have unspecified other impact via a long string, as demonstrated by a large amount of ASN.1 data, a different vulnerability than CVE-2016-2842.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0799/">CVE-2016-0799</cve>
	<bugzilla href="https://bugzilla.suse.com/968044">SUSE bug 968044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968374">SUSE bug 968374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969517">SUSE bug 969517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989345">SUSE bug 989345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990370">SUSE bug 990370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991722">SUSE bug 991722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567311" comment="compat-openssl097g-0.9.7g-146.22.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567312" comment="compat-openssl097g-32bit-0.9.7g-146.22.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567420" comment="libopenssl0_9_8-0.9.8j-0.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567421" comment="libopenssl0_9_8-32bit-0.9.8j-0.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567422" comment="openssl-0.9.8j-0.89.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0800</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0800" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0800" ref_url="https://www.suse.com/security/cve/CVE-2016-0800" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0617-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0624-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0631-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0641-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1057-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7017297" ref_url="https://www.suse.com/support/kb/doc?id=7017297" source="SUSE-SU"/>
		<reference ref_id="TID7017315" ref_url="https://www.suse.com/support/kb/doc/?id=7017315" source="SUSE-SU"/>
		<reference ref_id="TID7017316" ref_url="https://www.suse.com/support/kb/doc/?id=7017316" source="SUSE-SU"/>
		<reference ref_id="TID7017317" ref_url="https://www.suse.com/support/kb/doc/?id=7017317" source="SUSE-SU"/>
		<reference ref_id="TID7017338" ref_url="https://www.suse.com/support/kb/doc/?id=7017338" source="SUSE-SU"/>
		<reference ref_id="TID7017374" ref_url="https://www.suse.com/support/kb/doc/?id=7017374" source="SUSE-SU"/>
		<reference ref_id="TID7021979" ref_url="https://www.suse.com/support/kb/doc/?id=7021979" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0627-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0628-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0637-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0720-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html" source="SUSE-SU"/>
    <description>
    The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a "DROWN" attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0800/">CVE-2016-0800</cve>
	<bugzilla href="https://bugzilla.suse.com/1106871">SUSE bug 1106871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961377">SUSE bug 961377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968044">SUSE bug 968044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968046">SUSE bug 968046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968888">SUSE bug 968888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969591">SUSE bug 969591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979060">SUSE bug 979060</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567311" comment="compat-openssl097g-0.9.7g-146.22.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567312" comment="compat-openssl097g-32bit-0.9.7g-146.22.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567420" comment="libopenssl0_9_8-0.9.8j-0.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567421" comment="libopenssl0_9_8-32bit-0.9.8j-0.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567422" comment="openssl-0.9.8j-0.89.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0960</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0960" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0960" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0960" ref_url="https://www.suse.com/security/cve/CVE-2016-0960" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0734-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00032.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0961, CVE-2016-0962, CVE-2016-0986, CVE-2016-0989, CVE-2016-0992, CVE-2016-1002, and CVE-2016-1005.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0960/">CVE-2016-0960</cve>
	<bugzilla href="https://bugzilla.suse.com/970547">SUSE bug 970547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567317" comment="flash-player-11.2.202.577-0.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567318" comment="flash-player-gnome-11.2.202.577-0.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567319" comment="flash-player-kde4-11.2.202.577-0.38.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0961</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0961" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0961" ref_url="https://www.suse.com/security/cve/CVE-2016-0961" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0734-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00032.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0960, CVE-2016-0962, CVE-2016-0986, CVE-2016-0989, CVE-2016-0992, CVE-2016-1002, and CVE-2016-1005.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0961/">CVE-2016-0961</cve>
	<bugzilla href="https://bugzilla.suse.com/970547">SUSE bug 970547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567317" comment="flash-player-11.2.202.577-0.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567318" comment="flash-player-gnome-11.2.202.577-0.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567319" comment="flash-player-kde4-11.2.202.577-0.38.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0962</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0962" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0962" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0962" ref_url="https://www.suse.com/security/cve/CVE-2016-0962" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0734-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00032.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0960, CVE-2016-0961, CVE-2016-0986, CVE-2016-0989, CVE-2016-0992, CVE-2016-1002, and CVE-2016-1005.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0962/">CVE-2016-0962</cve>
	<bugzilla href="https://bugzilla.suse.com/970547">SUSE bug 970547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567317" comment="flash-player-11.2.202.577-0.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567318" comment="flash-player-gnome-11.2.202.577-0.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567319" comment="flash-player-kde4-11.2.202.577-0.38.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160963" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0963</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0963" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0963" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0963" ref_url="https://www.suse.com/security/cve/CVE-2016-0963" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0734-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00032.html" source="SUSE-SU"/>
    <description>
    Integer overflow in Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0993 and CVE-2016-1010.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0963/">CVE-2016-0963</cve>
	<bugzilla href="https://bugzilla.suse.com/970547">SUSE bug 970547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567317" comment="flash-player-11.2.202.577-0.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567318" comment="flash-player-gnome-11.2.202.577-0.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567319" comment="flash-player-kde4-11.2.202.577-0.38.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0964</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0964" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0964" ref_url="https://www.suse.com/security/cve/CVE-2016-0964" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK &amp; Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0964/">CVE-2016-0964</cve>
	<bugzilla href="https://bugzilla.suse.com/965901">SUSE bug 965901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567314" comment="flash-player-11.2.202.569-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567315" comment="flash-player-gnome-11.2.202.569-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567316" comment="flash-player-kde4-11.2.202.569-0.35.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0965</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0965" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0965" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0965" ref_url="https://www.suse.com/security/cve/CVE-2016-0965" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK &amp; Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0965/">CVE-2016-0965</cve>
	<bugzilla href="https://bugzilla.suse.com/965901">SUSE bug 965901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567314" comment="flash-player-11.2.202.569-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567315" comment="flash-player-gnome-11.2.202.569-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567316" comment="flash-player-kde4-11.2.202.569-0.35.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0966</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0966" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0966" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0966" ref_url="https://www.suse.com/security/cve/CVE-2016-0966" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK &amp; Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0966/">CVE-2016-0966</cve>
	<bugzilla href="https://bugzilla.suse.com/965901">SUSE bug 965901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567314" comment="flash-player-11.2.202.569-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567315" comment="flash-player-gnome-11.2.202.569-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567316" comment="flash-player-kde4-11.2.202.569-0.35.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0967</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0967" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0967" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0967" ref_url="https://www.suse.com/security/cve/CVE-2016-0967" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK &amp; Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0967/">CVE-2016-0967</cve>
	<bugzilla href="https://bugzilla.suse.com/965901">SUSE bug 965901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567314" comment="flash-player-11.2.202.569-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567315" comment="flash-player-gnome-11.2.202.569-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567316" comment="flash-player-kde4-11.2.202.569-0.35.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160968" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0968</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0968" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0968" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0968" ref_url="https://www.suse.com/security/cve/CVE-2016-0968" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK &amp; Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0968/">CVE-2016-0968</cve>
	<bugzilla href="https://bugzilla.suse.com/965901">SUSE bug 965901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567314" comment="flash-player-11.2.202.569-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567315" comment="flash-player-gnome-11.2.202.569-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567316" comment="flash-player-kde4-11.2.202.569-0.35.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0969</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0969" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0969" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0969" ref_url="https://www.suse.com/security/cve/CVE-2016-0969" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK &amp; Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0969/">CVE-2016-0969</cve>
	<bugzilla href="https://bugzilla.suse.com/965901">SUSE bug 965901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567314" comment="flash-player-11.2.202.569-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567315" comment="flash-player-gnome-11.2.202.569-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567316" comment="flash-player-kde4-11.2.202.569-0.35.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0970</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0970" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0970" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0970" ref_url="https://www.suse.com/security/cve/CVE-2016-0970" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK &amp; Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0970/">CVE-2016-0970</cve>
	<bugzilla href="https://bugzilla.suse.com/965901">SUSE bug 965901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567314" comment="flash-player-11.2.202.569-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567315" comment="flash-player-gnome-11.2.202.569-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567316" comment="flash-player-kde4-11.2.202.569-0.35.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0971</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0971" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0971" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0971" ref_url="https://www.suse.com/security/cve/CVE-2016-0971" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK &amp; Compiler before 20.0.0.260 allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0971/">CVE-2016-0971</cve>
	<bugzilla href="https://bugzilla.suse.com/965901">SUSE bug 965901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567314" comment="flash-player-11.2.202.569-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567315" comment="flash-player-gnome-11.2.202.569-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567316" comment="flash-player-kde4-11.2.202.569-0.35.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0972</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0972" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0972" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0972" ref_url="https://www.suse.com/security/cve/CVE-2016-0972" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK &amp; Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0972/">CVE-2016-0972</cve>
	<bugzilla href="https://bugzilla.suse.com/965901">SUSE bug 965901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567314" comment="flash-player-11.2.202.569-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567315" comment="flash-player-gnome-11.2.202.569-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567316" comment="flash-player-kde4-11.2.202.569-0.35.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0973</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0973" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0973" ref_url="https://www.suse.com/security/cve/CVE-2016-0973" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the URLRequest object implementation in Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK &amp; Compiler before 20.0.0.260 allows attackers to execute arbitrary code via a URLLoader.load call, a different vulnerability than CVE-2016-0974, CVE-2016-0975, CVE-2016-0982, CVE-2016-0983, and CVE-2016-0984.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0973/">CVE-2016-0973</cve>
	<bugzilla href="https://bugzilla.suse.com/965901">SUSE bug 965901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567314" comment="flash-player-11.2.202.569-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567315" comment="flash-player-gnome-11.2.202.569-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567316" comment="flash-player-kde4-11.2.202.569-0.35.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0974</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0974" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0974" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0974" ref_url="https://www.suse.com/security/cve/CVE-2016-0974" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK &amp; Compiler before 20.0.0.260 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0973, CVE-2016-0975, CVE-2016-0982, CVE-2016-0983, and CVE-2016-0984.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0974/">CVE-2016-0974</cve>
	<bugzilla href="https://bugzilla.suse.com/965901">SUSE bug 965901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567314" comment="flash-player-11.2.202.569-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567315" comment="flash-player-gnome-11.2.202.569-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567316" comment="flash-player-kde4-11.2.202.569-0.35.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0975</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0975" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0975" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0975" ref_url="https://www.suse.com/security/cve/CVE-2016-0975" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the instanceof function in Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK &amp; Compiler before 20.0.0.260 allows attackers to execute arbitrary code by leveraging improper reference handling, a different vulnerability than CVE-2016-0973, CVE-2016-0974, CVE-2016-0982, CVE-2016-0983, and CVE-2016-0984.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0975/">CVE-2016-0975</cve>
	<bugzilla href="https://bugzilla.suse.com/965901">SUSE bug 965901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567314" comment="flash-player-11.2.202.569-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567315" comment="flash-player-gnome-11.2.202.569-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567316" comment="flash-player-kde4-11.2.202.569-0.35.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0976</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0976" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0976" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0976" ref_url="https://www.suse.com/security/cve/CVE-2016-0976" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK &amp; Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0976/">CVE-2016-0976</cve>
	<bugzilla href="https://bugzilla.suse.com/965901">SUSE bug 965901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567314" comment="flash-player-11.2.202.569-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567315" comment="flash-player-gnome-11.2.202.569-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567316" comment="flash-player-kde4-11.2.202.569-0.35.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0977</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0977" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0977" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0977" ref_url="https://www.suse.com/security/cve/CVE-2016-0977" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK &amp; Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0977/">CVE-2016-0977</cve>
	<bugzilla href="https://bugzilla.suse.com/965901">SUSE bug 965901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567314" comment="flash-player-11.2.202.569-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567315" comment="flash-player-gnome-11.2.202.569-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567316" comment="flash-player-kde4-11.2.202.569-0.35.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0978</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0978" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0978" ref_url="https://www.suse.com/security/cve/CVE-2016-0978" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK &amp; Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0978/">CVE-2016-0978</cve>
	<bugzilla href="https://bugzilla.suse.com/965901">SUSE bug 965901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567314" comment="flash-player-11.2.202.569-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567315" comment="flash-player-gnome-11.2.202.569-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567316" comment="flash-player-kde4-11.2.202.569-0.35.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0979</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0979" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0979" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0979" ref_url="https://www.suse.com/security/cve/CVE-2016-0979" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK &amp; Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0980, and CVE-2016-0981.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0979/">CVE-2016-0979</cve>
	<bugzilla href="https://bugzilla.suse.com/965901">SUSE bug 965901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567314" comment="flash-player-11.2.202.569-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567315" comment="flash-player-gnome-11.2.202.569-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567316" comment="flash-player-kde4-11.2.202.569-0.35.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0980</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0980" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0980" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0980" ref_url="https://www.suse.com/security/cve/CVE-2016-0980" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK &amp; Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, and CVE-2016-0981.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0980/">CVE-2016-0980</cve>
	<bugzilla href="https://bugzilla.suse.com/965901">SUSE bug 965901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567314" comment="flash-player-11.2.202.569-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567315" comment="flash-player-gnome-11.2.202.569-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567316" comment="flash-player-kde4-11.2.202.569-0.35.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0981</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0981" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0981" ref_url="https://www.suse.com/security/cve/CVE-2016-0981" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK &amp; Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, and CVE-2016-0980.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0981/">CVE-2016-0981</cve>
	<bugzilla href="https://bugzilla.suse.com/965901">SUSE bug 965901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567314" comment="flash-player-11.2.202.569-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567315" comment="flash-player-gnome-11.2.202.569-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567316" comment="flash-player-kde4-11.2.202.569-0.35.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0982</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0982" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0982" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0982" ref_url="https://www.suse.com/security/cve/CVE-2016-0982" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK &amp; Compiler before 20.0.0.260 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0973, CVE-2016-0974, CVE-2016-0975, CVE-2016-0983, and CVE-2016-0984.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0982/">CVE-2016-0982</cve>
	<bugzilla href="https://bugzilla.suse.com/965901">SUSE bug 965901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567314" comment="flash-player-11.2.202.569-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567315" comment="flash-player-gnome-11.2.202.569-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567316" comment="flash-player-kde4-11.2.202.569-0.35.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0983</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0983" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0983" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0983" ref_url="https://www.suse.com/security/cve/CVE-2016-0983" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK &amp; Compiler before 20.0.0.260 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0973, CVE-2016-0974, CVE-2016-0975, CVE-2016-0982, and CVE-2016-0984.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0983/">CVE-2016-0983</cve>
	<bugzilla href="https://bugzilla.suse.com/965901">SUSE bug 965901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567314" comment="flash-player-11.2.202.569-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567315" comment="flash-player-gnome-11.2.202.569-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567316" comment="flash-player-kde4-11.2.202.569-0.35.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0984</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0984" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0984" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0984" ref_url="https://www.suse.com/security/cve/CVE-2016-0984" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK &amp; Compiler before 20.0.0.260 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0973, CVE-2016-0974, CVE-2016-0975, CVE-2016-0982, and CVE-2016-0983.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0984/">CVE-2016-0984</cve>
	<bugzilla href="https://bugzilla.suse.com/965901">SUSE bug 965901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567314" comment="flash-player-11.2.202.569-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567315" comment="flash-player-gnome-11.2.202.569-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567316" comment="flash-player-kde4-11.2.202.569-0.35.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0985</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0985" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0985" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0985" ref_url="https://www.suse.com/security/cve/CVE-2016-0985" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK &amp; Compiler before 20.0.0.260 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0985/">CVE-2016-0985</cve>
	<bugzilla href="https://bugzilla.suse.com/965901">SUSE bug 965901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567314" comment="flash-player-11.2.202.569-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567315" comment="flash-player-gnome-11.2.202.569-0.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567316" comment="flash-player-kde4-11.2.202.569-0.35.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0986</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0986" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0986" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0986" ref_url="https://www.suse.com/security/cve/CVE-2016-0986" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0734-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00032.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0960, CVE-2016-0961, CVE-2016-0962, CVE-2016-0989, CVE-2016-0992, CVE-2016-1002, and CVE-2016-1005.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0986/">CVE-2016-0986</cve>
	<bugzilla href="https://bugzilla.suse.com/970547">SUSE bug 970547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567317" comment="flash-player-11.2.202.577-0.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567318" comment="flash-player-gnome-11.2.202.577-0.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567319" comment="flash-player-kde4-11.2.202.577-0.38.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0987</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0987" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0987" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0987" ref_url="https://www.suse.com/security/cve/CVE-2016-0987" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0734-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00032.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0988, CVE-2016-0990, CVE-2016-0991, CVE-2016-0994, CVE-2016-0995, CVE-2016-0996, CVE-2016-0997, CVE-2016-0998, CVE-2016-0999, and CVE-2016-1000.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0987/">CVE-2016-0987</cve>
	<bugzilla href="https://bugzilla.suse.com/970547">SUSE bug 970547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567317" comment="flash-player-11.2.202.577-0.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567318" comment="flash-player-gnome-11.2.202.577-0.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567319" comment="flash-player-kde4-11.2.202.577-0.38.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0988</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0988" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0988" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0988" ref_url="https://www.suse.com/security/cve/CVE-2016-0988" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0734-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00032.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0987, CVE-2016-0990, CVE-2016-0991, CVE-2016-0994, CVE-2016-0995, CVE-2016-0996, CVE-2016-0997, CVE-2016-0998, CVE-2016-0999, and CVE-2016-1000.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0988/">CVE-2016-0988</cve>
	<bugzilla href="https://bugzilla.suse.com/970547">SUSE bug 970547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567317" comment="flash-player-11.2.202.577-0.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567318" comment="flash-player-gnome-11.2.202.577-0.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567319" comment="flash-player-kde4-11.2.202.577-0.38.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0989</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0989" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0989" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0989" ref_url="https://www.suse.com/security/cve/CVE-2016-0989" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0734-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00032.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0960, CVE-2016-0961, CVE-2016-0962, CVE-2016-0986, CVE-2016-0992, CVE-2016-1002, and CVE-2016-1005.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0989/">CVE-2016-0989</cve>
	<bugzilla href="https://bugzilla.suse.com/970547">SUSE bug 970547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567317" comment="flash-player-11.2.202.577-0.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567318" comment="flash-player-gnome-11.2.202.577-0.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567319" comment="flash-player-kde4-11.2.202.577-0.38.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0990</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0990" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0990" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0990" ref_url="https://www.suse.com/security/cve/CVE-2016-0990" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0734-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00032.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0987, CVE-2016-0988, CVE-2016-0991, CVE-2016-0994, CVE-2016-0995, CVE-2016-0996, CVE-2016-0997, CVE-2016-0998, CVE-2016-0999, and CVE-2016-1000.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0990/">CVE-2016-0990</cve>
	<bugzilla href="https://bugzilla.suse.com/970547">SUSE bug 970547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567317" comment="flash-player-11.2.202.577-0.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567318" comment="flash-player-gnome-11.2.202.577-0.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567319" comment="flash-player-kde4-11.2.202.577-0.38.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0991</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0991" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0991" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0991" ref_url="https://www.suse.com/security/cve/CVE-2016-0991" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0734-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00032.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0987, CVE-2016-0988, CVE-2016-0990, CVE-2016-0994, CVE-2016-0995, CVE-2016-0996, CVE-2016-0997, CVE-2016-0998, CVE-2016-0999, and CVE-2016-1000.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0991/">CVE-2016-0991</cve>
	<bugzilla href="https://bugzilla.suse.com/970547">SUSE bug 970547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567317" comment="flash-player-11.2.202.577-0.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567318" comment="flash-player-gnome-11.2.202.577-0.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567319" comment="flash-player-kde4-11.2.202.577-0.38.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0992</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0992" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0992" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0992" ref_url="https://www.suse.com/security/cve/CVE-2016-0992" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0734-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00032.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0960, CVE-2016-0961, CVE-2016-0962, CVE-2016-0986, CVE-2016-0989, CVE-2016-1002, and CVE-2016-1005.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0992/">CVE-2016-0992</cve>
	<bugzilla href="https://bugzilla.suse.com/970547">SUSE bug 970547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567317" comment="flash-player-11.2.202.577-0.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567318" comment="flash-player-gnome-11.2.202.577-0.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567319" comment="flash-player-kde4-11.2.202.577-0.38.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0993</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0993" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0993" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0993" ref_url="https://www.suse.com/security/cve/CVE-2016-0993" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0734-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00032.html" source="SUSE-SU"/>
    <description>
    Integer overflow in Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0963 and CVE-2016-1010.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0993/">CVE-2016-0993</cve>
	<bugzilla href="https://bugzilla.suse.com/970547">SUSE bug 970547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567317" comment="flash-player-11.2.202.577-0.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567318" comment="flash-player-gnome-11.2.202.577-0.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567319" comment="flash-player-kde4-11.2.202.577-0.38.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0994</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0994" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0994" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0994" ref_url="https://www.suse.com/security/cve/CVE-2016-0994" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0734-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00032.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allows attackers to execute arbitrary code by using the actionCallMethod opcode with crafted arguments, a different vulnerability than CVE-2016-0987, CVE-2016-0988, CVE-2016-0990, CVE-2016-0991, CVE-2016-0995, CVE-2016-0996, CVE-2016-0997, CVE-2016-0998, CVE-2016-0999, and CVE-2016-1000.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0994/">CVE-2016-0994</cve>
	<bugzilla href="https://bugzilla.suse.com/970547">SUSE bug 970547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567317" comment="flash-player-11.2.202.577-0.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567318" comment="flash-player-gnome-11.2.202.577-0.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567319" comment="flash-player-kde4-11.2.202.577-0.38.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0995</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0995" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0995" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0995" ref_url="https://www.suse.com/security/cve/CVE-2016-0995" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0734-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00032.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0987, CVE-2016-0988, CVE-2016-0990, CVE-2016-0991, CVE-2016-0994, CVE-2016-0996, CVE-2016-0997, CVE-2016-0998, CVE-2016-0999, and CVE-2016-1000.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0995/">CVE-2016-0995</cve>
	<bugzilla href="https://bugzilla.suse.com/970547">SUSE bug 970547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567317" comment="flash-player-11.2.202.577-0.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567318" comment="flash-player-gnome-11.2.202.577-0.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567319" comment="flash-player-kde4-11.2.202.577-0.38.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0996</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0996" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0996" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0996" ref_url="https://www.suse.com/security/cve/CVE-2016-0996" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0734-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00032.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the setInterval method in Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allows attackers to execute arbitrary code via crafted arguments, a different vulnerability than CVE-2016-0987, CVE-2016-0988, CVE-2016-0990, CVE-2016-0991, CVE-2016-0994, CVE-2016-0995, CVE-2016-0997, CVE-2016-0998, CVE-2016-0999, and CVE-2016-1000.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0996/">CVE-2016-0996</cve>
	<bugzilla href="https://bugzilla.suse.com/970547">SUSE bug 970547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567317" comment="flash-player-11.2.202.577-0.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567318" comment="flash-player-gnome-11.2.202.577-0.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567319" comment="flash-player-kde4-11.2.202.577-0.38.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0997</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0997" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0997" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0997" ref_url="https://www.suse.com/security/cve/CVE-2016-0997" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0734-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00032.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0987, CVE-2016-0988, CVE-2016-0990, CVE-2016-0991, CVE-2016-0994, CVE-2016-0995, CVE-2016-0996, CVE-2016-0998, CVE-2016-0999, and CVE-2016-1000.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0997/">CVE-2016-0997</cve>
	<bugzilla href="https://bugzilla.suse.com/970547">SUSE bug 970547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567317" comment="flash-player-11.2.202.577-0.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567318" comment="flash-player-gnome-11.2.202.577-0.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567319" comment="flash-player-kde4-11.2.202.577-0.38.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160998" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0998</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0998" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0998" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0998" ref_url="https://www.suse.com/security/cve/CVE-2016-0998" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0734-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00032.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0987, CVE-2016-0988, CVE-2016-0990, CVE-2016-0991, CVE-2016-0994, CVE-2016-0995, CVE-2016-0996, CVE-2016-0997, CVE-2016-0999, and CVE-2016-1000.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0998/">CVE-2016-0998</cve>
	<bugzilla href="https://bugzilla.suse.com/970547">SUSE bug 970547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567317" comment="flash-player-11.2.202.577-0.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567318" comment="flash-player-gnome-11.2.202.577-0.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567319" comment="flash-player-kde4-11.2.202.577-0.38.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0999</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0999" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0999" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0999" ref_url="https://www.suse.com/security/cve/CVE-2016-0999" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0734-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00032.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0987, CVE-2016-0988, CVE-2016-0990, CVE-2016-0991, CVE-2016-0994, CVE-2016-0995, CVE-2016-0996, CVE-2016-0997, CVE-2016-0998, and CVE-2016-1000.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0999/">CVE-2016-0999</cve>
	<bugzilla href="https://bugzilla.suse.com/970547">SUSE bug 970547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567317" comment="flash-player-11.2.202.577-0.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567318" comment="flash-player-gnome-11.2.202.577-0.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567319" comment="flash-player-kde4-11.2.202.577-0.38.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1000</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1000" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1000" ref_url="https://www.suse.com/security/cve/CVE-2016-1000" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002159.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0734-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00032.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0987, CVE-2016-0988, CVE-2016-0990, CVE-2016-0991, CVE-2016-0994, CVE-2016-0995, CVE-2016-0996, CVE-2016-0997, CVE-2016-0998, and CVE-2016-0999.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1000/">CVE-2016-1000</cve>
	<bugzilla href="https://bugzilla.suse.com/1016168">SUSE bug 1016168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016169">SUSE bug 1016169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016366">SUSE bug 1016366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970547">SUSE bug 970547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988484">SUSE bug 988484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988486">SUSE bug 988486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988487">SUSE bug 988487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988488">SUSE bug 988488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988489">SUSE bug 988489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988491">SUSE bug 988491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988492">SUSE bug 988492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989125">SUSE bug 989125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989170">SUSE bug 989170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989172">SUSE bug 989172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989174">SUSE bug 989174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989523">SUSE bug 989523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989532">SUSE bug 989532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989569">SUSE bug 989569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989989">SUSE bug 989989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989995">SUSE bug 989995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989997">SUSE bug 989997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990847">SUSE bug 990847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997861">SUSE bug 997861</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567317" comment="flash-player-11.2.202.577-0.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567318" comment="flash-player-gnome-11.2.202.577-0.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567319" comment="flash-player-kde4-11.2.202.577-0.38.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1001</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1001" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1001" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1001" ref_url="https://www.suse.com/security/cve/CVE-2016-1001" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0734-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00032.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allows attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1001/">CVE-2016-1001</cve>
	<bugzilla href="https://bugzilla.suse.com/1016340">SUSE bug 1016340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016368">SUSE bug 1016368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016369">SUSE bug 1016369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016370">SUSE bug 1016370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970547">SUSE bug 970547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567317" comment="flash-player-11.2.202.577-0.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567318" comment="flash-player-gnome-11.2.202.577-0.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567319" comment="flash-player-kde4-11.2.202.577-0.38.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1002</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1002" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1002" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1002" ref_url="https://www.suse.com/security/cve/CVE-2016-1002" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0734-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00032.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0960, CVE-2016-0961, CVE-2016-0962, CVE-2016-0986, CVE-2016-0989, CVE-2016-0992, and CVE-2016-1005.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1002/">CVE-2016-1002</cve>
	<bugzilla href="https://bugzilla.suse.com/1014298">SUSE bug 1014298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970547">SUSE bug 970547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567317" comment="flash-player-11.2.202.577-0.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567318" comment="flash-player-gnome-11.2.202.577-0.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567319" comment="flash-player-kde4-11.2.202.577-0.38.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1005</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1005" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1005" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1005" ref_url="https://www.suse.com/security/cve/CVE-2016-1005" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0734-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00032.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allow attackers to execute arbitrary code or cause a denial of service (uninitialized pointer dereference and memory corruption) via crafted MPEG-4 data, a different vulnerability than CVE-2016-0960, CVE-2016-0961, CVE-2016-0962, CVE-2016-0986, CVE-2016-0989, CVE-2016-0992, and CVE-2016-1002.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1005/">CVE-2016-1005</cve>
	<bugzilla href="https://bugzilla.suse.com/970547">SUSE bug 970547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567317" comment="flash-player-11.2.202.577-0.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567318" comment="flash-player-gnome-11.2.202.577-0.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567319" comment="flash-player-kde4-11.2.202.577-0.38.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1010</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1010" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1010" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1010" ref_url="https://www.suse.com/security/cve/CVE-2016-1010" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0734-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00032.html" source="SUSE-SU"/>
    <description>
    Integer overflow in Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0963 and CVE-2016-0993.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1010/">CVE-2016-1010</cve>
	<bugzilla href="https://bugzilla.suse.com/970547">SUSE bug 970547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567317" comment="flash-player-11.2.202.577-0.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567318" comment="flash-player-gnome-11.2.202.577-0.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567319" comment="flash-player-kde4-11.2.202.577-0.38.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1285</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1285" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1285" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1285" ref_url="https://www.suse.com/security/cve/CVE-2016-1285" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0759-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0780-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0825-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0827-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0830-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0859-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00084.html" source="SUSE-SU"/>
    <description>
    named in ISC BIND 9.x before 9.9.8-P4 and 9.10.x before 9.10.3-P4 does not properly handle DNAME records when parsing fetch reply messages, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed packet to the rndc (aka control channel) interface, related to alist.c and sexpr.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-13"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1285/">CVE-2016-1285</cve>
	<bugzilla href="https://bugzilla.suse.com/970072">SUSE bug 970072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981200">SUSE bug 981200</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567308" comment="bind-libs-9.9.6P1-0.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567309" comment="bind-libs-32bit-9.9.6P1-0.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567310" comment="bind-utils-9.9.6P1-0.25.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1286</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1286" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1286" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1286" ref_url="https://www.suse.com/security/cve/CVE-2016-1286" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0759-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0780-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0825-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0827-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0830-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0859-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00084.html" source="SUSE-SU"/>
    <description>
    named in ISC BIND 9.x before 9.9.8-P4 and 9.10.x before 9.10.3-P4 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted signature record for a DNAME record, related to db.c and resolver.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-10-13"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1286/">CVE-2016-1286</cve>
	<bugzilla href="https://bugzilla.suse.com/970073">SUSE bug 970073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981200">SUSE bug 981200</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567308" comment="bind-libs-9.9.6P1-0.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567309" comment="bind-libs-32bit-9.9.6P1-0.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567310" comment="bind-utils-9.9.6P1-0.25.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1503</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1503" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1503" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1503" ref_url="https://www.suse.com/security/cve/CVE-2016-1503" source="SUSE CVE"/>
    <description>
    dhcpcd before 6.10.0, as used in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-04-01 and other products, mismanages option lengths, which allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow) via a malformed DHCP response, aka internal bug 26461634.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1503/">CVE-2016-1503</cve>
	<bugzilla href="https://bugzilla.suse.com/963550">SUSE bug 963550</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339313" comment="dhcpcd is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1504</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1504" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1504" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1504" ref_url="https://www.suse.com/security/cve/CVE-2016-1504" source="SUSE CVE"/>
    <description>
    dhcpcd before 6.10.0 allows remote attackers to cause a denial of service (invalid read and crash) via vectors related to the option length.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1504/">CVE-2016-1504</cve>
	<bugzilla href="https://bugzilla.suse.com/963549">SUSE bug 963549</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339313" comment="dhcpcd is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1523</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1523" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1523" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1523" ref_url="https://www.suse.com/security/cve/CVE-2016-1523" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0554-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0564-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0779-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0791-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00088.html" source="SUSE-SU"/>
    <description>
    The SillMap::readFace function in FeatureMap.cpp in Libgraphite in Graphite 2 1.2.4, as used in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.6.1, mishandles a return value, which allows remote attackers to cause a denial of service (missing initialization, NULL pointer dereference, and application crash) via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1523/">CVE-2016-1523</cve>
	<bugzilla href="https://bugzilla.suse.com/965803">SUSE bug 965803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965806">SUSE bug 965806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965807">SUSE bug 965807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965810">SUSE bug 965810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967087">SUSE bug 967087</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567287" comment="MozillaFirefox-38.6.1esr-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567288" comment="MozillaFirefox-translations-38.6.1esr-34.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1568</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1568" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1568" ref_url="https://www.suse.com/security/cve/CVE-2016-1568" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in hw/ide/ahci.c in QEMU, when built with IDE AHCI Emulation support, allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via an invalid AHCI Native Command Queuing (NCQ) AIO command.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1568/">CVE-2016-1568</cve>
	<bugzilla href="https://bugzilla.suse.com/961332">SUSE bug 961332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961333">SUSE bug 961333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567467" comment="xen-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567468" comment="xen-doc-html-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567469" comment="xen-kmp-default-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567470" comment="xen-kmp-pae-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567471" comment="xen-libs-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567472" comment="xen-libs-32bit-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567473" comment="xen-tools-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567474" comment="xen-tools-domU-4.4.4_02-32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1570</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1570" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1570" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1570" ref_url="https://www.suse.com/security/cve/CVE-2016-1570" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
    <description>
    The PV superpage functionality in arch/x86/mm.c in Xen 3.4.0, 3.4.1, and 4.1.x through 4.6.x allows local PV guests to obtain sensitive information, cause a denial of service, gain privileges, or have unspecified other impact via a crafted page identifier (MFN) to the (1) MMUEXT_MARK_SUPER or (2) MMUEXT_UNMARK_SUPER sub-op in the HYPERVISOR_mmuext_op hypercall or (3) unknown vectors related to page table updates.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1570/">CVE-2016-1570</cve>
	<bugzilla href="https://bugzilla.suse.com/960861">SUSE bug 960861</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567467" comment="xen-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567468" comment="xen-doc-html-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567469" comment="xen-kmp-default-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567470" comment="xen-kmp-pae-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567471" comment="xen-libs-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567472" comment="xen-libs-32bit-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567473" comment="xen-tools-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567474" comment="xen-tools-domU-4.4.4_02-32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1571</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1571" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1571" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1571" ref_url="https://www.suse.com/security/cve/CVE-2016-1571" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
    <description>
    The paging_invlpg function in include/asm-x86/paging.h in Xen 3.3.x through 4.6.x, when using shadow mode paging or nested virtualization is enabled, allows local HVM guest users to cause a denial of service (host crash) via a non-canonical guest address in an INVVPID instruction, which triggers a hypervisor bug check.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1571/">CVE-2016-1571</cve>
	<bugzilla href="https://bugzilla.suse.com/960861">SUSE bug 960861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960862">SUSE bug 960862</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567467" comment="xen-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567468" comment="xen-doc-html-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567469" comment="xen-kmp-default-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567470" comment="xen-kmp-pae-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567471" comment="xen-libs-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567472" comment="xen-libs-32bit-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567473" comment="xen-tools-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567474" comment="xen-tools-domU-4.4.4_02-32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1572</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1572" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1572" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1572" ref_url="https://www.suse.com/security/cve/CVE-2016-1572" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001837.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0239-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0291-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00118.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0302-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00004.html" source="SUSE-SU"/>
    <description>
    mount.ecryptfs_private.c in eCryptfs-utils does not validate mount destination filesystem types, which allows local users to gain privileges by mounting over a nonstandard filesystem, as demonstrated by /proc/$pid.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1572/">CVE-2016-1572</cve>
	<bugzilla href="https://bugzilla.suse.com/962052">SUSE bug 962052</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566407" comment="ecryptfs-utils-61-1.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566408" comment="ecryptfs-utils-32bit-61-1.35.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1621</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1621" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1621" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1621" ref_url="https://www.suse.com/security/cve/CVE-2016-1621" source="SUSE CVE"/>
    <description>
    libvpx in mediaserver in Android 4.x before 4.4.4, 5.x before 5.1.1 LMY49H, and 6.0 before 2016-03-01 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, related to libwebm/mkvparser.cpp and other files, aka internal bug 23452792.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1621/">CVE-2016-1621</cve>
	<bugzilla href="https://bugzilla.suse.com/972021">SUSE bug 972021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334008" comment="libvpx is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1714</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1714" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1714" ref_url="https://www.suse.com/security/cve/CVE-2016-1714" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
    <description>
    The (1) fw_cfg_write and (2) fw_cfg_read functions in hw/nvram/fw_cfg.c in QEMU before 2.4, when built with the Firmware Configuration device emulation support, allow guest OS users with the CAP_SYS_RAWIO privilege to cause a denial of service (out-of-bounds read or write access and process crash) or possibly execute arbitrary code via an invalid current entry value in a firmware configuration.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1714/">CVE-2016-1714</cve>
	<bugzilla href="https://bugzilla.suse.com/961691">SUSE bug 961691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961692">SUSE bug 961692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567467" comment="xen-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567468" comment="xen-doc-html-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567469" comment="xen-kmp-default-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567470" comment="xen-kmp-pae-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567471" comment="xen-libs-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567472" comment="xen-libs-32bit-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567473" comment="xen-tools-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567474" comment="xen-tools-domU-4.4.4_02-32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1922</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1922" ref_url="https://www.suse.com/security/cve/CVE-2016-1922" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
    <description>
    QEMU (aka Quick Emulator) built with the TPR optimization for 32-bit Windows guests support is vulnerable to a null pointer dereference flaw. It occurs while doing I/O port write operations via hmp interface. In that, 'current_cpu' remains null, which leads to the null pointer dereference. A user or process could use this flaw to crash the QEMU instance, resulting in DoS issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1922/">CVE-2016-1922</cve>
	<bugzilla href="https://bugzilla.suse.com/962320">SUSE bug 962320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962321">SUSE bug 962321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567467" comment="xen-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567468" comment="xen-doc-html-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567469" comment="xen-kmp-default-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567470" comment="xen-kmp-pae-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567471" comment="xen-libs-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567472" comment="xen-libs-32bit-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567473" comment="xen-tools-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567474" comment="xen-tools-domU-4.4.4_02-32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1930</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1930" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1930" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1930" ref_url="https://www.suse.com/security/cve/CVE-2016-1930" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0338-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001894.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0310-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0488-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00101.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0492-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00105.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 44.0 and Firefox ESR 38.x before 38.6 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1930/">CVE-2016-1930</cve>
	<bugzilla href="https://bugzilla.suse.com/963520">SUSE bug 963520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963632">SUSE bug 963632</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566945" comment="MozillaFirefox-38.6.0esr-31.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566946" comment="MozillaFirefox-branding-SLED-38-18.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566947" comment="MozillaFirefox-translations-38.6.0esr-31.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566948" comment="libfreebl3-3.20.2-25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566949" comment="libfreebl3-32bit-3.20.2-25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566950" comment="libsoftokn3-3.20.2-25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566951" comment="libsoftokn3-32bit-3.20.2-25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566952" comment="mozilla-nss-3.20.2-25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566953" comment="mozilla-nss-32bit-3.20.2-25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566954" comment="mozilla-nss-tools-3.20.2-25.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1935</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1935" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1935" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1935" ref_url="https://www.suse.com/security/cve/CVE-2016-1935" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0338-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001894.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0310-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0488-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00101.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0492-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00105.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the BufferSubData function in Mozilla Firefox before 44.0 and Firefox ESR 38.x before 38.6 allows remote attackers to execute arbitrary code via crafted WebGL content.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1935/">CVE-2016-1935</cve>
	<bugzilla href="https://bugzilla.suse.com/963520">SUSE bug 963520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963635">SUSE bug 963635</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566945" comment="MozillaFirefox-38.6.0esr-31.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566946" comment="MozillaFirefox-branding-SLED-38-18.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566947" comment="MozillaFirefox-translations-38.6.0esr-31.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566948" comment="libfreebl3-3.20.2-25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566949" comment="libfreebl3-32bit-3.20.2-25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566950" comment="libsoftokn3-3.20.2-25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566951" comment="libsoftokn3-32bit-3.20.2-25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566952" comment="mozilla-nss-3.20.2-25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566953" comment="mozilla-nss-32bit-3.20.2-25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566954" comment="mozilla-nss-tools-3.20.2-25.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1937</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1937" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1937" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1937" ref_url="https://www.suse.com/security/cve/CVE-2016-1937" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html" source="SUSE-SU"/>
    <description>
    The protocol-handler dialog in Mozilla Firefox before 44.0 allows remote attackers to conduct clickjacking attacks via a crafted web site that triggers a single-click action in a situation where a double-click action was intended.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1937/">CVE-2016-1937</cve>
	<bugzilla href="https://bugzilla.suse.com/963641">SUSE bug 963641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977736">SUSE bug 977736</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1938</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1938" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1938" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1938" ref_url="https://www.suse.com/security/cve/CVE-2016-1938" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0338-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001894.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html" source="SUSE-SU"/>
    <description>
    The s_mp_div function in lib/freebl/mpi/mpi.c in Mozilla Network Security Services (NSS) before 3.21, as used in Mozilla Firefox before 44.0, improperly divides numbers, which might make it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging use of the (1) mp_div or (2) mp_exptmod function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1938/">CVE-2016-1938</cve>
	<bugzilla href="https://bugzilla.suse.com/963731">SUSE bug 963731</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009566945" comment="MozillaFirefox-38.6.0esr-31.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566946" comment="MozillaFirefox-branding-SLED-38-18.24 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566947" comment="MozillaFirefox-translations-38.6.0esr-31.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566948" comment="libfreebl3-3.20.2-25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566949" comment="libfreebl3-32bit-3.20.2-25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566950" comment="libsoftokn3-3.20.2-25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566951" comment="libsoftokn3-32bit-3.20.2-25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566952" comment="mozilla-nss-3.20.2-25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566953" comment="mozilla-nss-32bit-3.20.2-25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009566954" comment="mozilla-nss-tools-3.20.2-25.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161949" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1949</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1949" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1949" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1949" ref_url="https://www.suse.com/security/cve/CVE-2016-1949" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0489-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00102.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0553-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00142.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 44.0.2 does not properly restrict the interaction between Service Workers and plugins, which allows remote attackers to bypass the Same Origin Policy via a crafted web site that triggers spoofed responses to requests that use NPAPI, as demonstrated by a request for a crossdomain.xml file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1949/">CVE-2016-1949</cve>
	<bugzilla href="https://bugzilla.suse.com/966438">SUSE bug 966438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967087">SUSE bug 967087</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1950</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1950" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1950" ref_url="https://www.suse.com/security/cve/CVE-2016-1950" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00016.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Mozilla Network Security Services (NSS) before 3.19.2.3 and 3.20.x and 3.21.x before 3.21.1, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to execute arbitrary code via crafted ASN.1 data in an X.509 certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1950/">CVE-2016-1950</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970257">SUSE bug 970257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970377">SUSE bug 970377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970378">SUSE bug 970378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970379">SUSE bug 970379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970380">SUSE bug 970380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970381">SUSE bug 970381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970431">SUSE bug 970431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970433">SUSE bug 970433</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567289" comment="MozillaFirefox-38.7.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567290" comment="MozillaFirefox-translations-38.7.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567291" comment="libfreebl3-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567292" comment="libfreebl3-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567293" comment="libsoftokn3-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567294" comment="libsoftokn3-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567295" comment="mozilla-nspr-4.12-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567296" comment="mozilla-nspr-32bit-4.12-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567297" comment="mozilla-nss-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567298" comment="mozilla-nss-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567299" comment="mozilla-nss-tools-3.20.2-28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1952</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1952" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1952" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1952" ref_url="https://www.suse.com/security/cve/CVE-2016-1952" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1952/">CVE-2016-1952</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567289" comment="MozillaFirefox-38.7.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567290" comment="MozillaFirefox-translations-38.7.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567291" comment="libfreebl3-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567292" comment="libfreebl3-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567293" comment="libsoftokn3-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567294" comment="libsoftokn3-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567295" comment="mozilla-nspr-4.12-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567296" comment="mozilla-nspr-32bit-4.12-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567297" comment="mozilla-nss-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567298" comment="mozilla-nss-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567299" comment="mozilla-nss-tools-3.20.2-28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1953</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1953" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1953" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1953" ref_url="https://www.suse.com/security/cve/CVE-2016-1953" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 45.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to js/src/jit/arm/Assembler-arm.cpp, and unknown other vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1953/">CVE-2016-1953</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567289" comment="MozillaFirefox-38.7.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567290" comment="MozillaFirefox-translations-38.7.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567291" comment="libfreebl3-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567292" comment="libfreebl3-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567293" comment="libsoftokn3-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567294" comment="libsoftokn3-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567295" comment="mozilla-nspr-4.12-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567296" comment="mozilla-nspr-32bit-4.12-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567297" comment="mozilla-nss-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567298" comment="mozilla-nss-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567299" comment="mozilla-nss-tools-3.20.2-28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1954</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1954" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1954" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1954" ref_url="https://www.suse.com/security/cve/CVE-2016-1954" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    The nsCSPContext::SendReports function in dom/security/nsCSPContext.cpp in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 does not prevent use of a non-HTTP report-uri for a Content Security Policy (CSP) violation report, which allows remote attackers to cause a denial of service (data overwrite) or possibly gain privileges by specifying a URL of a local file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1954/">CVE-2016-1954</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567289" comment="MozillaFirefox-38.7.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567290" comment="MozillaFirefox-translations-38.7.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567291" comment="libfreebl3-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567292" comment="libfreebl3-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567293" comment="libsoftokn3-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567294" comment="libsoftokn3-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567295" comment="mozilla-nspr-4.12-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567296" comment="mozilla-nspr-32bit-4.12-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567297" comment="mozilla-nss-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567298" comment="mozilla-nss-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567299" comment="mozilla-nss-tools-3.20.2-28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1957</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1957" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1957" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1957" ref_url="https://www.suse.com/security/cve/CVE-2016-1957" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    Memory leak in libstagefright in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to cause a denial of service (memory consumption) via an MPEG-4 file that triggers a delete operation on an array.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1957/">CVE-2016-1957</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567289" comment="MozillaFirefox-38.7.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567290" comment="MozillaFirefox-translations-38.7.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567291" comment="libfreebl3-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567292" comment="libfreebl3-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567293" comment="libsoftokn3-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567294" comment="libsoftokn3-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567295" comment="mozilla-nspr-4.12-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567296" comment="mozilla-nspr-32bit-4.12-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567297" comment="mozilla-nss-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567298" comment="mozilla-nss-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567299" comment="mozilla-nss-tools-3.20.2-28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1958</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1958" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1958" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1958" ref_url="https://www.suse.com/security/cve/CVE-2016-1958" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
    <description>
    browser/base/content/browser.js in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to spoof the address bar via a javascript: URL.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1958/">CVE-2016-1958</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567289" comment="MozillaFirefox-38.7.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567290" comment="MozillaFirefox-translations-38.7.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567291" comment="libfreebl3-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567292" comment="libfreebl3-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567293" comment="libsoftokn3-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567294" comment="libsoftokn3-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567295" comment="mozilla-nspr-4.12-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567296" comment="mozilla-nspr-32bit-4.12-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567297" comment="mozilla-nss-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567298" comment="mozilla-nss-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567299" comment="mozilla-nss-tools-3.20.2-28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1960</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1960" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1960" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1960" ref_url="https://www.suse.com/security/cve/CVE-2016-1960" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    Integer underflow in the nsHtml5TreeBuilder class in the HTML5 string parser in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) by leveraging mishandling of end tags, as demonstrated by incorrect SVG processing, aka ZDI-CAN-3545.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1960/">CVE-2016-1960</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567289" comment="MozillaFirefox-38.7.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567290" comment="MozillaFirefox-translations-38.7.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567291" comment="libfreebl3-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567292" comment="libfreebl3-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567293" comment="libsoftokn3-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567294" comment="libsoftokn3-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567295" comment="mozilla-nspr-4.12-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567296" comment="mozilla-nspr-32bit-4.12-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567297" comment="mozilla-nss-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567298" comment="mozilla-nss-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567299" comment="mozilla-nss-tools-3.20.2-28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1961</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1961" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1961" ref_url="https://www.suse.com/security/cve/CVE-2016-1961" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsHTMLDocument::SetBody function in dom/html/nsHTMLDocument.cpp in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to execute arbitrary code by leveraging mishandling of a root element, aka ZDI-CAN-3574.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1961/">CVE-2016-1961</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567289" comment="MozillaFirefox-38.7.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567290" comment="MozillaFirefox-translations-38.7.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567291" comment="libfreebl3-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567292" comment="libfreebl3-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567293" comment="libsoftokn3-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567294" comment="libsoftokn3-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567295" comment="mozilla-nspr-4.12-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567296" comment="mozilla-nspr-32bit-4.12-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567297" comment="mozilla-nss-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567298" comment="mozilla-nss-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567299" comment="mozilla-nss-tools-3.20.2-28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1962</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1962" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1962" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1962" ref_url="https://www.suse.com/security/cve/CVE-2016-1962" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the mozilla::DataChannelConnection::Close function in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to execute arbitrary code by leveraging mishandling of WebRTC data-channel connections.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1962/">CVE-2016-1962</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567289" comment="MozillaFirefox-38.7.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567290" comment="MozillaFirefox-translations-38.7.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567291" comment="libfreebl3-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567292" comment="libfreebl3-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567293" comment="libsoftokn3-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567294" comment="libsoftokn3-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567295" comment="mozilla-nspr-4.12-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567296" comment="mozilla-nspr-32bit-4.12-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567297" comment="mozilla-nss-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567298" comment="mozilla-nss-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567299" comment="mozilla-nss-tools-3.20.2-28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1964</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1964" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1964" ref_url="https://www.suse.com/security/cve/CVE-2016-1964" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the AtomicBaseIncDec function in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) by leveraging mishandling of XML transformations.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1964/">CVE-2016-1964</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567289" comment="MozillaFirefox-38.7.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567290" comment="MozillaFirefox-translations-38.7.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567291" comment="libfreebl3-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567292" comment="libfreebl3-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567293" comment="libsoftokn3-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567294" comment="libsoftokn3-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567295" comment="mozilla-nspr-4.12-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567296" comment="mozilla-nspr-32bit-4.12-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567297" comment="mozilla-nss-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567298" comment="mozilla-nss-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567299" comment="mozilla-nss-tools-3.20.2-28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1965</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1965" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1965" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1965" ref_url="https://www.suse.com/security/cve/CVE-2016-1965" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 mishandle a navigation sequence that returns to the original page, which allows remote attackers to spoof the address bar via vectors involving the history.back method and the location.protocol property.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1965/">CVE-2016-1965</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567289" comment="MozillaFirefox-38.7.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567290" comment="MozillaFirefox-translations-38.7.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567291" comment="libfreebl3-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567292" comment="libfreebl3-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567293" comment="libsoftokn3-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567294" comment="libsoftokn3-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567295" comment="mozilla-nspr-4.12-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567296" comment="mozilla-nspr-32bit-4.12-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567297" comment="mozilla-nss-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567298" comment="mozilla-nss-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567299" comment="mozilla-nss-tools-3.20.2-28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1966</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1966" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1966" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1966" ref_url="https://www.suse.com/security/cve/CVE-2016-1966" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
    <description>
    The nsNPObjWrapper::GetNewOrUsed function in dom/plugins/base/nsJSNPRuntime.cpp in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to execute arbitrary code or cause a denial of service (invalid pointer dereference and memory corruption) via a crafted NPAPI plugin.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1966/">CVE-2016-1966</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567289" comment="MozillaFirefox-38.7.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567290" comment="MozillaFirefox-translations-38.7.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567291" comment="libfreebl3-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567292" comment="libfreebl3-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567293" comment="libsoftokn3-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567294" comment="libsoftokn3-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567295" comment="mozilla-nspr-4.12-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567296" comment="mozilla-nspr-32bit-4.12-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567297" comment="mozilla-nss-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567298" comment="mozilla-nss-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567299" comment="mozilla-nss-tools-3.20.2-28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1974</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1974" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1974" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1974" ref_url="https://www.suse.com/security/cve/CVE-2016-1974" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    The nsScannerString::AppendUnicodeTo function in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 does not verify that memory allocation succeeds, which allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via crafted Unicode data in an HTML, XML, or SVG document.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1974/">CVE-2016-1974</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567289" comment="MozillaFirefox-38.7.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567290" comment="MozillaFirefox-translations-38.7.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567291" comment="libfreebl3-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567292" comment="libfreebl3-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567293" comment="libsoftokn3-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567294" comment="libsoftokn3-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567295" comment="mozilla-nspr-4.12-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567296" comment="mozilla-nspr-32bit-4.12-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567297" comment="mozilla-nss-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567298" comment="mozilla-nss-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567299" comment="mozilla-nss-tools-3.20.2-28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1977</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1977" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1977" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1977" ref_url="https://www.suse.com/security/cve/CVE-2016-1977" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    The Machine::Code::decoder::analysis::set_ref function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to execute arbitrary code or cause a denial of service (stack memory corruption) via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1977/">CVE-2016-1977</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567289" comment="MozillaFirefox-38.7.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567290" comment="MozillaFirefox-translations-38.7.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567291" comment="libfreebl3-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567292" comment="libfreebl3-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567293" comment="libsoftokn3-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567294" comment="libsoftokn3-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567295" comment="mozilla-nspr-4.12-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567296" comment="mozilla-nspr-32bit-4.12-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567297" comment="mozilla-nss-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567298" comment="mozilla-nss-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567299" comment="mozilla-nss-tools-3.20.2-28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1978</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1978" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1978" ref_url="https://www.suse.com/security/cve/CVE-2016-1978" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the ssl3_HandleECDHServerKeyExchange function in Mozilla Network Security Services (NSS) before 3.21, as used in Mozilla Firefox before 44.0, allows remote attackers to cause a denial of service or possibly have unspecified other impact by making an SSL (1) DHE or (2) ECDHE handshake at a time of high memory consumption.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1978/">CVE-2016-1978</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567289" comment="MozillaFirefox-38.7.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567290" comment="MozillaFirefox-translations-38.7.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567291" comment="libfreebl3-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567292" comment="libfreebl3-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567293" comment="libsoftokn3-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567294" comment="libsoftokn3-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567295" comment="mozilla-nspr-4.12-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567296" comment="mozilla-nspr-32bit-4.12-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567297" comment="mozilla-nss-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567298" comment="mozilla-nss-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567299" comment="mozilla-nss-tools-3.20.2-28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1979</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1979" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1979" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1979" ref_url="https://www.suse.com/security/cve/CVE-2016-1979" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the PK11_ImportDERPrivateKeyInfoAndReturnKey function in Mozilla Network Security Services (NSS) before 3.21.1, as used in Mozilla Firefox before 45.0, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted key data with DER encoding.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1979/">CVE-2016-1979</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567289" comment="MozillaFirefox-38.7.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567290" comment="MozillaFirefox-translations-38.7.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567291" comment="libfreebl3-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567292" comment="libfreebl3-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567293" comment="libsoftokn3-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567294" comment="libsoftokn3-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567295" comment="mozilla-nspr-4.12-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567296" comment="mozilla-nspr-32bit-4.12-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567297" comment="mozilla-nss-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567298" comment="mozilla-nss-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567299" comment="mozilla-nss-tools-3.20.2-28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1981</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1981" ref_url="https://www.suse.com/security/cve/CVE-2016-1981" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
    <description>
    QEMU (aka Quick Emulator) built with the e1000 NIC emulation support is vulnerable to an infinite loop issue. It could occur while processing data via transmit or receive descriptors, provided the initial receive/transmit descriptor head (TDH/RDH) is set outside the allocated descriptor buffer. A privileged user inside guest could use this flaw to crash the QEMU instance resulting in DoS.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1981/">CVE-2016-1981</cve>
	<bugzilla href="https://bugzilla.suse.com/963782">SUSE bug 963782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963783">SUSE bug 963783</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567467" comment="xen-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567468" comment="xen-doc-html-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567469" comment="xen-kmp-default-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567470" comment="xen-kmp-pae-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567471" comment="xen-libs-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567472" comment="xen-libs-32bit-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567473" comment="xen-tools-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567474" comment="xen-tools-domU-4.4.4_02-32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2069</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2069" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2069" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2069" ref_url="https://www.suse.com/security/cve/CVE-2016-2069" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0585-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0537-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00013.html" source="SUSE-SU"/>
    <description>
    Race condition in arch/x86/mm/tlb.c in the Linux kernel before 4.4.1 allows local users to gain privileges by triggering access to a paging structure by a different CPU.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2069/">CVE-2016-2069</cve>
	<bugzilla href="https://bugzilla.suse.com/870618">SUSE bug 870618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963767">SUSE bug 963767</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567353" comment="kernel-default-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567354" comment="kernel-default-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567355" comment="kernel-default-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567356" comment="kernel-default-extra-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567357" comment="kernel-pae-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567358" comment="kernel-pae-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567359" comment="kernel-pae-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567360" comment="kernel-pae-extra-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567361" comment="kernel-source-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567362" comment="kernel-syms-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567363" comment="kernel-trace-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567364" comment="kernel-xen-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567365" comment="kernel-xen-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567366" comment="kernel-xen-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567367" comment="kernel-xen-extra-3.0.101-71.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2070</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2070" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2070" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2070" ref_url="https://www.suse.com/security/cve/CVE-2016-2070" source="SUSE CVE"/>
    <description>
    The tcp_cwnd_reduction function in net/ipv4/tcp_input.c in the Linux kernel before 4.3.5 allows remote attackers to cause a denial of service (divide-by-zero error and system crash) via crafted TCP traffic.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-11"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2070/">CVE-2016-2070</cve>
	<bugzilla href="https://bugzilla.suse.com/963761">SUSE bug 963761</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2088</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2088" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2088" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2088" ref_url="https://www.suse.com/security/cve/CVE-2016-2088" source="SUSE CVE"/>
    <description>
    resolver.c in named in ISC BIND 9.10.x before 9.10.3-P4, when DNS cookies are enabled, allows remote attackers to cause a denial of service (INSIST assertion failure and daemon exit) via a malformed packet with more than one cookie option.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2088/">CVE-2016-2088</cve>
	<bugzilla href="https://bugzilla.suse.com/970074">SUSE bug 970074</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333958" comment="bind is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2107</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2107" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2107" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2107" ref_url="https://www.suse.com/security/cve/CVE-2016-2107" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1206-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1228-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="TID7017583" ref_url="https://www.suse.com/support/kb/doc/?id=7017583" source="SUSE-SU"/>
		<reference ref_id="TID7017793" ref_url="https://www.suse.com/support/kb/doc/?id=7017793" source="SUSE-SU"/>
		<reference ref_id="TID7017881" ref_url="https://www.suse.com/support/kb/doc/?id=7017881" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1240-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00019.html" source="SUSE-SU"/>
    <description>
    The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does not consider memory allocation during a certain padding check, which allows remote attackers to obtain sensitive cleartext information via a padding-oracle attack against an AES CBC session. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-0169.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2107/">CVE-2016-2107</cve>
	<bugzilla href="https://bugzilla.suse.com/976942">SUSE bug 976942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977584">SUSE bug 977584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977616">SUSE bug 977616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978492">SUSE bug 978492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990369">SUSE bug 990369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990370">SUSE bug 990370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334233" comment="compat-openssl097g is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2114</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2114" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2114" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2114" ref_url="https://www.suse.com/security/cve/CVE-2016-2114" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1106-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" source="SUSE-SU"/>
    <description>
    The SMB1 protocol implementation in Samba 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not recognize the "server signing = mandatory" setting, which allows man-in-the-middle attackers to spoof SMB servers by modifying the client-server data stream.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2114/">CVE-2016-2114</cve>
	<bugzilla href="https://bugzilla.suse.com/973035">SUSE bug 973035</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333940" comment="samba is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2117</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2117" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2117" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2117" ref_url="https://www.suse.com/security/cve/CVE-2016-2117" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0907-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00001.html" source="SUSE-SU"/>
    <description>
    The atl2_probe function in drivers/net/ethernet/atheros/atlx/atl2.c in the Linux kernel through 4.5.2 incorrectly enables scatter/gather I/O, which allows remote attackers to obtain sensitive information from kernel memory by reading packet data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2117/">CVE-2016-2117</cve>
	<bugzilla href="https://bugzilla.suse.com/1027179">SUSE bug 1027179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968697">SUSE bug 968697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2148</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2148" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2148" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2148" ref_url="https://www.suse.com/security/cve/CVE-2016-2148" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0135-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010220.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0135-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YB6DIPEMLRTDD3RU77DD7UYYKBEEKYDY/" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to have unspecified impact via vectors involving OPTION_6RD parsing.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2148/">CVE-2016-2148</cve>
	<bugzilla href="https://bugzilla.suse.com/970662">SUSE bug 970662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338984" comment="busybox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2176</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2176" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2176" ref_url="https://www.suse.com/security/cve/CVE-2016-2176" source="SUSE CVE"/>
		<reference ref_id="TID7017583" ref_url="https://www.suse.com/support/kb/doc/?id=7017583" source="SUSE-SU"/>
    <description>
    The X509_NAME_oneline function in crypto/x509/x509_obj.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to obtain sensitive information from process stack memory or cause a denial of service (buffer over-read) via crafted EBCDIC ASN.1 data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2176/">CVE-2016-2176</cve>
	<bugzilla href="https://bugzilla.suse.com/978224">SUSE bug 978224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990369">SUSE bug 990369</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2198</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2198" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2198" ref_url="https://www.suse.com/security/cve/CVE-2016-2198" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
    <description>
    QEMU (aka Quick Emulator) built with the USB EHCI emulation support is vulnerable to a null pointer dereference flaw. It could occur when an application attempts to write to EHCI capabilities registers. A privileged user inside quest could use this flaw to crash the QEMU process instance resulting in DoS.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2198/">CVE-2016-2198</cve>
	<bugzilla href="https://bugzilla.suse.com/964413">SUSE bug 964413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964415">SUSE bug 964415</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567467" comment="xen-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567468" comment="xen-doc-html-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567469" comment="xen-kmp-default-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567470" comment="xen-kmp-pae-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567471" comment="xen-libs-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567472" comment="xen-libs-32bit-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567473" comment="xen-tools-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567474" comment="xen-tools-domU-4.4.4_02-32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162270" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2270</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2270" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2270" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2270" ref_url="https://www.suse.com/security/cve/CVE-2016-2270" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1445-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
    <description>
    Xen 4.6.x and earlier allows local guest administrators to cause a denial of service (host reboot) via vectors related to multiple mappings of MMIO pages with different cachability settings.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2270/">CVE-2016-2270</cve>
	<bugzilla href="https://bugzilla.suse.com/965315">SUSE bug 965315</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567467" comment="xen-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567468" comment="xen-doc-html-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567469" comment="xen-kmp-default-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567470" comment="xen-kmp-pae-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567471" comment="xen-libs-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567472" comment="xen-libs-32bit-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567473" comment="xen-tools-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567474" comment="xen-tools-domU-4.4.4_02-32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2271</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2271" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2271" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2271" ref_url="https://www.suse.com/security/cve/CVE-2016-2271" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1445-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
    <description>
    VMX in Xen 4.6.x and earlier, when using an Intel or Cyrix CPU, allows local HVM guest users to cause a denial of service (guest crash) via vectors related to a non-canonical RIP.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2271/">CVE-2016-2271</cve>
	<bugzilla href="https://bugzilla.suse.com/965317">SUSE bug 965317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567467" comment="xen-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567468" comment="xen-doc-html-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567469" comment="xen-kmp-default-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567470" comment="xen-kmp-pae-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567471" comment="xen-libs-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567472" comment="xen-libs-32bit-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567473" comment="xen-tools-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567474" comment="xen-tools-domU-4.4.4_02-32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2383</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2383" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2383" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2383" ref_url="https://www.suse.com/security/cve/CVE-2016-2383" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html" source="SUSE-SU"/>
    <description>
    The adjust_branches function in kernel/bpf/verifier.c in the Linux kernel before 4.5 does not consider the delta in the backward-jump case, which allows local users to obtain sensitive information from kernel memory by creating a packet filter and then loading crafted BPF instructions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2383/">CVE-2016-2383</cve>
	<bugzilla href="https://bugzilla.suse.com/966684">SUSE bug 966684</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2384</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2384" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2384" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2384" ref_url="https://www.suse.com/security/cve/CVE-2016-2384" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1019-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1031-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1032-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1033-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1034-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1037-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1038-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1039-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1041-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1046-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in the snd_usbmidi_create function in sound/usb/midi.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (panic) or possibly have unspecified other impact via vectors involving an invalid USB descriptor.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2384/">CVE-2016-2384</cve>
	<bugzilla href="https://bugzilla.suse.com/966693">SUSE bug 966693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967773">SUSE bug 967773</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567353" comment="kernel-default-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567354" comment="kernel-default-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567355" comment="kernel-default-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567356" comment="kernel-default-extra-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567357" comment="kernel-pae-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567358" comment="kernel-pae-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567359" comment="kernel-pae-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567360" comment="kernel-pae-extra-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567361" comment="kernel-source-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567362" comment="kernel-syms-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567363" comment="kernel-trace-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567364" comment="kernel-xen-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567365" comment="kernel-xen-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567366" comment="kernel-xen-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567367" comment="kernel-xen-extra-3.0.101-71.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162391" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2391</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2391" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2391" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2391" ref_url="https://www.suse.com/security/cve/CVE-2016-2391" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1445-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2642-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00060.html" source="SUSE-SU"/>
    <description>
    The ohci_bus_start function in the USB OHCI emulation support (hw/usb/hcd-ohci.c) in QEMU allows local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors related to multiple eof_timers.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2391/">CVE-2016-2391</cve>
	<bugzilla href="https://bugzilla.suse.com/967012">SUSE bug 967012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967013">SUSE bug 967013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967101">SUSE bug 967101</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567467" comment="xen-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567468" comment="xen-doc-html-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567469" comment="xen-kmp-default-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567470" comment="xen-kmp-pae-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567471" comment="xen-libs-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567472" comment="xen-libs-32bit-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567473" comment="xen-tools-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567474" comment="xen-tools-domU-4.4.4_02-32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2392</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2392" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2392" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2392" ref_url="https://www.suse.com/security/cve/CVE-2016-2392" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2642-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00060.html" source="SUSE-SU"/>
    <description>
    The is_rndis function in the USB Net device emulator (hw/usb/dev-network.c) in QEMU before 2.5.1 does not properly validate USB configuration descriptor objects, which allows local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors involving a remote NDIS control message packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2392/">CVE-2016-2392</cve>
	<bugzilla href="https://bugzilla.suse.com/967012">SUSE bug 967012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967090">SUSE bug 967090</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567467" comment="xen-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567468" comment="xen-doc-html-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567469" comment="xen-kmp-default-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567470" comment="xen-kmp-pae-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567471" comment="xen-libs-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567472" comment="xen-libs-32bit-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567473" comment="xen-tools-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567474" comment="xen-tools-domU-4.4.4_02-32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2538</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2538" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2538" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2538" ref_url="https://www.suse.com/security/cve/CVE-2016-2538" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the USB Net device emulator (hw/usb/dev-network.c) in QEMU before 2.5.1 allow local guest OS administrators to cause a denial of service (QEMU process crash) or obtain sensitive host memory information via a remote NDIS control message packet that is mishandled in the (1) rndis_query_response, (2) rndis_set_response, or (3) usb_net_handle_dataout function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2538/">CVE-2016-2538</cve>
	<bugzilla href="https://bugzilla.suse.com/967969">SUSE bug 967969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968004">SUSE bug 968004</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567467" comment="xen-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567468" comment="xen-doc-html-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567469" comment="xen-kmp-default-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567470" comment="xen-kmp-pae-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567471" comment="xen-libs-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567472" comment="xen-libs-32bit-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567473" comment="xen-tools-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567474" comment="xen-tools-domU-4.4.4_02-32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2543</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2543" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2543" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2543" ref_url="https://www.suse.com/security/cve/CVE-2016-2543" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    The snd_seq_ioctl_remove_events function in sound/core/seq/seq_clientmgr.c in the Linux kernel before 4.4.1 does not verify FIFO assignment before proceeding with FIFO clearing, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via a crafted ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2543/">CVE-2016-2543</cve>
	<bugzilla href="https://bugzilla.suse.com/967972">SUSE bug 967972</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567353" comment="kernel-default-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567354" comment="kernel-default-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567355" comment="kernel-default-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567356" comment="kernel-default-extra-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567357" comment="kernel-pae-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567358" comment="kernel-pae-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567359" comment="kernel-pae-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567360" comment="kernel-pae-extra-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567361" comment="kernel-source-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567362" comment="kernel-syms-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567363" comment="kernel-trace-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567364" comment="kernel-xen-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567365" comment="kernel-xen-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567366" comment="kernel-xen-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567367" comment="kernel-xen-extra-3.0.101-71.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2544</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2544" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2544" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2544" ref_url="https://www.suse.com/security/cve/CVE-2016-2544" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    Race condition in the queue_delete function in sound/core/seq/seq_queue.c in the Linux kernel before 4.4.1 allows local users to cause a denial of service (use-after-free and system crash) by making an ioctl call at a certain time.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2544/">CVE-2016-2544</cve>
	<bugzilla href="https://bugzilla.suse.com/967973">SUSE bug 967973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567353" comment="kernel-default-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567354" comment="kernel-default-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567355" comment="kernel-default-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567356" comment="kernel-default-extra-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567357" comment="kernel-pae-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567358" comment="kernel-pae-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567359" comment="kernel-pae-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567360" comment="kernel-pae-extra-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567361" comment="kernel-source-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567362" comment="kernel-syms-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567363" comment="kernel-trace-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567364" comment="kernel-xen-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567365" comment="kernel-xen-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567366" comment="kernel-xen-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567367" comment="kernel-xen-extra-3.0.101-71.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2545</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2545" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2545" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2545" ref_url="https://www.suse.com/security/cve/CVE-2016-2545" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    The snd_timer_interrupt function in sound/core/timer.c in the Linux kernel before 4.4.1 does not properly maintain a certain linked list, which allows local users to cause a denial of service (race condition and system crash) via a crafted ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2545/">CVE-2016-2545</cve>
	<bugzilla href="https://bugzilla.suse.com/967974">SUSE bug 967974</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567353" comment="kernel-default-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567354" comment="kernel-default-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567355" comment="kernel-default-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567356" comment="kernel-default-extra-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567357" comment="kernel-pae-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567358" comment="kernel-pae-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567359" comment="kernel-pae-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567360" comment="kernel-pae-extra-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567361" comment="kernel-source-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567362" comment="kernel-syms-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567363" comment="kernel-trace-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567364" comment="kernel-xen-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567365" comment="kernel-xen-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567366" comment="kernel-xen-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567367" comment="kernel-xen-extra-3.0.101-71.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2546</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2546" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2546" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2546" ref_url="https://www.suse.com/security/cve/CVE-2016-2546" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    sound/core/timer.c in the Linux kernel before 4.4.1 uses an incorrect type of mutex, which allows local users to cause a denial of service (race condition, use-after-free, and system crash) via a crafted ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2546/">CVE-2016-2546</cve>
	<bugzilla href="https://bugzilla.suse.com/967975">SUSE bug 967975</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567353" comment="kernel-default-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567354" comment="kernel-default-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567355" comment="kernel-default-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567356" comment="kernel-default-extra-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567357" comment="kernel-pae-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567358" comment="kernel-pae-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567359" comment="kernel-pae-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567360" comment="kernel-pae-extra-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567361" comment="kernel-source-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567362" comment="kernel-syms-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567363" comment="kernel-trace-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567364" comment="kernel-xen-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567365" comment="kernel-xen-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567366" comment="kernel-xen-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567367" comment="kernel-xen-extra-3.0.101-71.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2547</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2547" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2547" ref_url="https://www.suse.com/security/cve/CVE-2016-2547" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    sound/core/timer.c in the Linux kernel before 4.4.1 employs a locking approach that does not consider slave timer instances, which allows local users to cause a denial of service (race condition, use-after-free, and system crash) via a crafted ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2547/">CVE-2016-2547</cve>
	<bugzilla href="https://bugzilla.suse.com/968011">SUSE bug 968011</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567353" comment="kernel-default-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567354" comment="kernel-default-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567355" comment="kernel-default-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567356" comment="kernel-default-extra-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567357" comment="kernel-pae-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567358" comment="kernel-pae-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567359" comment="kernel-pae-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567360" comment="kernel-pae-extra-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567361" comment="kernel-source-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567362" comment="kernel-syms-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567363" comment="kernel-trace-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567364" comment="kernel-xen-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567365" comment="kernel-xen-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567366" comment="kernel-xen-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567367" comment="kernel-xen-extra-3.0.101-71.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2548</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2548" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2548" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2548" ref_url="https://www.suse.com/security/cve/CVE-2016-2548" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    sound/core/timer.c in the Linux kernel before 4.4.1 retains certain linked lists after a close or stop action, which allows local users to cause a denial of service (system crash) via a crafted ioctl call, related to the (1) snd_timer_close and (2) _snd_timer_stop functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2548/">CVE-2016-2548</cve>
	<bugzilla href="https://bugzilla.suse.com/968012">SUSE bug 968012</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567353" comment="kernel-default-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567354" comment="kernel-default-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567355" comment="kernel-default-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567356" comment="kernel-default-extra-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567357" comment="kernel-pae-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567358" comment="kernel-pae-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567359" comment="kernel-pae-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567360" comment="kernel-pae-extra-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567361" comment="kernel-source-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567362" comment="kernel-syms-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567363" comment="kernel-trace-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567364" comment="kernel-xen-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567365" comment="kernel-xen-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567366" comment="kernel-xen-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567367" comment="kernel-xen-extra-3.0.101-71.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2549</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2549" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2549" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2549" ref_url="https://www.suse.com/security/cve/CVE-2016-2549" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    sound/core/hrtimer.c in the Linux kernel before 4.4.1 does not prevent recursive callback access, which allows local users to cause a denial of service (deadlock) via a crafted ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2549/">CVE-2016-2549</cve>
	<bugzilla href="https://bugzilla.suse.com/968013">SUSE bug 968013</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567353" comment="kernel-default-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567354" comment="kernel-default-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567355" comment="kernel-default-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567356" comment="kernel-default-extra-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567357" comment="kernel-pae-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567358" comment="kernel-pae-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567359" comment="kernel-pae-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567360" comment="kernel-pae-extra-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567361" comment="kernel-source-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567362" comment="kernel-syms-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567363" comment="kernel-trace-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567364" comment="kernel-xen-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567365" comment="kernel-xen-base-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567366" comment="kernel-xen-devel-3.0.101-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567367" comment="kernel-xen-extra-3.0.101-71.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2553</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2553" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2553" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2553" ref_url="https://www.suse.com/security/cve/CVE-2016-2553" source="SUSE CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: This candidate was withdrawn by its CNA.  Further investigation showed that it was not a security issue.  Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2553/">CVE-2016-2553</cve>
	<bugzilla href="https://bugzilla.suse.com/968697">SUSE bug 968697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162785" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2785</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2785" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2785" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2785" ref_url="https://www.suse.com/security/cve/CVE-2016-2785" source="SUSE CVE"/>
    <description>
    Puppet Server before 2.3.2 and Ruby puppetmaster in Puppet 4.x before 4.4.2 and in Puppet Agent before 1.4.2 might allow remote attackers to bypass intended auth.conf access restrictions by leveraging incorrect URL decoding.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2785/">CVE-2016-2785</cve>
	<bugzilla href="https://bugzilla.suse.com/977471">SUSE bug 977471</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334293" comment="puppet is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2790</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2790" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2790" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2790" ref_url="https://www.suse.com/security/cve/CVE-2016-2790" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    The graphite2::TtfUtil::GetTableInfo function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, does not initialize memory for an unspecified data structure, which allows remote attackers to cause a denial of service or possibly have unknown other impact via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2790/">CVE-2016-2790</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567289" comment="MozillaFirefox-38.7.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567290" comment="MozillaFirefox-translations-38.7.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567291" comment="libfreebl3-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567292" comment="libfreebl3-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567293" comment="libsoftokn3-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567294" comment="libsoftokn3-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567295" comment="mozilla-nspr-4.12-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567296" comment="mozilla-nspr-32bit-4.12-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567297" comment="mozilla-nss-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567298" comment="mozilla-nss-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567299" comment="mozilla-nss-tools-3.20.2-28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2791</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2791" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2791" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2791" ref_url="https://www.suse.com/security/cve/CVE-2016-2791" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    The graphite2::GlyphCache::glyph function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2791/">CVE-2016-2791</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567289" comment="MozillaFirefox-38.7.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567290" comment="MozillaFirefox-translations-38.7.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567291" comment="libfreebl3-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567292" comment="libfreebl3-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567293" comment="libsoftokn3-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567294" comment="libsoftokn3-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567295" comment="mozilla-nspr-4.12-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567296" comment="mozilla-nspr-32bit-4.12-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567297" comment="mozilla-nss-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567298" comment="mozilla-nss-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567299" comment="mozilla-nss-tools-3.20.2-28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2792</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2792" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2792" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2792" ref_url="https://www.suse.com/security/cve/CVE-2016-2792" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    The graphite2::Slot::getAttr function in Slot.cpp in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font, a different vulnerability than CVE-2016-2800.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2792/">CVE-2016-2792</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567289" comment="MozillaFirefox-38.7.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567290" comment="MozillaFirefox-translations-38.7.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567291" comment="libfreebl3-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567292" comment="libfreebl3-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567293" comment="libsoftokn3-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567294" comment="libsoftokn3-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567295" comment="mozilla-nspr-4.12-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567296" comment="mozilla-nspr-32bit-4.12-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567297" comment="mozilla-nss-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567298" comment="mozilla-nss-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567299" comment="mozilla-nss-tools-3.20.2-28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2793</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2793" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2793" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2793" ref_url="https://www.suse.com/security/cve/CVE-2016-2793" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    CachedCmap.cpp in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2793/">CVE-2016-2793</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567289" comment="MozillaFirefox-38.7.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567290" comment="MozillaFirefox-translations-38.7.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567291" comment="libfreebl3-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567292" comment="libfreebl3-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567293" comment="libsoftokn3-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567294" comment="libsoftokn3-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567295" comment="mozilla-nspr-4.12-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567296" comment="mozilla-nspr-32bit-4.12-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567297" comment="mozilla-nss-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567298" comment="mozilla-nss-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567299" comment="mozilla-nss-tools-3.20.2-28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2794</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2794" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2794" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2794" ref_url="https://www.suse.com/security/cve/CVE-2016-2794" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    The graphite2::TtfUtil::CmapSubtable12NextCodepoint function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2794/">CVE-2016-2794</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567289" comment="MozillaFirefox-38.7.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567290" comment="MozillaFirefox-translations-38.7.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567291" comment="libfreebl3-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567292" comment="libfreebl3-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567293" comment="libsoftokn3-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567294" comment="libsoftokn3-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567295" comment="mozilla-nspr-4.12-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567296" comment="mozilla-nspr-32bit-4.12-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567297" comment="mozilla-nss-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567298" comment="mozilla-nss-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567299" comment="mozilla-nss-tools-3.20.2-28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2795</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2795" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2795" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2795" ref_url="https://www.suse.com/security/cve/CVE-2016-2795" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    The graphite2::FileFace::get_table_fn function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, does not initialize memory for an unspecified data structure, which allows remote attackers to cause a denial of service or possibly have unknown other impact via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2795/">CVE-2016-2795</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567289" comment="MozillaFirefox-38.7.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567290" comment="MozillaFirefox-translations-38.7.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567291" comment="libfreebl3-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567292" comment="libfreebl3-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567293" comment="libsoftokn3-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567294" comment="libsoftokn3-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567295" comment="mozilla-nspr-4.12-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567296" comment="mozilla-nspr-32bit-4.12-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567297" comment="mozilla-nss-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567298" comment="mozilla-nss-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567299" comment="mozilla-nss-tools-3.20.2-28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2796</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2796" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2796" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2796" ref_url="https://www.suse.com/security/cve/CVE-2016-2796" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the graphite2::vm::Machine::Code::Code function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2796/">CVE-2016-2796</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567289" comment="MozillaFirefox-38.7.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567290" comment="MozillaFirefox-translations-38.7.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567291" comment="libfreebl3-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567292" comment="libfreebl3-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567293" comment="libsoftokn3-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567294" comment="libsoftokn3-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567295" comment="mozilla-nspr-4.12-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567296" comment="mozilla-nspr-32bit-4.12-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567297" comment="mozilla-nss-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567298" comment="mozilla-nss-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567299" comment="mozilla-nss-tools-3.20.2-28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2797</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2797" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2797" ref_url="https://www.suse.com/security/cve/CVE-2016-2797" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    The graphite2::TtfUtil::CmapSubtable12Lookup function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font, a different vulnerability than CVE-2016-2801.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2797/">CVE-2016-2797</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567289" comment="MozillaFirefox-38.7.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567290" comment="MozillaFirefox-translations-38.7.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567291" comment="libfreebl3-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567292" comment="libfreebl3-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567293" comment="libsoftokn3-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567294" comment="libsoftokn3-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567295" comment="mozilla-nspr-4.12-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567296" comment="mozilla-nspr-32bit-4.12-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567297" comment="mozilla-nss-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567298" comment="mozilla-nss-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567299" comment="mozilla-nss-tools-3.20.2-28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2798</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2798" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2798" ref_url="https://www.suse.com/security/cve/CVE-2016-2798" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    The graphite2::GlyphCache::Loader::Loader function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2798/">CVE-2016-2798</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567289" comment="MozillaFirefox-38.7.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567290" comment="MozillaFirefox-translations-38.7.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567291" comment="libfreebl3-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567292" comment="libfreebl3-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567293" comment="libsoftokn3-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567294" comment="libsoftokn3-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567295" comment="mozilla-nspr-4.12-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567296" comment="mozilla-nspr-32bit-4.12-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567297" comment="mozilla-nss-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567298" comment="mozilla-nss-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567299" comment="mozilla-nss-tools-3.20.2-28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2799</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2799" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2799" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2799" ref_url="https://www.suse.com/security/cve/CVE-2016-2799" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the graphite2::Slot::setAttr function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2799/">CVE-2016-2799</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567289" comment="MozillaFirefox-38.7.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567290" comment="MozillaFirefox-translations-38.7.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567291" comment="libfreebl3-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567292" comment="libfreebl3-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567293" comment="libsoftokn3-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567294" comment="libsoftokn3-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567295" comment="mozilla-nspr-4.12-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567296" comment="mozilla-nspr-32bit-4.12-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567297" comment="mozilla-nss-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567298" comment="mozilla-nss-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567299" comment="mozilla-nss-tools-3.20.2-28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2800</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2800" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2800" ref_url="https://www.suse.com/security/cve/CVE-2016-2800" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    The graphite2::Slot::getAttr function in Slot.cpp in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font, a different vulnerability than CVE-2016-2792.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2800/">CVE-2016-2800</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567289" comment="MozillaFirefox-38.7.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567290" comment="MozillaFirefox-translations-38.7.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567291" comment="libfreebl3-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567292" comment="libfreebl3-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567293" comment="libsoftokn3-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567294" comment="libsoftokn3-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567295" comment="mozilla-nspr-4.12-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567296" comment="mozilla-nspr-32bit-4.12-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567297" comment="mozilla-nss-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567298" comment="mozilla-nss-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567299" comment="mozilla-nss-tools-3.20.2-28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2801</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2801" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2801" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2801" ref_url="https://www.suse.com/security/cve/CVE-2016-2801" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    The graphite2::TtfUtil::CmapSubtable12Lookup function in TtfUtil.cpp in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font, a different vulnerability than CVE-2016-2797.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2801/">CVE-2016-2801</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567289" comment="MozillaFirefox-38.7.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567290" comment="MozillaFirefox-translations-38.7.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567291" comment="libfreebl3-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567292" comment="libfreebl3-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567293" comment="libsoftokn3-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567294" comment="libsoftokn3-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567295" comment="mozilla-nspr-4.12-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567296" comment="mozilla-nspr-32bit-4.12-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567297" comment="mozilla-nss-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567298" comment="mozilla-nss-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567299" comment="mozilla-nss-tools-3.20.2-28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2802</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2802" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2802" ref_url="https://www.suse.com/security/cve/CVE-2016-2802" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    The graphite2::TtfUtil::CmapSubtable4NextCodepoint function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2802/">CVE-2016-2802</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567289" comment="MozillaFirefox-38.7.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567290" comment="MozillaFirefox-translations-38.7.0esr-37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567291" comment="libfreebl3-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567292" comment="libfreebl3-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567293" comment="libsoftokn3-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567294" comment="libsoftokn3-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567295" comment="mozilla-nspr-4.12-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567296" comment="mozilla-nspr-32bit-4.12-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567297" comment="mozilla-nss-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567298" comment="mozilla-nss-32bit-3.20.2-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567299" comment="mozilla-nss-tools-3.20.2-28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2804</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2804" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2804" ref_url="https://www.suse.com/security/cve/CVE-2016-2804" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1251-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 46.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2804/">CVE-2016-2804</cve>
	<bugzilla href="https://bugzilla.suse.com/977373">SUSE bug 977373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2806</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2806" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2806" ref_url="https://www.suse.com/security/cve/CVE-2016-2806" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1251-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 46.0 and Firefox ESR 45.x before 45.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2806/">CVE-2016-2806</cve>
	<bugzilla href="https://bugzilla.suse.com/977375">SUSE bug 977375</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2809</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2809" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2809" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2809" ref_url="https://www.suse.com/security/cve/CVE-2016-2809" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1251-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html" source="SUSE-SU"/>
    <description>
    The Mozilla Maintenance Service updater in Mozilla Firefox before 46.0 on Windows allows user-assisted remote attackers to delete arbitrary files by leveraging certain local file execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2809/">CVE-2016-2809</cve>
	<bugzilla href="https://bugzilla.suse.com/977333">SUSE bug 977333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977377">SUSE bug 977377</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2810</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2810" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2810" ref_url="https://www.suse.com/security/cve/CVE-2016-2810" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1251-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 46.0 on Android before 5.0 allows attackers to bypass intended Signature access requirements via a crafted application that leverages content-provider permissions, as demonstrated by reading the browser history or a saved password.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2810/">CVE-2016-2810</cve>
	<bugzilla href="https://bugzilla.suse.com/977333">SUSE bug 977333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977378">SUSE bug 977378</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2811</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2811" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2811" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2811" ref_url="https://www.suse.com/security/cve/CVE-2016-2811" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1251-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the ServiceWorkerInfo class in the Service Worker subsystem in Mozilla Firefox before 46.0 allows remote attackers to execute arbitrary code via vectors related to the BeginReading method.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2811/">CVE-2016-2811</cve>
	<bugzilla href="https://bugzilla.suse.com/977379">SUSE bug 977379</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2812</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2812" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2812" ref_url="https://www.suse.com/security/cve/CVE-2016-2812" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1251-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html" source="SUSE-SU"/>
    <description>
    Race condition in the get implementation in the ServiceWorkerManager class in the Service Worker subsystem in Mozilla Firefox before 46.0 allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2812/">CVE-2016-2812</cve>
	<bugzilla href="https://bugzilla.suse.com/977379">SUSE bug 977379</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2813</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2813" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2813" ref_url="https://www.suse.com/security/cve/CVE-2016-2813" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1251-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 46.0 on Android does not properly restrict JavaScript access to orientation and motion data, which allows remote attackers to obtain sensitive information about a device's physical environment, and possibly discover PIN values, via a crafted web site, a similar issue to CVE-2016-1780.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2813/">CVE-2016-2813</cve>
	<bugzilla href="https://bugzilla.suse.com/977333">SUSE bug 977333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977380">SUSE bug 977380</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2816</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2816" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2816" ref_url="https://www.suse.com/security/cve/CVE-2016-2816" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1251-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 46.0 allows remote attackers to bypass the Content Security Policy (CSP) protection mechanism via the multipart/x-mixed-replace content type.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2816/">CVE-2016-2816</cve>
	<bugzilla href="https://bugzilla.suse.com/977382">SUSE bug 977382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2817</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2817" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2817" ref_url="https://www.suse.com/security/cve/CVE-2016-2817" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1251-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html" source="SUSE-SU"/>
    <description>
    The WebExtension sandbox feature in browser/components/extensions/ext-tabs.js in Mozilla Firefox before 46.0 does not properly restrict principal inheritance during chrome.tabs.create and chrome.tabs.update API calls, which allows remote attackers to conduct Universal XSS (UXSS) attacks via a crafted extension that accesses a (1) javascript: or (2) data: URL.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2817/">CVE-2016-2817</cve>
	<bugzilla href="https://bugzilla.suse.com/977384">SUSE bug 977384</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162820" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2820</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2820" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2820" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2820" ref_url="https://www.suse.com/security/cve/CVE-2016-2820" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1251-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html" source="SUSE-SU"/>
    <description>
    The Firefox Health Reports (aka FHR or about:healthreport) feature in Mozilla Firefox before 46.0 does not properly restrict the origin of events, which makes it easier for remote attackers to modify sharing preferences by leveraging access to the remote-report IFRAME element.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2820/">CVE-2016-2820</cve>
	<bugzilla href="https://bugzilla.suse.com/977388">SUSE bug 977388</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2841</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2841" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2841" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2841" ref_url="https://www.suse.com/security/cve/CVE-2016-2841" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1445-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
    <description>
    The ne2000_receive function in the NE2000 NIC emulation support (hw/net/ne2000.c) in QEMU before 2.5.1 allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via crafted values for the PSTART and PSTOP registers, involving ring buffer control.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2841/">CVE-2016-2841</cve>
	<bugzilla href="https://bugzilla.suse.com/969350">SUSE bug 969350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969351">SUSE bug 969351</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009567467" comment="xen-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567468" comment="xen-doc-html-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567469" comment="xen-kmp-default-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567470" comment="xen-kmp-pae-4.4.4_02_3.0.101_68-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567471" comment="xen-libs-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567472" comment="xen-libs-32bit-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567473" comment="xen-tools-4.4.4_02-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567474" comment="xen-tools-domU-4.4.4_02-32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2851</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2851" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2851" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2851" ref_url="https://www.suse.com/security/cve/CVE-2016-2851" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001919.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0708-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0732-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00030.html" source="SUSE-SU"/>
    <description>
    Integer overflow in proto.c in libotr before 4.1.1 on 64-bit platforms allows remote attackers to cause a denial of service (memory corruption and application crash) or execute arbitrary code via a series of large OTR messages, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2851/">CVE-2016-2851</cve>
	<bugzilla href="https://bugzilla.suse.com/969785">SUSE bug 969785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009567388" comment="libotr2-3.2.0-10.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3135</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3135" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3135" ref_url="https://www.suse.com/security/cve/CVE-2016-3135" source="SUSE CVE"/>
    <description>
    Integer overflow in the xt_alloc_table_info function in net/netfilter/x_tables.c in the Linux kernel through 4.5.2 on 32-bit platforms allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3135/">CVE-2016-3135</cve>
	<bugzilla href="https://bugzilla.suse.com/970904">SUSE bug 970904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971794">SUSE bug 971794</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3136</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3136" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3136" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3136" ref_url="https://www.suse.com/security/cve/CVE-2016-3136" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
    <description>
    The mct_u232_msr_to_state function in drivers/usb/serial/mct_u232.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted USB device without two interrupt-in endpoint descriptors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3136/">CVE-2016-3136</cve>
	<bugzilla href="https://bugzilla.suse.com/970955">SUSE bug 970955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3177</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3177" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3177" ref_url="https://www.suse.com/security/cve/CVE-2016-3177" source="SUSE CVE"/>
    <description>
    Multiple use-after-free and double-free vulnerabilities in gifcolor.c in GIFLIB 5.1.2 have unspecified impact and attack vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3177/">CVE-2016-3177</cve>
	<bugzilla href="https://bugzilla.suse.com/971555">SUSE bug 971555</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338895" comment="giflib is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3190</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3190" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3190" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3190" ref_url="https://www.suse.com/security/cve/CVE-2016-3190" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1007-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-04/msg00029.html" source="SUSE-SU"/>
    <description>
    The fill_xrgb32_lerp_opaque_spans function in cairo-image-compositor.c in cairo before 1.14.2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a negative span length.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3190/">CVE-2016-3190</cve>
	<bugzilla href="https://bugzilla.suse.com/971964">SUSE bug 971964</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334276" comment="cairo is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3624</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3624" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3624" ref_url="https://www.suse.com/security/cve/CVE-2016-3624" source="SUSE CVE"/>
    <description>
    The cvtClump function in the rgb2ycbcr tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds write) by setting the "-v" option to -1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3624/">CVE-2016-3624</cve>
	<bugzilla href="https://bugzilla.suse.com/974617">SUSE bug 974617</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334077" comment="tiff is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3625</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3625" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3625" ref_url="https://www.suse.com/security/cve/CVE-2016-3625" source="SUSE CVE"/>
    <description>
    tif_read.c in the tiff2bw tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TIFF image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3625/">CVE-2016-3625</cve>
	<bugzilla href="https://bugzilla.suse.com/974615">SUSE bug 974615</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334077" comment="tiff is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3633</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3633" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3633" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3633" ref_url="https://www.suse.com/security/cve/CVE-2016-3633" source="SUSE CVE"/>
    <description>
    The setrow function in the thumbnail tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds read) via vectors related to the src variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3633/">CVE-2016-3633</cve>
	<bugzilla href="https://bugzilla.suse.com/974841">SUSE bug 974841</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334077" comment="tiff is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3634</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3634" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3634" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3634" ref_url="https://www.suse.com/security/cve/CVE-2016-3634" source="SUSE CVE"/>
    <description>
    The tagCompare function in tif_dirinfo.c in the thumbnail tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds read) via vectors related to field_tag matching.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3634/">CVE-2016-3634</cve>
	<bugzilla href="https://bugzilla.suse.com/974839">SUSE bug 974839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334077" comment="tiff is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3658</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3658" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3658" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3658" ref_url="https://www.suse.com/security/cve/CVE-2016-3658" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002537.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0074-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00047.html" source="SUSE-SU"/>
    <description>
    The TIFFWriteDirectoryTagLongLong8Array function in tif_dirwrite.c in the tiffset tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds read) via vectors involving the ma variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3658/">CVE-2016-3658</cve>
	<bugzilla href="https://bugzilla.suse.com/974840">SUSE bug 974840</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334077" comment="tiff is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3689</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3689" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3689" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3689" ref_url="https://www.suse.com/security/cve/CVE-2016-3689" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
    <description>
    The ims_pcu_parse_cdc_data function in drivers/input/misc/ims-pcu.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (system crash) via a USB device without both a master and a slave interface.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3689/">CVE-2016-3689</cve>
	<bugzilla href="https://bugzilla.suse.com/971628">SUSE bug 971628</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3713</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3713" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3713" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3713" ref_url="https://www.suse.com/security/cve/CVE-2016-3713" source="SUSE CVE"/>
    <description>
    The msr_mtrr_valid function in arch/x86/kvm/mtrr.c in the Linux kernel before 4.6.1 supports MSR 0x2f8, which allows guest OS users to read or write to the kvm_arch_vcpu data structure, and consequently obtain sensitive information or cause a denial of service (system crash), via a crafted ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-12-25"/>
	<updated date="2021-12-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3713/">CVE-2016-3713</cve>
	<bugzilla href="https://bugzilla.suse.com/979715">SUSE bug 979715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985132">SUSE bug 985132</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3951</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3951" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3951" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3951" ref_url="https://www.suse.com/security/cve/CVE-2016-3951" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in drivers/net/usb/cdc_ncm.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (system crash) or possibly have unspecified other impact by inserting a USB device with an invalid USB descriptor.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-18"/>
	<updated date="2021-11-18"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3951/">CVE-2016-3951</cve>
	<bugzilla href="https://bugzilla.suse.com/974418">SUSE bug 974418</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3991</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3991" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3991" ref_url="https://www.suse.com/security/cve/CVE-2016-3991" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002326.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2275-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2375-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2525-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00048.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the loadImage function in the tiffcrop tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds write) or execute arbitrary code via a crafted TIFF image with zero tiles.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3991/">CVE-2016-3991</cve>
	<bugzilla href="https://bugzilla.suse.com/975070">SUSE bug 975070</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334077" comment="tiff is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4024</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4024" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4024" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4024" ref_url="https://www.suse.com/security/cve/CVE-2016-4024" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1330-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00076.html" source="SUSE-SU"/>
    <description>
    Integer overflow in imlib2 before 1.4.9 on 32-bit platforms allows remote attackers to execute arbitrary code via large dimensions in an image, which triggers an out-of-bounds heap memory write operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4024/">CVE-2016-4024</cve>
	<bugzilla href="https://bugzilla.suse.com/975703">SUSE bug 975703</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339303" comment="imlib2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4070</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4070" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4070" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4070" ref_url="https://www.suse.com/security/cve/CVE-2016-4070" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1277-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1638-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1274-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00056.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** Integer overflow in the php_raw_url_encode function in ext/standard/url.c in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allows remote attackers to cause a denial of service (application crash) via a long string to the rawurlencode function. NOTE: the vendor says "Not sure if this qualifies as security issue (probably not)."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-10-31"/>
	<updated date="2021-10-31"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4070/">CVE-2016-4070</cve>
	<bugzilla href="https://bugzilla.suse.com/976997">SUSE bug 976997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334068" comment="pcre is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4353</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4353" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4353" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4353" ref_url="https://www.suse.com/security/cve/CVE-2016-4353" source="SUSE CVE"/>
    <description>
    ber-decoder.c in Libksba before 1.3.3 does not properly handle decoder stack overflows, which allows remote attackers to cause a denial of service (abort) via crafted BER data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4353/">CVE-2016-4353</cve>
	<bugzilla href="https://bugzilla.suse.com/977980">SUSE bug 977980</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338897" comment="libksba is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4354</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4354" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4354" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4354" ref_url="https://www.suse.com/security/cve/CVE-2016-4354" source="SUSE CVE"/>
    <description>
    ber-decoder.c in Libksba before 1.3.3 uses an incorrect integer data type, which allows remote attackers to cause a denial of service (crash) via crafted BER data, which leads to a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4354/">CVE-2016-4354</cve>
	<bugzilla href="https://bugzilla.suse.com/977982">SUSE bug 977982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977989">SUSE bug 977989</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338897" comment="libksba is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4355</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4355" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4355" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4355" ref_url="https://www.suse.com/security/cve/CVE-2016-4355" source="SUSE CVE"/>
    <description>
    Multiple integer overflows in ber-decoder.c in Libksba before 1.3.3 allow remote attackers to cause a denial of service (crash) via crafted BER data, which leads to a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4355/">CVE-2016-4355</cve>
	<bugzilla href="https://bugzilla.suse.com/977982">SUSE bug 977982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977989">SUSE bug 977989</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338897" comment="libksba is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4356</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4356" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4356" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4356" ref_url="https://www.suse.com/security/cve/CVE-2016-4356" source="SUSE CVE"/>
    <description>
    The append_utf8_value function in the DN decoder (dn.c) in Libksba before 1.3.3 allows remote attackers to cause a denial of service (out-of-bounds read) by clearing the high bit of the byte after invalid utf-8 encoded data.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4356/">CVE-2016-4356</cve>
	<bugzilla href="https://bugzilla.suse.com/977977">SUSE bug 977977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979261">SUSE bug 979261</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338897" comment="libksba is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4440</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4440" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4440" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4440" ref_url="https://www.suse.com/security/cve/CVE-2016-4440" source="SUSE CVE"/>
    <description>
    arch/x86/kvm/vmx.c in the Linux kernel through 4.6.3 mishandles the APICv on/off state, which allows guest OS users to obtain direct APIC MSR access on the host OS, and consequently cause a denial of service (host OS crash) or possibly execute arbitrary code on the host OS, via x2APIC mode.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-12-25"/>
	<updated date="2021-12-25"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4440/">CVE-2016-4440</cve>
	<bugzilla href="https://bugzilla.suse.com/980829">SUSE bug 980829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4557</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4557" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4557" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4557" ref_url="https://www.suse.com/security/cve/CVE-2016-4557" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1641-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00007.html" source="SUSE-SU"/>
    <description>
    The replace_map_fd_with_map_ptr function in kernel/bpf/verifier.c in the Linux kernel before 4.5.5 does not properly maintain an fd data structure, which allows local users to gain privileges or cause a denial of service (use-after-free) via crafted BPF instructions that reference an incorrect file descriptor.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4557/">CVE-2016-4557</cve>
	<bugzilla href="https://bugzilla.suse.com/979018">SUSE bug 979018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979077">SUSE bug 979077</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4558</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4558" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4558" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4558" ref_url="https://www.suse.com/security/cve/CVE-2016-4558" source="SUSE CVE"/>
    <description>
    The BPF subsystem in the Linux kernel before 4.5.5 mishandles reference counts, which allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted application on (1) a system with more than 32 Gb of memory, related to the program reference count or (2) a 1 Tb system, related to the map reference count.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4558/">CVE-2016-4558</cve>
	<bugzilla href="https://bugzilla.suse.com/979019">SUSE bug 979019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4568</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4568" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4568" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4568" ref_url="https://www.suse.com/security/cve/CVE-2016-4568" source="SUSE CVE"/>
    <description>
    drivers/media/v4l2-core/videobuf2-v4l2.c in the Linux kernel before 4.5.3 allows local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a crafted number of planes in a VIDIOC_DQBUF ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-18"/>
	<updated date="2021-11-18"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4568/">CVE-2016-4568</cve>
	<bugzilla href="https://bugzilla.suse.com/979022">SUSE bug 979022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981516">SUSE bug 981516</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4581</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4581" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4581" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4581" ref_url="https://www.suse.com/security/cve/CVE-2016-4581" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1641-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
    <description>
    fs/pnode.c in the Linux kernel before 4.5.4 does not properly traverse a mount propagation tree in a certain case involving a slave mount, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via a crafted series of mount system calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4581/">CVE-2016-4581</cve>
	<bugzilla href="https://bugzilla.suse.com/979913">SUSE bug 979913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4794</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4794" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4794" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4794" ref_url="https://www.suse.com/security/cve/CVE-2016-4794" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1798-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00014.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in mm/percpu.c in the Linux kernel through 4.6 allows local users to cause a denial of service (BUG) or possibly have unspecified other impact via crafted use of the mmap and bpf system calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4794/">CVE-2016-4794</cve>
	<bugzilla href="https://bugzilla.suse.com/980265">SUSE bug 980265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981517">SUSE bug 981517</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4951</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4951" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4951" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4951" ref_url="https://www.suse.com/security/cve/CVE-2016-4951" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1641-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00007.html" source="SUSE-SU"/>
    <description>
    The tipc_nl_publ_dump function in net/tipc/socket.c in the Linux kernel through 4.6 does not verify socket existence, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a dumpit operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4951/">CVE-2016-4951</cve>
	<bugzilla href="https://bugzilla.suse.com/981058">SUSE bug 981058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985132">SUSE bug 985132</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4952</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4952" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4952" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4952" ref_url="https://www.suse.com/security/cve/CVE-2016-4952" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00022.html" source="SUSE-SU"/>
    <description>
    QEMU (aka Quick Emulator), when built with VMWARE PVSCSI paravirtual SCSI bus emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds array access) via vectors related to the (1) PVSCSI_CMD_SETUP_RINGS or (2) PVSCSI_CMD_SETUP_MSG_RING SCSI command.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4952/">CVE-2016-4952</cve>
	<bugzilla href="https://bugzilla.suse.com/981266">SUSE bug 981266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981276">SUSE bug 981276</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334251" comment="kvm is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4964</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4964" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4964" ref_url="https://www.suse.com/security/cve/CVE-2016-4964" source="SUSE CVE"/>
    <description>
    The mptsas_fetch_requests function in hw/scsi/mptsas.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop, and CPU consumption or QEMU process crash) via vectors involving s-&gt;state.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4964/">CVE-2016-4964</cve>
	<bugzilla href="https://bugzilla.suse.com/981399">SUSE bug 981399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981401">SUSE bug 981401</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5116</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5116" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5116" ref_url="https://www.suse.com/security/cve/CVE-2016-5116" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002271.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1516-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2363-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00078.html" source="SUSE-SU"/>
    <description>
    gd_xbm.c in the GD Graphics Library (aka libgd) before 2.2.0, as used in certain custom PHP 5.5.x configurations, allows context-dependent attackers to obtain sensitive information from process memory or cause a denial of service (stack-based buffer under-read and application crash) via a long name.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5116/">CVE-2016-5116</cve>
	<bugzilla href="https://bugzilla.suse.com/982176">SUSE bug 982176</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334249" comment="gd is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000255</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000255" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000255" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000255" ref_url="https://www.suse.com/security/cve/CVE-2017-1000255" source="SUSE CVE"/>
    <description>
    On Linux running on PowerPC hardware (Power8 or later) a user process can craft a signal frame and then do a sigreturn so that the kernel will take an exception (interrupt), and use the r1 value *from the signal frame* as the kernel stack pointer. As part of the exception entry the content of the signal frame is written to the kernel stack, allowing an attacker to overwrite arbitrary locations with arbitrary values. The exception handling does produce an oops, and a panic if panic_on_oops=1, but only after kernel memory has been over written. This flaw was introduced in commit: "5d176f751ee3 (powerpc: tm: Enable transactional memory (TM) lazily for userspace)" which was merged upstream into v4.9-rc1. Please note that kernels built with CONFIG_PPC_TRANSACTIONAL_MEM=n are not vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-1000255/">CVE-2017-1000255</cve>
	<bugzilla href="https://bugzilla.suse.com/1061633">SUSE bug 1061633</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10989</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10989" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10989" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10989" ref_url="https://www.suse.com/security/cve/CVE-2017-10989" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="TID7022306" ref_url="https://www.suse.com/support/kb/doc/?id=7022306" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1426-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00050.html" source="SUSE-SU"/>
    <description>
    The getNodeSize function in ext/rtree/rtree.c in SQLite through 3.19.3, as used in GDAL and other products, mishandles undersized RTree blobs in a crafted database, leading to a heap-based buffer over-read or possibly unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10989/">CVE-2017-10989</cve>
	<bugzilla href="https://bugzilla.suse.com/1131919">SUSE bug 1131919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132045">SUSE bug 1132045</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333981" comment="sqlite2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13704</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13704" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13704" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13704" ref_url="https://www.suse.com/security/cve/CVE-2017-13704" source="SUSE CVE"/>
    <description>
    In dnsmasq before 2.78, if the DNS packet size does not match the expected size, the size parameter in a memset call gets a negative value. As it is an unsigned value, memset ends up writing up to 0xffffffff zero's (0xffffffffffffffff in 64 bit platforms), making dnsmasq crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-13704/">CVE-2017-13704</cve>
	<bugzilla href="https://bugzilla.suse.com/1060586">SUSE bug 1060586</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338972" comment="dnsmasq is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15023</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15023" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15023" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15023" ref_url="https://www.suse.com/security/cve/CVE-2017-15023" source="SUSE CVE"/>
    <description>
    read_formatted_entries in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, does not properly validate the format count, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted ELF file, related to concat_filename.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15023/">CVE-2017-15023</cve>
	<bugzilla href="https://bugzilla.suse.com/1061623">SUSE bug 1061623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065689">SUSE bug 1065689</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334069" comment="binutils is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15286</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15286" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15286" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15286" ref_url="https://www.suse.com/security/cve/CVE-2017-15286" source="SUSE CVE"/>
    <description>
    SQLite 3.20.1 has a NULL pointer dereference in tableColumnList in shell.c because it fails to consider certain cases where `sqlite3_step(pStmt)==SQLITE_ROW` is false and a data structure is never initialized.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-15286/">CVE-2017-15286</cve>
	<bugzilla href="https://bugzilla.suse.com/1063145">SUSE bug 1063145</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333981" comment="sqlite2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18075</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18075" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18075" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18075" ref_url="https://www.suse.com/security/cve/CVE-2017-18075" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0568-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0572-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0573-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0574-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0575-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0576-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0577-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0578-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0579-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0582-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0584-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0586-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0590-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0593-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0594-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0596-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0597-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00021.html" source="SUSE-SU"/>
    <description>
    crypto/pcrypt.c in the Linux kernel before 4.14.13 mishandles freeing instances, allowing a local user able to access the AF_ALG-based AEAD interface (CONFIG_CRYPTO_USER_API_AEAD) and pcrypt (CONFIG_CRYPTO_PCRYPT) to cause a denial of service (kfree of an incorrect pointer) or possibly have unspecified other impact by executing a crafted sequence of system calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-08-31"/>
	<updated date="2021-08-31"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18075/">CVE-2017-18075</cve>
	<bugzilla href="https://bugzilla.suse.com/1077402">SUSE bug 1077402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077404">SUSE bug 1077404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18174</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18174" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18174" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18174" ref_url="https://www.suse.com/security/cve/CVE-2017-18174" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0986-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005474.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 4.7, the amd_gpio_remove function in drivers/pinctrl/pinctrl-amd.c calls the pinctrl_unregister function, leading to a double free.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18174/">CVE-2017-18174</cve>
	<bugzilla href="https://bugzilla.suse.com/1080533">SUSE bug 1080533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18193</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18193" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18193" ref_url="https://www.suse.com/security/cve/CVE-2017-18193" source="SUSE CVE"/>
    <description>
    fs/f2fs/extent_cache.c in the Linux kernel before 4.13 mishandles extent trees, which allows local users to cause a denial of service (BUG) via an application with multiple threads.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-09-01"/>
	<updated date="2021-09-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18193/">CVE-2017-18193</cve>
	<bugzilla href="https://bugzilla.suse.com/1082478">SUSE bug 1082478</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18204</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18204" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18204" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18204" ref_url="https://www.suse.com/security/cve/CVE-2017-18204" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0848-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
    <description>
    The ocfs2_setattr function in fs/ocfs2/file.c in the Linux kernel before 4.14.2 allows local users to cause a denial of service (deadlock) via DIO requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18204/">CVE-2017-18204</cve>
	<bugzilla href="https://bugzilla.suse.com/1083244">SUSE bug 1083244</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18222</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18222" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18222" ref_url="https://www.suse.com/security/cve/CVE-2017-18222" source="SUSE CVE"/>
    <description>
    In the Linux kernel before 4.12, Hisilicon Network Subsystem (HNS) does not consider the ETH_SS_PRIV_FLAGS case when retrieving sset_count data, which allows local users to cause a denial of service (buffer overflow and memory corruption) or possibly have unspecified other impact, as demonstrated by incompatibility between hns_get_sset_count and ethtool_get_strings.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18222/">CVE-2017-18222</cve>
	<bugzilla href="https://bugzilla.suse.com/1084529">SUSE bug 1084529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18224</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18224" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18224" ref_url="https://www.suse.com/security/cve/CVE-2017-18224" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004953.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00001.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 4.15, fs/ocfs2/aops.c omits use of a semaphore and consequently has a race condition for access to the extent tree during read operations in DIRECT mode, which allows local users to cause a denial of service (BUG) by modifying a certain e_cpos field.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-18224/">CVE-2017-18224</cve>
	<bugzilla href="https://bugzilla.suse.com/1084831">SUSE bug 1084831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718249" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18249</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18249" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18249" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18249" ref_url="https://www.suse.com/security/cve/CVE-2017-18249" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005309.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1773-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00040.html" source="SUSE-SU"/>
    <description>
    The add_free_nid function in fs/f2fs/node.c in the Linux kernel before 4.12 does not properly track an allocated nid, which allows local users to cause a denial of service (race condition) or possibly have unspecified other impact via concurrent threads.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-18249/">CVE-2017-18249</cve>
	<bugzilla href="https://bugzilla.suse.com/1087036">SUSE bug 1087036</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18255</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18255" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18255" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18255" ref_url="https://www.suse.com/security/cve/CVE-2017-18255" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
    <description>
    The perf_cpu_time_max_percent_handler function in kernel/events/core.c in the Linux kernel before 4.11 allows local users to cause a denial of service (integer overflow) or possibly have unspecified other impact via a large value, as demonstrated by an incorrect sample-rate calculation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-09-01"/>
	<updated date="2021-09-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18255/">CVE-2017-18255</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087813">SUSE bug 1087813</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2518</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2518" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2518" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2518" ref_url="https://www.suse.com/security/cve/CVE-2017-2518" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. macOS before 10.12.5 is affected. tvOS before 10.2.1 is affected. watchOS before 3.2.2 is affected. The issue involves the "SQLite" component. It allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via a crafted SQL statement.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-12-28"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2518/">CVE-2017-2518</cve>
	<bugzilla href="https://bugzilla.suse.com/1155787">SUSE bug 1155787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194085">SUSE bug 1194085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333981" comment="sqlite2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5123</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5123" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5123" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5123" ref_url="https://www.suse.com/security/cve/CVE-2017-5123" source="SUSE CVE"/>
    <description>
    Insufficient data validation in waitid allowed an user to escape sandboxes on Linux.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-08"/>
	<updated date="2022-03-08"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5123/">CVE-2017-5123</cve>
	<bugzilla href="https://bugzilla.suse.com/1062473">SUSE bug 1062473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122971">SUSE bug 1122971</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8284</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8284" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8284" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8284" ref_url="https://www.suse.com/security/cve/CVE-2017-8284" source="SUSE CVE"/>
    <description>
    ** DISPUTED ** The disas_insn function in target/i386/translate.c in QEMU before 2.9.0, when TCG mode without hardware acceleration is used, does not limit the instruction size, which allows local users to gain privileges by creating a modified basic block that injects code into a setuid program, as demonstrated by procmail. NOTE: the vendor has stated "this bug does not violate any security guarantees QEMU makes."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8284/">CVE-2017-8284</cve>
	<bugzilla href="https://bugzilla.suse.com/1160901">SUSE bug 1160901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334251" comment="kvm is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10322</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10322" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10322" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10322" ref_url="https://www.suse.com/security/cve/CVE-2018-10322" source="SUSE CVE"/>
    <description>
    The xfs_dinode_verify function in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_ilock_attr_map_shared invalid pointer dereference) via a crafted xfs image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-03"/>
	<updated date="2021-11-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10322/">CVE-2018-10322</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090749">SUSE bug 1090749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1139</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1139" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1139" ref_url="https://www.suse.com/security/cve/CVE-2018-1139" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004407.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00059.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the way samba before 4.7.9 and 4.8.4 allowed the use of weak NTLMv1 authentication even when NTLMv1 was explicitly disabled. A man-in-the-middle attacker could use this flaw to read the credential and other details passed between the samba server and client.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1139/">CVE-2018-1139</cve>
	<bugzilla href="https://bugzilla.suse.com/1095048">SUSE bug 1095048</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333940" comment="samba is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201813053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-13053</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-13053" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13053" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-13053" ref_url="https://www.suse.com/security/cve/CVE-2018-13053" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004537.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2118-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00036.html" source="SUSE-SU"/>
    <description>
    The alarm_timer_nsleep function in kernel/time/alarmtimer.c in the Linux kernel through 4.17.3 has an integer overflow via a large relative timeout because ktime_add_safe is not used.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-04-06"/>
	<updated date="2022-04-06"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13053/">CVE-2018-13053</cve>
	<bugzilla href="https://bugzilla.suse.com/1099924">SUSE bug 1099924</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201813093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-13093</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-13093" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13093" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-13093" ref_url="https://www.suse.com/security/cve/CVE-2018-13093" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2738-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-09/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00020.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in fs/xfs/xfs_icache.c in the Linux kernel through 4.17.3. There is a NULL pointer dereference and panic in lookup_slow() on a NULL inode-&gt;i_ops pointer when doing pathwalks on a corrupted xfs image. This occurs because of a lack of proper validation that cached inodes are free during allocation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-09-02"/>
	<updated date="2021-09-02"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-13093/">CVE-2018-13093</cve>
	<bugzilla href="https://bugzilla.suse.com/1100001">SUSE bug 1100001</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201813095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-13095</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-13095" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13095" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-13095" ref_url="https://www.suse.com/security/cve/CVE-2018-13095" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2738-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-09/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00020.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel through 4.17.3. A denial of service (memory corruption and BUG) can occur for a corrupted xfs image upon encountering an inode that is in extent format, but has more extents than fit in the inode fork.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-04-13"/>
	<updated date="2022-04-13"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-13095/">CVE-2018-13095</cve>
	<bugzilla href="https://bugzilla.suse.com/1099999">SUSE bug 1099999</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14609</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14609" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14609" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14609" ref_url="https://www.suse.com/security/cve/CVE-2018-14609" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel through 4.17.10. There is an invalid pointer dereference in __del_reloc_root() in fs/btrfs/relocation.c when mounting a crafted btrfs image, related to removing reloc rb_trees when reloc control has not been initialized.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-03"/>
	<updated date="2021-11-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14609/">CVE-2018-14609</cve>
	<bugzilla href="https://bugzilla.suse.com/1102875">SUSE bug 1102875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103597">SUSE bug 1103597</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14610</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14610" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14610" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14610" ref_url="https://www.suse.com/security/cve/CVE-2018-14610" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel through 4.17.10. There is out-of-bounds access in write_extent_buffer() when mounting and operating a crafted btrfs image, because of a lack of verification that each block group has a corresponding chunk at mount time, within btrfs_read_block_groups in fs/btrfs/extent-tree.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-03"/>
	<updated date="2021-11-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14610/">CVE-2018-14610</cve>
	<bugzilla href="https://bugzilla.suse.com/1102877">SUSE bug 1102877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14611</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14611" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14611" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14611" ref_url="https://www.suse.com/security/cve/CVE-2018-14611" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel through 4.17.10. There is a use-after-free in try_merge_free_space() when mounting a crafted btrfs image, because of a lack of chunk type flag checks in btrfs_check_chunk_valid in fs/btrfs/volumes.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-03"/>
	<updated date="2021-11-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14611/">CVE-2018-14611</cve>
	<bugzilla href="https://bugzilla.suse.com/1102879">SUSE bug 1102879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14612</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14612" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14612" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14612" ref_url="https://www.suse.com/security/cve/CVE-2018-14612" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel through 4.17.10. There is an invalid pointer dereference in btrfs_root_node() when mounting a crafted btrfs image, because of a lack of chunk block group mapping validation in btrfs_read_block_groups in fs/btrfs/extent-tree.c, and a lack of empty-tree checks in check_leaf in fs/btrfs/tree-checker.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-03"/>
	<updated date="2021-11-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14612/">CVE-2018-14612</cve>
	<bugzilla href="https://bugzilla.suse.com/1102882">SUSE bug 1102882</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14613</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14613" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14613" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14613" ref_url="https://www.suse.com/security/cve/CVE-2018-14613" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3003-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183003-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3202-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00033.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 4.17.10. There is an invalid pointer dereference in io_ctl_map_page() when mounting and operating a crafted btrfs image, because of a lack of block group item validation in check_leaf_item in fs/btrfs/tree-checker.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-03"/>
	<updated date="2021-11-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14613/">CVE-2018-14613</cve>
	<bugzilla href="https://bugzilla.suse.com/1102896">SUSE bug 1102896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103800">SUSE bug 1103800</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16862</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16862" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16862" ref_url="https://www.suse.com/security/cve/CVE-2018-16862" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005168.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00007.html" source="SUSE-SU"/>
    <description>
    A security flaw was found in the Linux kernel in a way that the cleancache subsystem clears an inode after the final file truncation (removal). The new file created with the same inode may contain leftover pages from cleancache and the old file data instead of the new one.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-02-15"/>
	<updated date="2022-02-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16862/">CVE-2018-16862</cve>
	<bugzilla href="https://bugzilla.suse.com/1117186">SUSE bug 1117186</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16871</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16871" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16871" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16871" ref_url="https://www.suse.com/security/cve/CVE-2018-16871" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1851-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191851-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006236.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1757-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00025.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's NFS implementation, all versions 3.x and all versions 4.x up to 4.20. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16871/">CVE-2018-16871</cve>
	<bugzilla href="https://bugzilla.suse.com/1137103">SUSE bug 1137103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156320">SUSE bug 1156320</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818397" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18397</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18397" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18397" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18397" ref_url="https://www.suse.com/security/cve/CVE-2018-18397" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00023.html" source="SUSE-SU"/>
    <description>
    The userfaultfd implementation in the Linux kernel before 4.19.7 mishandles access control for certain UFFDIO_ ioctl calls, as demonstrated by allowing local users to write data into holes in a tmpfs file (if the user has read-only access to that file, and that file contains holes), related to fs/userfaultfd.c and mm/userfaultfd.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-18397/">CVE-2018-18397</cve>
	<bugzilla href="https://bugzilla.suse.com/1117656">SUSE bug 1117656</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18559</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18559" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18559" ref_url="https://www.suse.com/security/cve/CVE-2018-18559" source="SUSE CVE"/>
    <description>
    In the Linux kernel through 4.19, a use-after-free can occur due to a race condition between fanout_add from setsockopt and bind on an AF_PACKET socket. This issue exists because of the 15fe076edea787807a7cdc168df832544b58eba6 incomplete fix for a race condition. The code mishandles a certain multithreaded case involving a packet_do_bind unregister action followed by a packet_notifier register action. Later, packet_release operates on only one of the two applicable linked lists. The attacker can achieve Program Counter control.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-09-04"/>
	<updated date="2021-09-04"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18559/">CVE-2018-18559</cve>
	<bugzilla href="https://bugzilla.suse.com/1112859">SUSE bug 1112859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112921">SUSE bug 1112921</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19478</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19478" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19478" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19478" ref_url="https://www.suse.com/security/cve/CVE-2018-19478" source="SUSE CVE"/>
    <description>
    In Artifex Ghostscript before 9.26, a carefully crafted PDF file can trigger an extremely long running computation when parsing the file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19478/">CVE-2018-19478</cve>
	<bugzilla href="https://bugzilla.suse.com/1118461">SUSE bug 1118461</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334270" comment="ghostscript-library is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20505</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20505" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20505" ref_url="https://www.suse.com/security/cve/CVE-2018-20505" source="SUSE CVE"/>
    <description>
    SQLite 3.25.2, when queries are run on a table with a malformed PRIMARY KEY, allows remote attackers to cause a denial of service (application crash) by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20505/">CVE-2018-20505</cve>
	<bugzilla href="https://bugzilla.suse.com/1131560">SUSE bug 1131560</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333981" comment="sqlite2 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20506</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20506" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20506" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20506" ref_url="https://www.suse.com/security/cve/CVE-2018-20506" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005346.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00070.html" source="SUSE-SU"/>
    <description>
    SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries in a "merge" operation that occurs after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases). This is a different vulnerability than CVE-2018-20346.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20506/">CVE-2018-20506</cve>
	<bugzilla href="https://bugzilla.suse.com/1131560">SUSE bug 1131560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131576">SUSE bug 1131576</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333981" comment="sqlite2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20669</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20669" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20669" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20669" ref_url="https://www.suse.com/security/cve/CVE-2018-20669" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0784-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190784-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0785-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190785-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008212.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2193-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4YRSQJNKLIOJJTD3P2UKMHRFMCIG3JDN/" source="SUSE-SU"/>
    <description>
    An issue where a provided address with access_ok() is not checked was discovered in i915_gem_execbuffer2_ioctl in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Linux kernel through 4.19.13. A local attacker can craft a malicious IOCTL function call to overwrite arbitrary kernel memory, resulting in a Denial of Service or privilege escalation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-12"/>
	<updated date="2022-03-12"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20669/">CVE-2018-20669</cve>
	<bugzilla href="https://bugzilla.suse.com/1122971">SUSE bug 1122971</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20784</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20784" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20784" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20784" ref_url="https://www.suse.com/security/cve/CVE-2018-20784" source="SUSE CVE"/>
    <description>
    In the Linux kernel before 4.20.2, kernel/sched/fair.c mishandles leaf cfs_rq's, which allows attackers to cause a denial of service (infinite loop in update_blocked_averages) or possibly have unspecified other impact by inducing a high load.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20784/">CVE-2018-20784</cve>
	<bugzilla href="https://bugzilla.suse.com/1126703">SUSE bug 1126703</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20856</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20856" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20856" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20856" ref_url="https://www.suse.com/security/cve/CVE-2018-20856" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006243.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 4.18.7. In block/blk-core.c, there is an __blk_drain_queue() use-after-free because a certain error case is mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-09-04"/>
	<updated date="2021-09-04"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20856/">CVE-2018-20856</cve>
	<bugzilla href="https://bugzilla.suse.com/1143048">SUSE bug 1143048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156331">SUSE bug 1156331</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201821010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-21010</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-21010" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21010" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-21010" ref_url="https://www.suse.com/security/cve/CVE-2018-21010" source="SUSE CVE"/>
    <description>
    OpenJPEG before 2.3.1 has a heap buffer overflow in color_apply_icc_profile in bin/common/color.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-21010/">CVE-2018-21010</cve>
	<bugzilla href="https://bugzilla.suse.com/1149789">SUSE bug 1149789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334270" comment="ghostscript-library is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5738</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5738" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5738" ref_url="https://www.suse.com/security/cve/CVE-2018-5738" source="SUSE CVE"/>
    <description>
    Change #4777 (introduced in October 2017) introduced an unforeseen issue in releases which were issued after that date, affecting which clients are permitted to make recursive queries to a BIND nameserver. The intended (and documented) behavior is that if an operator has not specified a value for the "allow-recursion" setting, it SHOULD default to one of the following: none, if "recursion no;" is set in named.conf; a value inherited from the "allow-query-cache" or "allow-query" settings IF "recursion yes;" (the default for that setting) AND match lists are explicitly set for "allow-query-cache" or "allow-query" (see the BIND9 Administrative Reference Manual section 6.2 for more details); or the intended default of "allow-recursion {localhost; localnets;};" if "recursion yes;" is in effect and no values are explicitly set for "allow-query-cache" or "allow-query". However, because of the regression introduced by change #4777, it is possible when "recursion yes;" is in effect and no match list values are provided for "allow-query-cache" or "allow-query" for the setting of "allow-recursion" to inherit a setting of all hosts from the "allow-query" setting default, improperly permitting recursion to all clients. Affects BIND 9.9.12, 9.10.7, 9.11.3, 9.12.0-&gt;9.12.1-P2, the development release 9.13.0, and also releases 9.9.12-S1, 9.10.7-S1, 9.11.3-S1, and 9.11.3-S2 from BIND 9 Supported Preview Edition.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-08-10"/>
	<updated date="2021-08-10"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-5738/">CVE-2018-5738</cve>
	<bugzilla href="https://bugzilla.suse.com/1096864">SUSE bug 1096864</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333958" comment="bind is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6616</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6616" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6616" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6616" ref_url="https://www.suse.com/security/cve/CVE-2018-6616" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010745.html" source="SUSE-SU"/>
    <description>
    In OpenJPEG 2.3.0, there is excessive iteration in the opj_t1_encode_cblks function of openjp2/t1.c. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted bmp file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6616/">CVE-2018-6616</cve>
	<bugzilla href="https://bugzilla.suse.com/1079845">SUSE bug 1079845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140359">SUSE bug 1140359</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334270" comment="ghostscript-library is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7191</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7191" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7191" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7191" ref_url="https://www.suse.com/security/cve/CVE-2018-7191" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1579-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html" source="SUSE-SU"/>
    <description>
    In the tun subsystem in the Linux kernel before 4.13.14, dev_get_valid_name is not called before register_netdevice. This allows local users to cause a denial of service (NULL pointer dereference and panic) via an ioctl(TUNSETIFF) call with a dev name containing a / character. This is similar to CVE-2013-4343.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7191/">CVE-2018-7191</cve>
	<bugzilla href="https://bugzilla.suse.com/1135603">SUSE bug 1135603</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8781</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8781" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8781" ref_url="https://www.suse.com/security/cve/CVE-2018-8781" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1173-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1173-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1220-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1221-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1537-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1418-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00036.html" source="SUSE-SU"/>
    <description>
    The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8781/">CVE-2018-8781</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090643">SUSE bug 1090643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090646">SUSE bug 1090646</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10126</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10126" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10126" ref_url="https://www.suse.com/security/cve/CVE-2019-10126" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1823-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1851-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191851-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1852-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191852-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1757-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00025.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel. A heap based buffer overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c might lead to memory corruption and possibly other consequences.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-14"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10126/">CVE-2019-10126</cve>
	<bugzilla href="https://bugzilla.suse.com/1136935">SUSE bug 1136935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137944">SUSE bug 1137944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156330">SUSE bug 1156330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10142</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10142" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10142" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10142" ref_url="https://www.suse.com/security/cve/CVE-2019-10142" source="SUSE CVE"/>
    <description>
    A flaw was found in the Linux kernel's freescale hypervisor manager implementation, kernel versions 5.0.x up to, excluding 5.0.17. A parameter passed to an ioctl was incorrectly validated and used in size calculations for the page size calculation. An attacker can use this flaw to crash the system, corrupt memory, or create other adverse security affects.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-10142/">CVE-2019-10142</cve>
	<bugzilla href="https://bugzilla.suse.com/1135955">SUSE bug 1135955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11005</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11005" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11005" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11005" ref_url="https://www.suse.com/security/cve/CVE-2019-11005" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1295-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00107.html" source="SUSE-SU"/>
    <description>
    In GraphicsMagick 1.4 snapshot-20190322 Q8, there is a stack-based buffer overflow in the function SVGStartElement of coders/svg.c, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a quoted font family value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11005/">CVE-2019-11005</cve>
	<bugzilla href="https://bugzilla.suse.com/1132058">SUSE bug 1132058</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11006</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11006" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11006" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11006" ref_url="https://www.suse.com/security/cve/CVE-2019-11006" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1295-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00107.html" source="SUSE-SU"/>
    <description>
    In GraphicsMagick 1.4 snapshot-20190322 Q8, there is a heap-based buffer over-read in the function ReadMIFFImage of coders/miff.c, which allows attackers to cause a denial of service or information disclosure via an RLE packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11006/">CVE-2019-11006</cve>
	<bugzilla href="https://bugzilla.suse.com/1132061">SUSE bug 1132061</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11007</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11007" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11007" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11007" ref_url="https://www.suse.com/security/cve/CVE-2019-11007" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005441.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1295-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00010.html" source="SUSE-SU"/>
    <description>
    In GraphicsMagick 1.4 snapshot-20190322 Q8, there is a heap-based buffer over-read in the ReadMNGImage function of coders/png.c, which allows attackers to cause a denial of service or information disclosure via an image colormap.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11007/">CVE-2019-11007</cve>
	<bugzilla href="https://bugzilla.suse.com/1132060">SUSE bug 1132060</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11008</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11008" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11008" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11008" ref_url="https://www.suse.com/security/cve/CVE-2019-11008" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005375.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1295-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1354-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1355-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00055.html" source="SUSE-SU"/>
    <description>
    In GraphicsMagick 1.4 snapshot-20190322 Q8, there is a heap-based buffer overflow in the function WriteXWDImage of coders/xwd.c, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11008/">CVE-2019-11008</cve>
	<bugzilla href="https://bugzilla.suse.com/1132054">SUSE bug 1132054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133202">SUSE bug 1133202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133203">SUSE bug 1133203</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11010</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11010" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11010" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11010" ref_url="https://www.suse.com/security/cve/CVE-2019-11010" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1295-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00107.html" source="SUSE-SU"/>
    <description>
    In GraphicsMagick 1.4 snapshot-20190322 Q8, there is a memory leak in the function ReadMPCImage of coders/mpc.c, which allows attackers to cause a denial of service via a crafted image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11010/">CVE-2019-11010</cve>
	<bugzilla href="https://bugzilla.suse.com/1132055">SUSE bug 1132055</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11473</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11473" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11473" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11473" ref_url="https://www.suse.com/security/cve/CVE-2019-11473" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1354-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1355-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00055.html" source="SUSE-SU"/>
    <description>
    coders/xwd.c in GraphicsMagick 1.3.31 allows attackers to cause a denial of service (out-of-bounds read and application crash) by crafting an XWD image file, a different vulnerability than CVE-2019-11008 and CVE-2019-11009.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-11473/">CVE-2019-11473</cve>
	<bugzilla href="https://bugzilla.suse.com/1133203">SUSE bug 1133203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133204">SUSE bug 1133204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911474" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11474</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11474" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11474" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11474" ref_url="https://www.suse.com/security/cve/CVE-2019-11474" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1354-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1355-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00055.html" source="SUSE-SU"/>
    <description>
    coders/xwd.c in GraphicsMagick 1.3.31 allows attackers to cause a denial of service (floating-point exception and application crash) by crafting an XWD image file, a different vulnerability than CVE-2019-11008 and CVE-2019-11009.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-11474/">CVE-2019-11474</cve>
	<bugzilla href="https://bugzilla.suse.com/1133202">SUSE bug 1133202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133204">SUSE bug 1133204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11505</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11505" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11505" ref_url="https://www.suse.com/security/cve/CVE-2019-11505" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005633.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1354-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1355-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1603-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1683-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00001.html" source="SUSE-SU"/>
    <description>
    In GraphicsMagick from version 1.3.8 to 1.4 snapshot-20190403 Q8, there is a heap-based buffer overflow in the function WritePDBImage of coders/pdb.c, which allows an attacker to cause a denial of service or possibly have unspecified other impact via a crafted image file. This is related to MagickBitStreamMSBWrite in magick/bit_stream.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11505/">CVE-2019-11505</cve>
	<bugzilla href="https://bugzilla.suse.com/1133501">SUSE bug 1133501</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11597</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11597" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11597" ref_url="https://www.suse.com/security/cve/CVE-2019-11597" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005670.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1683-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00043.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.8-43 Q16, there is a heap-based buffer over-read in the function WriteTIFFImage of coders/tiff.c, which allows an attacker to cause a denial of service or possibly information disclosure via a crafted image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11597/">CVE-2019-11597</cve>
	<bugzilla href="https://bugzilla.suse.com/1138464">SUSE bug 1138464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146211">SUSE bug 1146211</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11683</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11683" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11683" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11683" ref_url="https://www.suse.com/security/cve/CVE-2019-11683" source="SUSE CVE"/>
    <description>
    udp_gro_receive_segment in net/ipv4/udp_offload.c in the Linux kernel 5.x before 5.0.13 allows remote attackers to cause a denial of service (slab-out-of-bounds memory corruption) or possibly have unspecified other impact via UDP packets with a 0 payload, because of mishandling of padded packets, aka the "GRO packet of death" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11683/">CVE-2019-11683</cve>
	<bugzilla href="https://bugzilla.suse.com/1134021">SUSE bug 1134021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12067</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12067" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12067" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12067" ref_url="https://www.suse.com/security/cve/CVE-2019-12067" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
    <description>
    The ahci_commit_buf function in ide/ahci.c in QEMU allows attackers to cause a denial of service (NULL dereference) when the command header 'ad-&gt;cur_cmd' is null.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-03"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12067/">CVE-2019-12067</cve>
	<bugzilla href="https://bugzilla.suse.com/1145642">SUSE bug 1145642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145652">SUSE bug 1145652</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334251" comment="kvm is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12614</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12614" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12614" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12614" ref_url="https://www.suse.com/security/cve/CVE-2019-12614" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1823-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1851-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191851-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1852-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191852-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1757-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00025.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c in the Linux kernel through 5.1.6. There is an unchecked kstrdup of prop-&gt;name, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12614/">CVE-2019-12614</cve>
	<bugzilla href="https://bugzilla.suse.com/1137194">SUSE bug 1137194</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12818</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12818" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12818" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12818" ref_url="https://www.suse.com/security/cve/CVE-2019-12818" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1823-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1851-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191851-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1852-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191852-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1571-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1579-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 4.20.15. The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may return NULL. If the caller does not check for this, it will trigger a NULL pointer dereference. This will cause denial of service. This affects nfc_llcp_build_gb in net/nfc/llcp_core.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12818/">CVE-2019-12818</cve>
	<bugzilla href="https://bugzilla.suse.com/1138293">SUSE bug 1138293</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12819</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12819" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12819" ref_url="https://www.suse.com/security/cve/CVE-2019-12819" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1823-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1851-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191851-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1852-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191852-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1571-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1579-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.0. The function __mdiobus_register() in drivers/net/phy/mdio_bus.c calls put_device(), which will trigger a fixed_mdio_bus_init use-after-free. This will cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-12819/">CVE-2019-12819</cve>
	<bugzilla href="https://bugzilla.suse.com/1138291">SUSE bug 1138291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12929</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12929" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12929" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12929" ref_url="https://www.suse.com/security/cve/CVE-2019-12929" source="SUSE CVE"/>
    <description>
    ** DISPUTED ** The QMP guest_exec command in QEMU 4.0.0 and earlier is prone to OS command injection, which allows the attacker to achieve code execution, denial of service, or information disclosure by sending a crafted QMP command to the listening server. Note: This has been disputed as a non-issue since QEMU's -qmp interface is meant to be used by trusted users. If one is able to access this interface via a tcp socket open to the internet, then it is an insecure configuration issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="0/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12929/">CVE-2019-12929</cve>
	<bugzilla href="https://bugzilla.suse.com/1139671">SUSE bug 1139671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140123">SUSE bug 1140123</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334251" comment="kvm is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12973</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12973" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12973" ref_url="https://www.suse.com/security/cve/CVE-2019-12973" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005970.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00088.html" source="SUSE-SU"/>
    <description>
    In OpenJPEG 2.3.1, there is excessive iteration in the opj_t1_encode_cblks function of openjp2/t1.c. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted bmp file. This issue is similar to CVE-2018-6616.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12973/">CVE-2019-12973</cve>
	<bugzilla href="https://bugzilla.suse.com/1140359">SUSE bug 1140359</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334270" comment="ghostscript-library is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12974</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12974" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12974" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12974" ref_url="https://www.suse.com/security/cve/CVE-2019-12974" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference in the function ReadPANGOImage in coders/pango.c and the function ReadVIDImage in coders/vid.c in ImageMagick 7.0.8-34 allows remote attackers to cause a denial of service via a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12974/">CVE-2019-12974</cve>
	<bugzilla href="https://bugzilla.suse.com/1140111">SUSE bug 1140111</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12977</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12977" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12977" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12977" ref_url="https://www.suse.com/security/cve/CVE-2019-12977" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-34 has a "use of uninitialized value" vulnerability in the WriteJP2Image function in coders/jp2.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12977/">CVE-2019-12977</cve>
	<bugzilla href="https://bugzilla.suse.com/1139884">SUSE bug 1139884</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12978</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12978" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12978" ref_url="https://www.suse.com/security/cve/CVE-2019-12978" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-34 has a "use of uninitialized value" vulnerability in the ReadPANGOImage function in coders/pango.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12978/">CVE-2019-12978</cve>
	<bugzilla href="https://bugzilla.suse.com/1139885">SUSE bug 1139885</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13136</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13136" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13136" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13136" ref_url="https://www.suse.com/security/cve/CVE-2019-13136" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick before 7.0.8-50 has an integer overflow vulnerability in the function TIFFSeekCustomStream in coders/tiff.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-13136/">CVE-2019-13136</cve>
	<bugzilla href="https://bugzilla.suse.com/1140104">SUSE bug 1140104</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13137</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13137" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13137" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13137" ref_url="https://www.suse.com/security/cve/CVE-2019-13137" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick before 7.0.8-50 has a memory leak vulnerability in the function ReadPSImage in coders/ps.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13137/">CVE-2019-13137</cve>
	<bugzilla href="https://bugzilla.suse.com/1140105">SUSE bug 1140105</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13272</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13272" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13272" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13272" ref_url="https://www.suse.com/security/cve/CVE-2019-13272" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006246.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-06"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13272/">CVE-2019-13272</cve>
	<bugzilla href="https://bugzilla.suse.com/1140671">SUSE bug 1140671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156321">SUSE bug 1156321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198122">SUSE bug 1198122</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13296</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13296" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13296" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13296" ref_url="https://www.suse.com/security/cve/CVE-2019-13296" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has direct memory leaks in AcquireMagickMemory because of an error in CLIListOperatorImages in MagickWand/operation.c for a NULL value.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13296/">CVE-2019-13296</cve>
	<bugzilla href="https://bugzilla.suse.com/1140665">SUSE bug 1140665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913298" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13298</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13298" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13298" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13298" ref_url="https://www.suse.com/security/cve/CVE-2019-13298" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow at MagickCore/pixel-accessor.h in SetPixelViaPixelInfo because of a MagickCore/enhance.c error.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13298/">CVE-2019-13298</cve>
	<bugzilla href="https://bugzilla.suse.com/1140667">SUSE bug 1140667</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913299" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13299</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13299" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13299" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13299" ref_url="https://www.suse.com/security/cve/CVE-2019-13299" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read at MagickCore/pixel-accessor.h in GetPixelChannel.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13299/">CVE-2019-13299</cve>
	<bugzilla href="https://bugzilla.suse.com/1140668">SUSE bug 1140668</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913300" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13300</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13300" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13300" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13300" ref_url="https://www.suse.com/security/cve/CVE-2019-13300" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow at MagickCore/statistic.c in EvaluateImages because of mishandling columns.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13300/">CVE-2019-13300</cve>
	<bugzilla href="https://bugzilla.suse.com/1140669">SUSE bug 1140669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13302</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13302" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13302" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13302" ref_url="https://www.suse.com/security/cve/CVE-2019-13302" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read in MagickCore/fourier.c in ComplexImages.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13302/">CVE-2019-13302</cve>
	<bugzilla href="https://bugzilla.suse.com/1140552">SUSE bug 1140552</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913303" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13303</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13303" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13303" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13303" ref_url="https://www.suse.com/security/cve/CVE-2019-13303" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read in MagickCore/composite.c in CompositeImage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13303/">CVE-2019-13303</cve>
	<bugzilla href="https://bugzilla.suse.com/1140549">SUSE bug 1140549</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13304</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13304" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13304" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13304" ref_url="https://www.suse.com/security/cve/CVE-2019-13304" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has a stack-based buffer overflow at coders/pnm.c in WritePNMImage because of a misplaced assignment.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13304/">CVE-2019-13304</cve>
	<bugzilla href="https://bugzilla.suse.com/1140547">SUSE bug 1140547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13305</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13305" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13305" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13305" ref_url="https://www.suse.com/security/cve/CVE-2019-13305" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has a stack-based buffer overflow at coders/pnm.c in WritePNMImage because of a misplaced strncpy and an off-by-one error.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13305/">CVE-2019-13305</cve>
	<bugzilla href="https://bugzilla.suse.com/1140545">SUSE bug 1140545</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913306" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13306</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13306" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13306" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13306" ref_url="https://www.suse.com/security/cve/CVE-2019-13306" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has a stack-based buffer overflow at coders/pnm.c in WritePNMImage because of off-by-one errors.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13306/">CVE-2019-13306</cve>
	<bugzilla href="https://bugzilla.suse.com/1140543">SUSE bug 1140543</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913307" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13307</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13307" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13307" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13307" ref_url="https://www.suse.com/security/cve/CVE-2019-13307" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow at MagickCore/statistic.c in EvaluateImages because of mishandling rows.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13307/">CVE-2019-13307</cve>
	<bugzilla href="https://bugzilla.suse.com/1140538">SUSE bug 1140538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913308" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13308</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13308" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13308" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13308" ref_url="https://www.suse.com/security/cve/CVE-2019-13308" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow in MagickCore/fourier.c in ComplexImage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13308/">CVE-2019-13308</cve>
	<bugzilla href="https://bugzilla.suse.com/1140534">SUSE bug 1140534</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913309" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13309</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13309" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13309" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13309" ref_url="https://www.suse.com/security/cve/CVE-2019-13309" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has memory leaks at AcquireMagickMemory because of mishandling the NoSuchImage error in CLIListOperatorImages in MagickWand/operation.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13309/">CVE-2019-13309</cve>
	<bugzilla href="https://bugzilla.suse.com/1140501">SUSE bug 1140501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140520">SUSE bug 1140520</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13310</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13310" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13310" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13310" ref_url="https://www.suse.com/security/cve/CVE-2019-13310" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has memory leaks at AcquireMagickMemory because of an error in MagickWand/mogrify.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13310/">CVE-2019-13310</cve>
	<bugzilla href="https://bugzilla.suse.com/1140501">SUSE bug 1140501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140520">SUSE bug 1140520</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13648</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13648" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13648" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13648" ref_url="https://www.suse.com/security/cve/CVE-2019-13648" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1923-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00055.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel through 5.2.1 on the powerpc platform, when hardware transactional memory is disabled, a local user can cause a denial of service (TM Bad Thing exception and system crash) via a sigreturn() system call that sends a crafted signal frame. This affects arch/powerpc/kernel/signal_32.c and arch/powerpc/kernel/signal_64.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13648/">CVE-2019-13648</cve>
	<bugzilla href="https://bugzilla.suse.com/1142254">SUSE bug 1142254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142265">SUSE bug 1142265</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14288</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14288" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14288" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14288" ref_url="https://www.suse.com/security/cve/CVE-2019-14288" source="SUSE CVE"/>
    <description>
    An issue was discovered in Xpdf 4.01.01. There is an Integer overflow in the function JBIG2Bitmap::combine at JBIG2Stream.cc for the "one byte per line" case.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-14288/">CVE-2019-14288</cve>
	<bugzilla href="https://bugzilla.suse.com/1143434">SUSE bug 1143434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334297" comment="poppler is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334297" comment="poppler is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339330" comment="xpdf is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14289</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14289" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14289" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14289" ref_url="https://www.suse.com/security/cve/CVE-2019-14289" source="SUSE CVE"/>
    <description>
    An issue was discovered in Xpdf 4.01.01. There is an integer overflow in the function JBIG2Bitmap::combine at JBIG2Stream.cc for the "multiple bytes per line" case.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14289/">CVE-2019-14289</cve>
	<bugzilla href="https://bugzilla.suse.com/1143443">SUSE bug 1143443</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334297" comment="poppler is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334297" comment="poppler is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339330" comment="xpdf is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914290" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14290</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14290" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14290" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14290" ref_url="https://www.suse.com/security/cve/CVE-2019-14290" source="SUSE CVE"/>
    <description>
    An issue was discovered in Xpdf 4.01.01. There is an out of bounds read in the function GfxPatchMeshShading::parse at GfxState.cc for typeA==6 case 2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14290/">CVE-2019-14290</cve>
	<bugzilla href="https://bugzilla.suse.com/1143568">SUSE bug 1143568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339330" comment="xpdf is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14291</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14291" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14291" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14291" ref_url="https://www.suse.com/security/cve/CVE-2019-14291" source="SUSE CVE"/>
    <description>
    An issue was discovered in Xpdf 4.01.01. There is an out of bounds read in the function GfxPatchMeshShading::parse at GfxState.cc for typeA==6 case 3.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14291/">CVE-2019-14291</cve>
	<bugzilla href="https://bugzilla.suse.com/1143569">SUSE bug 1143569</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334297" comment="poppler is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334297" comment="poppler is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339330" comment="xpdf is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14292</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14292" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14292" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14292" ref_url="https://www.suse.com/security/cve/CVE-2019-14292" source="SUSE CVE"/>
    <description>
    An issue was discovered in Xpdf 4.01.01. There is an out of bounds read in the function GfxPatchMeshShading::parse at GfxState.cc for typeA!=6 case 1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14292/">CVE-2019-14292</cve>
	<bugzilla href="https://bugzilla.suse.com/1143570">SUSE bug 1143570</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334297" comment="poppler is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334297" comment="poppler is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339330" comment="xpdf is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914293" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14293</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14293" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14293" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14293" ref_url="https://www.suse.com/security/cve/CVE-2019-14293" source="SUSE CVE"/>
    <description>
    An issue was discovered in Xpdf 4.01.01. There is an out of bounds read in the function GfxPatchMeshShading::parse at GfxState.cc for typeA!=6 case 2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14293/">CVE-2019-14293</cve>
	<bugzilla href="https://bugzilla.suse.com/1143571">SUSE bug 1143571</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334297" comment="poppler is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334297" comment="poppler is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339330" comment="xpdf is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14494</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14494" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14494" ref_url="https://www.suse.com/security/cve/CVE-2019-14494" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009785.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3854-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TS7QPSEQIBQO7BALZOE3TN7IO7IMHK3Y/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Poppler through 0.78.0. There is a divide-by-zero error in the function SplashOutputDev::tilingPatternFill at SplashOutputDev.cc.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-12"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14494/">CVE-2019-14494</cve>
	<bugzilla href="https://bugzilla.suse.com/1143950">SUSE bug 1143950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339330" comment="xpdf is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14763</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14763" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14763" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14763" ref_url="https://www.suse.com/security/cve/CVE-2019-14763" source="SUSE CVE"/>
    <description>
    In the Linux kernel before 4.16.4, a double-locking error in drivers/usb/dwc3/gadget.c may potentially cause a deadlock with f_hid.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-14763/">CVE-2019-14763</cve>
	<bugzilla href="https://bugzilla.suse.com/1144918">SUSE bug 1144918</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14981</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14981" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14981" ref_url="https://www.suse.com/security/cve/CVE-2019-14981" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2515-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.x before 7.0.8-41 and 6.x before 6.9.10-41, there is a divide-by-zero vulnerability in the MeanShiftImage function. It allows an attacker to cause a denial of service by sending a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14981/">CVE-2019-14981</cve>
	<bugzilla href="https://bugzilla.suse.com/1146065">SUSE bug 1146065</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15030</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15030" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15030" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15030" ref_url="https://www.suse.com/security/cve/CVE-2019-15030" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process because of a missing arch/powerpc/kernel/process.c check.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15030/">CVE-2019-15030</cve>
	<bugzilla href="https://bugzilla.suse.com/1149713">SUSE bug 1149713</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15031</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15031" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15031" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15031" ref_url="https://www.suse.com/security/cve/CVE-2019-15031" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via an interrupt. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process, because MSR_TM_ACTIVE is misused in arch/powerpc/kernel/process.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15031/">CVE-2019-15031</cve>
	<bugzilla href="https://bugzilla.suse.com/1149713">SUSE bug 1149713</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915034" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15034</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15034" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15034" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15034" ref_url="https://www.suse.com/security/cve/CVE-2019-15034" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006664.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0468-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00007.html" source="SUSE-SU"/>
    <description>
    hw/display/bochs-display.c in QEMU 4.0.0 does not ensure a sufficient PCI config space allocation, leading to a buffer overflow involving the PCIe extended config space.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15034/">CVE-2019-15034</cve>
	<bugzilla href="https://bugzilla.suse.com/1166379">SUSE bug 1166379</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334251" comment="kvm is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15090</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15090" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15090" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15090" ref_url="https://www.suse.com/security/cve/CVE-2019-15090" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in drivers/scsi/qedi/qedi_dbg.c in the Linux kernel before 5.1.12. In the qedi_dbg_* family of functions, there is an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15090/">CVE-2019-15090</cve>
	<bugzilla href="https://bugzilla.suse.com/1146399">SUSE bug 1146399</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15099</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15099" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15099" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15099" ref_url="https://www.suse.com/security/cve/CVE-2019-15099" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    drivers/net/wireless/ath/ath10k/usb.c in the Linux kernel through 5.2.8 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-04-06"/>
	<updated date="2022-04-13"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15099/">CVE-2019-15099</cve>
	<bugzilla href="https://bugzilla.suse.com/1146368">SUSE bug 1146368</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15139</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15139" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15139" ref_url="https://www.suse.com/security/cve/CVE-2019-15139" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2785-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2515-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html" source="SUSE-SU"/>
    <description>
    The XWD image (X Window System window dumping file) parsing component in ImageMagick 7.0.8-41 Q16 allows attackers to cause a denial-of-service (application crash resulting from an out-of-bounds Read) in ReadXWDImage in coders/xwd.c by crafting a corrupted XWD image file, a different vulnerability than CVE-2019-11472.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15139/">CVE-2019-15139</cve>
	<bugzilla href="https://bugzilla.suse.com/1146213">SUSE bug 1146213</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15140</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15140" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15140" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15140" ref_url="https://www.suse.com/security/cve/CVE-2019-15140" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2785-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2515-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html" source="SUSE-SU"/>
    <description>
    coders/mat.c in ImageMagick 7.0.8-43 Q16 allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly have unspecified other impact by crafting a Matlab image file that is mishandled in ReadImage in MagickCore/constitute.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15140/">CVE-2019-15140</cve>
	<bugzilla href="https://bugzilla.suse.com/1146212">SUSE bug 1146212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15141</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15141" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15141" ref_url="https://www.suse.com/security/cve/CVE-2019-15141" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2785-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2515-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html" source="SUSE-SU"/>
    <description>
    WriteTIFFImage in coders/tiff.c in ImageMagick 7.0.8-43 Q16 allows attackers to cause a denial-of-service (application crash resulting from a heap-based buffer over-read) via a crafted TIFF image file, related to TIFFRewriteDirectory, TIFFWriteDirectory, TIFFWriteDirectorySec, and TIFFWriteDirectoryTagColormap in tif_dirwrite.c of LibTIFF. NOTE: this occurs because of an incomplete fix for CVE-2019-11597.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15141/">CVE-2019-15141</cve>
	<bugzilla href="https://bugzilla.suse.com/1146211">SUSE bug 1146211</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15221</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15221" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15221" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15221" ref_url="https://www.suse.com/security/cve/CVE-2019-15221" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.1.17. There is a NULL pointer dereference caused by a malicious USB device in the sound/usb/line6/pcm.c driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15221/">CVE-2019-15221</cve>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146529">SUSE bug 1146529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15239</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15239" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15239" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15239" ref_url="https://www.suse.com/security/cve/CVE-2019-15239" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006244.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, a certain net/ipv4/tcp_output.c change, which was properly incorporated into 4.16.12, was incorrectly backported to the earlier longterm kernels, introducing a new vulnerability that was potentially more severe than the issue that was intended to be fixed by backporting. Specifically, by adding to a write queue between disconnection and re-connection, a local attacker can trigger multiple use-after-free conditions. This can result in a kernel crash, or potentially in privilege escalation. NOTE: this affects (for example) Linux distributions that use 4.9.x longterm kernels before 4.9.190 or 4.14.x longterm kernels before 4.14.139.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15239/">CVE-2019-15239</cve>
	<bugzilla href="https://bugzilla.suse.com/1146589">SUSE bug 1146589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156317">SUSE bug 1156317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1547</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1547" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1547" ref_url="https://www.suse.com/security/cve/CVE-2019-1547" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006349.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2158-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00016.html" source="SUSE-SU"/>
    <description>
    Normally in OpenSSL EC groups always have a co-factor present and this is used in side channel resistant code paths. However, in some cases, it is possible to construct a group using explicit parameters (instead of using a named curve). In those cases it is possible that such a group does not have the cofactor present. This can occur even where all the parameters match a known named curve. If such a curve is used then OpenSSL falls back to non-side channel resistant code paths which may result in full key recovery during an ECDSA signature operation. In order to be vulnerable an attacker would have to have the ability to time the creation of a large number of signatures where explicit parameters with no co-factor present are in use by an application using libcrypto. For the avoidance of doubt libssl is not vulnerable because explicit parameters are never used. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-07-21"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1547/">CVE-2019-1547</cve>
	<bugzilla href="https://bugzilla.suse.com/1150003">SUSE bug 1150003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154162">SUSE bug 1154162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154166">SUSE bug 1154166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161085">SUSE bug 1161085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334233" comment="compat-openssl097g is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1549</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1549" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1549" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1549" ref_url="https://www.suse.com/security/cve/CVE-2019-1549" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006349.html" source="SUSE-SU"/>
    <description>
    OpenSSL 1.1.1 introduced a rewritten random number generator (RNG). This was intended to include protection in the event of a fork() system call in order to ensure that the parent and child processes did not share the same RNG state. However this protection was not being used in the default case. A partial mitigation for this issue is that the output from a high precision timer is mixed into the RNG state so the likelihood of a parent and child process sharing state is significantly reduced. If an application already calls OPENSSL_init_crypto() explicitly using OPENSSL_INIT_ATFORK then this problem does not occur at all. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1549/">CVE-2019-1549</cve>
	<bugzilla href="https://bugzilla.suse.com/1150247">SUSE bug 1150247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154162">SUSE bug 1154162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334233" comment="compat-openssl097g is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1551</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1551" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1551" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1551" ref_url="https://www.suse.com/security/cve/CVE-2019-1551" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006349.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006529.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0062-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00030.html" source="SUSE-SU"/>
    <description>
    There is an overflow bug in the x64_64 Montgomery squaring procedure used in exponentiation with 512-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against 2-prime RSA1024, 3-prime RSA1536, and DSA1024 as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH512 are considered just feasible. However, for an attack the target would have to re-use the DH512 private key, which is not recommended anyway. Also applications directly using the low level API BN_mod_exp may be affected if they use BN_FLG_CONSTTIME. Fixed in OpenSSL 1.1.1e (Affected 1.1.1-1.1.1d). Fixed in OpenSSL 1.0.2u (Affected 1.0.2-1.0.2t).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1551/">CVE-2019-1551</cve>
	<bugzilla href="https://bugzilla.suse.com/1158809">SUSE bug 1158809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334233" comment="compat-openssl097g is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1552</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1552" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1552" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1552" ref_url="https://www.suse.com/security/cve/CVE-2019-1552" source="SUSE CVE"/>
    <description>
    OpenSSL has internal defaults for a directory tree where it can find a configuration file as well as certificates used for verification in TLS. This directory is most commonly referred to as OPENSSLDIR, and is configurable with the --prefix / --openssldir configuration options. For OpenSSL versions 1.1.0 and 1.1.1, the mingw configuration targets assume that resulting programs and libraries are installed in a Unix-like environment and the default prefix for program installation as well as for OPENSSLDIR should be '/usr/local'. However, mingw programs are Windows programs, and as such, find themselves looking at sub-directories of 'C:/usr/local', which may be world writable, which enables untrusted users to modify OpenSSL's default configuration, insert CA certificates, modify (or even replace) existing engine modules, etc. For OpenSSL 1.0.2, '/usr/local/ssl' is used as default for OPENSSLDIR on all Unix and Windows targets, including Visual C builds. However, some build instructions for the diverse Windows targets on 1.0.2 encourage you to specify your own --prefix. OpenSSL versions 1.1.1, 1.1.0 and 1.0.2 are affected by this issue. Due to the limited scope of affected deployments this has been assessed as low severity and therefore we are not creating new releases at this time. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-1552/">CVE-2019-1552</cve>
	<bugzilla href="https://bugzilla.suse.com/1143552">SUSE bug 1143552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154162">SUSE bug 1154162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334233" comment="compat-openssl097g is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16088</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16088" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16088" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16088" ref_url="https://www.suse.com/security/cve/CVE-2019-16088" source="SUSE CVE"/>
    <description>
    Xpdf 3.04 has a SIGSEGV in XRef::fetch in XRef.cc after many recursive calls to Catalog::countPageTree in Catalog.cc.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-16088/">CVE-2019-16088</cve>
	<bugzilla href="https://bugzilla.suse.com/1150205">SUSE bug 1150205</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334297" comment="poppler is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334297" comment="poppler is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339330" comment="xpdf is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16115</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16115" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16115" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16115" ref_url="https://www.suse.com/security/cve/CVE-2019-16115" source="SUSE CVE"/>
    <description>
    In Xpdf 4.01.01, a stack-based buffer under-read could be triggered in IdentityFunction::transform in Function.cc, used by GfxAxialShading::getColor. It can, for example, be triggered by sending a crafted PDF document to the pdftoppm tool. It allows an attacker to use a crafted PDF file to cause Denial of Service or possibly unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16115/">CVE-2019-16115</cve>
	<bugzilla href="https://bugzilla.suse.com/1150039">SUSE bug 1150039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334297" comment="poppler is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334297" comment="poppler is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339330" comment="xpdf is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16168</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16168" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16168" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16168" ref_url="https://www.suse.com/security/cve/CVE-2019-16168" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2300-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00033.html" source="SUSE-SU"/>
    <description>
    In SQLite through 3.29.0, whereLoopAddBtreeIndex in sqlite3.c can crash a browser or other application because of missing validation of a sqlite_stat1 sz field, aka a "severe division by zero in the query planner."
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-24"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16168/">CVE-2019-16168</cve>
	<bugzilla href="https://bugzilla.suse.com/1150137">SUSE bug 1150137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333981" comment="sqlite2 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16711</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16711" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16711" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16711" ref_url="https://www.suse.com/security/cve/CVE-2019-16711" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2785-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2515-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-40 has a memory leak in Huffman2DEncodeImage in coders/ps2.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16711/">CVE-2019-16711</cve>
	<bugzilla href="https://bugzilla.suse.com/1151784">SUSE bug 1151784</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16712</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16712" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16712" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16712" ref_url="https://www.suse.com/security/cve/CVE-2019-16712" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2785-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2515-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-43 has a memory leak in Huffman2DEncodeImage in coders/ps3.c, as demonstrated by WritePS3Image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16712/">CVE-2019-16712</cve>
	<bugzilla href="https://bugzilla.suse.com/1151785">SUSE bug 1151785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16927</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16927" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16927" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16927" ref_url="https://www.suse.com/security/cve/CVE-2019-16927" source="SUSE CVE"/>
    <description>
    Xpdf 4.01.01 has an out-of-bounds write in the vertProfile part of the TextPage::findGaps function in TextOutputDev.cc, a different vulnerability than CVE-2019-9877.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16927/">CVE-2019-16927</cve>
	<bugzilla href="https://bugzilla.suse.com/1154829">SUSE bug 1154829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334297" comment="poppler is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334297" comment="poppler is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339330" comment="xpdf is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17064</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17064" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17064" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17064" ref_url="https://www.suse.com/security/cve/CVE-2019-17064" source="SUSE CVE"/>
    <description>
    Catalog.cc in Xpdf 4.02 has a NULL pointer dereference because Catalog.pageLabels is initialized too late in the Catalog constructor.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17064/">CVE-2019-17064</cve>
	<bugzilla href="https://bugzilla.suse.com/1152783">SUSE bug 1152783</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334297" comment="poppler is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334297" comment="poppler is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339330" comment="xpdf is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917514" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17514</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17514" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17514" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17514" ref_url="https://www.suse.com/security/cve/CVE-2019-17514" source="SUSE CVE"/>
    <description>
    library/glob.html in the Python 2 and 3 documentation before 2016 has potentially misleading information about whether sorting occurs, as demonstrated by irreproducible cancer-research results. NOTE: the effects of this documentation cross application domains, and thus it is likely that security-relevant code elsewhere is affected. This issue is not a Python implementation bug, and there are no reports that NMR researchers were specifically relying on library/glob.html. In other words, because the older documentation stated "finds all the pathnames matching a specified pattern according to the rules used by the Unix shell," one might have incorrectly inferred that the sorting that occurs in a Unix shell also occurred for glob.glob. There is a workaround in newer versions of Willoughby nmr-data_compilation-p2.py and nmr-data_compilation-p3.py, which call sort() directly.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-17514/">CVE-2019-17514</cve>
	<bugzilla href="https://bugzilla.suse.com/1154297">SUSE bug 1154297</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334122" comment="python is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17541</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17541" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17541" ref_url="https://www.suse.com/security/cve/CVE-2019-17541" source="SUSE CVE"/>
    <description>
    ImageMagick before 7.0.8-55 has a use-after-free in DestroyStringInfo in MagickCore/string.c because the error manager is mishandled in coders/jpeg.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-01-08"/>
	<updated date="2022-01-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-17541/">CVE-2019-17541</cve>
	<bugzilla href="https://bugzilla.suse.com/1153867">SUSE bug 1153867</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17547</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17547" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17547" ref_url="https://www.suse.com/security/cve/CVE-2019-17547" source="SUSE CVE"/>
    <description>
    In ImageMagick before 7.0.8-62, TraceBezier in MagickCore/draw.c has a use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-01-08"/>
	<updated date="2022-01-08"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-17547/">CVE-2019-17547</cve>
	<bugzilla href="https://bugzilla.suse.com/1153868">SUSE bug 1153868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18282</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18282" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18282" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18282" ref_url="https://www.suse.com/security/cve/CVE-2019-18282" source="SUSE CVE"/>
    <description>
    The flow_dissector feature in the Linux kernel 4.3 through 5.x before 5.3.10 has a device tracking vulnerability, aka CID-55667441c84f. This occurs because the auto flowlabel of a UDP IPv6 packet relies on a 32-bit hashrnd value as a secret, and because jhash (instead of siphash) is used. The hashrnd value remains the same starting from boot time, and can be inferred by an attacker. This affects net/core/flow_dissector.c and related code.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-11-04"/>
	<updated date="2021-11-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18282/">CVE-2019-18282</cve>
	<bugzilla href="https://bugzilla.suse.com/1161121">SUSE bug 1161121</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18683</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18683" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18683" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18683" ref_url="https://www.suse.com/security/cve/CVE-2019-18683" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in drivers/media/platform/vivid in the Linux kernel through 5.3.8. It is exploitable for privilege escalation on some Linux distributions where local users have /dev/video0 access, but only if the driver happens to be loaded. There are multiple race conditions during streaming stopping in this driver (part of the V4L2 subsystem). These issues are caused by wrong mutex locking in vivid_stop_generating_vid_cap(), vivid_stop_generating_vid_out(), sdr_cap_stop_streaming(), and the corresponding kthreads. At least one of these race conditions leads to a use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18683/">CVE-2019-18683</cve>
	<bugzilla href="https://bugzilla.suse.com/1155897">SUSE bug 1155897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173868">SUSE bug 1173868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18853</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18853" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18853" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18853" ref_url="https://www.suse.com/security/cve/CVE-2019-18853" source="SUSE CVE"/>
    <description>
    ImageMagick before 7.0.9-0 allows remote attackers to cause a denial of service because XML_PARSE_HUGE is not properly restricted in coders/svg.c, related to SVG and libxml2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-18853/">CVE-2019-18853</cve>
	<bugzilla href="https://bugzilla.suse.com/1156520">SUSE bug 1156520</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18885</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18885" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18885" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18885" ref_url="https://www.suse.com/security/cve/CVE-2019-18885" source="SUSE CVE"/>
    <description>
    fs/btrfs/volumes.c in the Linux kernel before 5.1 allows a btrfs_verify_dev_extents NULL pointer dereference via a crafted btrfs image because fs_devices-&gt;devices is mishandled within find_device, aka CID-09ba3bc9dd15.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18885/">CVE-2019-18885</cve>
	<bugzilla href="https://bugzilla.suse.com/1156901">SUSE bug 1156901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919057" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19057</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19057" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19057" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19057" ref_url="https://www.suse.com/security/cve/CVE-2019-19057" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures, aka CID-d10dcb615c8e.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19057/">CVE-2019-19057</cve>
	<bugzilla href="https://bugzilla.suse.com/1157193">SUSE bug 1157193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157197">SUSE bug 1157197</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19062</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19062" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19062" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19062" ref_url="https://www.suse.com/security/cve/CVE-2019-19062" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    A memory leak in the crypto_report() function in crypto/crypto_user_base.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering crypto_report_alg() failures, aka CID-ffdde5932042.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19062/">CVE-2019-19062</cve>
	<bugzilla href="https://bugzilla.suse.com/1157333">SUSE bug 1157333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19063</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19063" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19063" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19063" ref_url="https://www.suse.com/security/cve/CVE-2019-19063" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption), aka CID-3f9361695113.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19063/">CVE-2019-19063</cve>
	<bugzilla href="https://bugzilla.suse.com/1157298">SUSE bug 1157298</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19071</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19071" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19071" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19071" ref_url="https://www.suse.com/security/cve/CVE-2019-19071" source="SUSE CVE"/>
    <description>
    A memory leak in the rsi_send_beacon() function in drivers/net/wireless/rsi/rsi_91x_mgmt.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering rsi_prepare_beacon() failures, aka CID-d563131ef23c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19071/">CVE-2019-19071</cve>
	<bugzilla href="https://bugzilla.suse.com/1157067">SUSE bug 1157067</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19077</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19077" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19077" ref_url="https://www.suse.com/security/cve/CVE-2019-19077" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    A memory leak in the bnxt_re_create_srq() function in drivers/infiniband/hw/bnxt_re/ib_verbs.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering copy to udata failures, aka CID-4a9d46a9fe14.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-03-08"/>
	<updated date="2022-03-17"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19077/">CVE-2019-19077</cve>
	<bugzilla href="https://bugzilla.suse.com/1157171">SUSE bug 1157171</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19078</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19078" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19078" ref_url="https://www.suse.com/security/cve/CVE-2019-19078" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    A memory leak in the ath10k_usb_hif_tx_sg() function in drivers/net/wireless/ath/ath10k/usb.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-b8d17e7d93d2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19078/">CVE-2019-19078</cve>
	<bugzilla href="https://bugzilla.suse.com/1157032">SUSE bug 1157032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919082" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19082</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19082" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19082" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19082" ref_url="https://www.suse.com/security/cve/CVE-2019-19082" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    Memory leaks in *create_resource_pool() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption). This affects the dce120_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c, the dce110_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c, the dce100_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce100/dce100_resource.c, the dcn10_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dcn10/dcn10_resource.c, and the dce112_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce112/dce112_resource.c, aka CID-104c307147ad.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19082/">CVE-2019-19082</cve>
	<bugzilla href="https://bugzilla.suse.com/1157046">SUSE bug 1157046</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19242</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19242" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19242" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19242" ref_url="https://www.suse.com/security/cve/CVE-2019-19242" source="SUSE CVE"/>
    <description>
    SQLite 3.30.1 mishandles pExpr-&gt;y.pTab, as demonstrated by the TK_COLUMN case in sqlite3ExprCodeTarget in expr.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19242/">CVE-2019-19242</cve>
	<bugzilla href="https://bugzilla.suse.com/1157817">SUSE bug 1157817</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333981" comment="sqlite2 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19244</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19244" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19244" ref_url="https://www.suse.com/security/cve/CVE-2019-19244" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    sqlite3Select in select.c in SQLite 3.30.1 allows a crash if a sub-select uses both DISTINCT and window functions, and also has certain ORDER BY usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19244/">CVE-2019-19244</cve>
	<bugzilla href="https://bugzilla.suse.com/1157817">SUSE bug 1157817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157818">SUSE bug 1157818</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333981" comment="sqlite2 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19252</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19252" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19252" ref_url="https://www.suse.com/security/cve/CVE-2019-19252" source="SUSE CVE"/>
    <description>
    vcs_write in drivers/tty/vt/vc_screen.c in the Linux kernel through 5.3.13 does not prevent write access to vcsu devices, aka CID-0c9acb1af77a.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19252/">CVE-2019-19252</cve>
	<bugzilla href="https://bugzilla.suse.com/1157813">SUSE bug 1157813</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919332" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19332</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19332" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19332" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19332" ref_url="https://www.suse.com/security/cve/CVE-2019-19332" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds memory write issue was found in the Linux Kernel, version 3.13 through 5.4, in the way the Linux kernel's KVM hypervisor handled the 'KVM_GET_EMULATED_CPUID' ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the '/dev/kvm' device could use this flaw to crash the system, resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-05"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19332/">CVE-2019-19332</cve>
	<bugzilla href="https://bugzilla.suse.com/1158827">SUSE bug 1158827</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19645</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19645" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19645" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19645" ref_url="https://www.suse.com/security/cve/CVE-2019-19645" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    alter.c in SQLite through 3.30.1 allows attackers to trigger infinite recursion via certain types of self-referential views in conjunction with ALTER TABLE statements.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19645/">CVE-2019-19645</cve>
	<bugzilla href="https://bugzilla.suse.com/1158958">SUSE bug 1158958</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919880" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19880</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19880" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19880" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19880" ref_url="https://www.suse.com/security/cve/CVE-2019-19880" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    exprListAppendList in window.c in SQLite 3.30.1 allows attackers to trigger an invalid pointer dereference because constant integer values in ORDER BY clauses of window definitions are mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19880/">CVE-2019-19880</cve>
	<bugzilla href="https://bugzilla.suse.com/1159491">SUSE bug 1159491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159715">SUSE bug 1159715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162833">SUSE bug 1162833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333981" comment="sqlite2 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19923</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19923" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19923" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19923" ref_url="https://www.suse.com/security/cve/CVE-2019-19923" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    flattenSubquery in select.c in SQLite 3.30.1 mishandles certain uses of SELECT DISTINCT involving a LEFT JOIN in which the right-hand side is a view. This can cause a NULL pointer dereference (or incorrect results).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19923/">CVE-2019-19923</cve>
	<bugzilla href="https://bugzilla.suse.com/1160309">SUSE bug 1160309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162833">SUSE bug 1162833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333981" comment="sqlite2 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19924</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19924" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19924" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19924" ref_url="https://www.suse.com/security/cve/CVE-2019-19924" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    SQLite 3.30.1 mishandles certain parser-tree rewriting, related to expr.c, vdbeaux.c, and window.c. This is caused by incorrect sqlite3WindowRewrite() error handling.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-19924/">CVE-2019-19924</cve>
	<bugzilla href="https://bugzilla.suse.com/1159850">SUSE bug 1159850</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333981" comment="sqlite2 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19925</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19925" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19925" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19925" ref_url="https://www.suse.com/security/cve/CVE-2019-19925" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    zipfileUpdate in ext/misc/zipfile.c in SQLite 3.30.1 mishandles a NULL pathname during an update of a ZIP archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-04"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19925/">CVE-2019-19925</cve>
	<bugzilla href="https://bugzilla.suse.com/1159847">SUSE bug 1159847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162833">SUSE bug 1162833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333981" comment="sqlite2 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19926</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19926" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19926" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19926" ref_url="https://www.suse.com/security/cve/CVE-2019-19926" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    multiSelect in select.c in SQLite 3.30.1 mishandles certain errors during parsing, as demonstrated by errors from sqlite3WindowRewrite() calls. NOTE: this vulnerability exists because of an incomplete fix for CVE-2019-19880.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-04"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19926/">CVE-2019-19926</cve>
	<bugzilla href="https://bugzilla.suse.com/1159491">SUSE bug 1159491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159715">SUSE bug 1159715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162833">SUSE bug 1162833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333981" comment="sqlite2 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19951</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19951" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19951" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19951" ref_url="https://www.suse.com/security/cve/CVE-2019-19951" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0055-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0145-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00064.html" source="SUSE-SU"/>
    <description>
    In GraphicsMagick 1.4 snapshot-20190423 Q8, there is a heap-based buffer overflow in the function ImportRLEPixels of coders/miff.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19951/">CVE-2019-19951</cve>
	<bugzilla href="https://bugzilla.suse.com/1160321">SUSE bug 1160321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19952</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19952" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19952" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19952" ref_url="https://www.suse.com/security/cve/CVE-2019-19952" source="SUSE CVE"/>
    <description>
    In ImageMagick 7.0.9-7 Q16, there is a use-after-free in the function MngInfoDiscardObject of coders/png.c, related to ReadOneMNGImage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-19952/">CVE-2019-19952</cve>
	<bugzilla href="https://bugzilla.suse.com/1160426">SUSE bug 1160426</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19953</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19953" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19953" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19953" ref_url="https://www.suse.com/security/cve/CVE-2019-19953" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0055-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0145-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00064.html" source="SUSE-SU"/>
    <description>
    In GraphicsMagick 1.4 snapshot-20191208 Q8, there is a heap-based buffer over-read in the function EncodeImage of coders/pict.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19953/">CVE-2019-19953</cve>
	<bugzilla href="https://bugzilla.suse.com/1160364">SUSE bug 1160364</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19959</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19959" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19959" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19959" ref_url="https://www.suse.com/security/cve/CVE-2019-19959" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    ext/misc/zipfile.c in SQLite 3.30.1 mishandles certain uses of INSERT INTO in situations involving embedded '\0' characters in filenames, leading to a memory-management error that can be detected by (for example) valgrind.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19959/">CVE-2019-19959</cve>
	<bugzilla href="https://bugzilla.suse.com/1160438">SUSE bug 1160438</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333981" comment="sqlite2 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20218</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20218" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20218" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20218" ref_url="https://www.suse.com/security/cve/CVE-2019-20218" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    selectExpander in select.c in SQLite 3.30.1 proceeds with WITH stack unwinding even after a parsing error.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-04"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20218/">CVE-2019-20218</cve>
	<bugzilla href="https://bugzilla.suse.com/1160439">SUSE bug 1160439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189840">SUSE bug 1189840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190372">SUSE bug 1190372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192495">SUSE bug 1192495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193078">SUSE bug 1193078</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333981" comment="sqlite2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20808</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20808" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20808" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20808" ref_url="https://www.suse.com/security/cve/CVE-2019-20808" source="SUSE CVE"/>
    <description>
    In QEMU 4.1.0, an out-of-bounds read flaw was found in the ATI VGA implementation. It occurs in the ati_cursor_define() routine while handling MMIO write operations through the ati_mm_write() callback. A malicious guest could abuse this flaw to crash the QEMU process, resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20808/">CVE-2019-20808</cve>
	<bugzilla href="https://bugzilla.suse.com/1172379">SUSE bug 1172379</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334251" comment="kvm is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3819</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3819" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3819" ref_url="https://www.suse.com/security/cve/CVE-2019-3819" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0784-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190784-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0785-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190785-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005881.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1193-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00052.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may enter an infinite loop with certain parameters passed from a userspace. A local privileged user ("root") can cause a system lock up and a denial of service. Versions from v4.18 and newer are vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3819/">CVE-2019-3819</cve>
	<bugzilla href="https://bugzilla.suse.com/1123161">SUSE bug 1123161</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3882</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3882" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3882" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3882" ref_url="https://www.suse.com/security/cve/CVE-2019-3882" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's vfio interface implementation that permits violation of the user's locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a system memory exhaustion and thus a denial of service (DoS). Versions 3.10, 4.14 and 4.18 are vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3882/">CVE-2019-3882</cve>
	<bugzilla href="https://bugzilla.suse.com/1131416">SUSE bug 1131416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131427">SUSE bug 1131427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133319">SUSE bug 1133319</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5008</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5008" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5008" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5008" ref_url="https://www.suse.com/security/cve/CVE-2019-5008" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005833.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2041-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00000.html" source="SUSE-SU"/>
    <description>
    hw/sparc64/sun4u.c in QEMU 3.1.50 is vulnerable to a NULL pointer dereference, which allows the attacker to cause a denial of service via a device driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5008/">CVE-2019-5008</cve>
	<bugzilla href="https://bugzilla.suse.com/1133031">SUSE bug 1133031</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334251" comment="kvm is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5018</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5018" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5018" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5018" ref_url="https://www.suse.com/security/cve/CVE-2019-5018" source="SUSE CVE"/>
    <description>
    An exploitable use after free vulnerability exists in the window function functionality of Sqlite3 3.26.0. A specially crafted SQL command can cause a use after free vulnerability, potentially resulting in remote code execution. An attacker can send a malicious SQL command to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5018/">CVE-2019-5018</cve>
	<bugzilla href="https://bugzilla.suse.com/1134622">SUSE bug 1134622</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333981" comment="sqlite2 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6116</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6116" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6116" ref_url="https://www.suse.com/security/cve/CVE-2019-6116" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0144-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0103-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0104-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00047.html" source="SUSE-SU"/>
    <description>
    In Artifex Ghostscript through 9.26, ephemeral or transient procedures can allow access to system operators, leading to remote code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6116/">CVE-2019-6116</cve>
	<bugzilla href="https://bugzilla.suse.com/1122319">SUSE bug 1122319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129186">SUSE bug 1129186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134156">SUSE bug 1134156</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334270" comment="ghostscript-library is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8457</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8457" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8457" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8457" ref_url="https://www.suse.com/security/cve/CVE-2019-8457" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00074.html" source="SUSE-SU"/>
    <description>
    SQLite3 from 3.6.0 to and including 3.27.2 is vulnerable to heap out-of-bound read in the rtreenode() function when handling invalid rtree tables.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-09-24"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-8457/">CVE-2019-8457</cve>
	<bugzilla href="https://bugzilla.suse.com/1136976">SUSE bug 1136976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154162">SUSE bug 1154162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333981" comment="sqlite2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9936</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9936" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9936" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9936" ref_url="https://www.suse.com/security/cve/CVE-2019-9936" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005419.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1372-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00026.html" source="SUSE-SU"/>
    <description>
    In SQLite 3.27.2, running fts5 prefix queries inside a transaction could trigger a heap-based buffer over-read in fts5HashEntrySort in sqlite3.c, which may lead to an information leak. This is related to ext/fts5/fts5_hash.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9936/">CVE-2019-9936</cve>
	<bugzilla href="https://bugzilla.suse.com/1130326">SUSE bug 1130326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154162">SUSE bug 1154162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333981" comment="sqlite2 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9937</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9937" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9937" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9937" ref_url="https://www.suse.com/security/cve/CVE-2019-9937" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005419.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1372-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00026.html" source="SUSE-SU"/>
    <description>
    In SQLite 3.27.2, interleaving reads and writes in a single transaction with an fts5 virtual table will lead to a NULL Pointer Dereference in fts5ChunkIterate in sqlite3.c. This is related to ext/fts5/fts5_hash.c and ext/fts5/fts5_index.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-08-02"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9937/">CVE-2019-9937</cve>
	<bugzilla href="https://bugzilla.suse.com/1130325">SUSE bug 1130325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154162">SUSE bug 1154162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333981" comment="sqlite2 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10251</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10251" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10251" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10251" ref_url="https://www.suse.com/security/cve/CVE-2020-10251" source="SUSE CVE"/>
    <description>
    In ImageMagick 7.0.9, an out-of-bounds read vulnerability exists within the ReadHEICImageByID function in coders\heic.c. It can be triggered via an image with a width or height value that exceeds the actual size of the image.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10251/">CVE-2020-10251</cve>
	<bugzilla href="https://bugzilla.suse.com/1166225">SUSE bug 1166225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10702</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10702" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10702" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10702" ref_url="https://www.suse.com/security/cve/CVE-2020-10702" source="SUSE CVE"/>
    <description>
    A flaw was found in QEMU in the implementation of the Pointer Authentication (PAuth) support for ARM introduced in version 4.0 and fixed in version 5.0.0. A general failure of the signature generation process caused every PAuth-enforced pointer to be signed with the same signature. A local attacker could obtain the signature of a protected pointer and abuse this flaw to bypass PAuth protection for all programs running on QEMU.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10702/">CVE-2020-10702</cve>
	<bugzilla href="https://bugzilla.suse.com/1168681">SUSE bug 1168681</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334251" comment="kvm is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10717</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10717" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10717" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10717" ref_url="https://www.suse.com/security/cve/CVE-2020-10717" source="SUSE CVE"/>
    <description>
    A potential DoS flaw was found in the virtio-fs shared file system daemon (virtiofsd) implementation of the QEMU version &gt;= v5.0. Virtio-fs is meant to share a host file system directory with a guest via virtio-fs device. If the guest opens the maximum number of file descriptors under the shared directory, a denial of service may occur. This flaw allows a guest user/process to cause this denial of service on the host.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10717/">CVE-2020-10717</cve>
	<bugzilla href="https://bugzilla.suse.com/1171110">SUSE bug 1171110</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334251" comment="kvm is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10756</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10756" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10756" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10756" ref_url="https://www.suse.com/security/cve/CVE-2020-10756" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008990.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0987-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0994-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1043-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVDDMT7IUGYOEFTYO3UWD73PJMJL4FSY/" source="SUSE-SU"/>
    <description>
    An out-of-bounds read vulnerability was found in the SLiRP networking implementation of the QEMU emulator. This flaw occurs in the icmp6_send_echoreply() routine while replying to an ICMP echo request, also known as ping. This flaw allows a malicious guest to leak the contents of the host memory, resulting in possible information disclosure. This flaw affects versions of libslirp before 4.3.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10756/">CVE-2020-10756</cve>
	<bugzilla href="https://bugzilla.suse.com/1172380">SUSE bug 1172380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184743">SUSE bug 1184743</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334251" comment="kvm is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10761</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10761" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10761" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10761" ref_url="https://www.suse.com/security/cve/CVE-2020-10761" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007171.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00086.html" source="SUSE-SU"/>
    <description>
    An assertion failure issue was found in the Network Block Device(NBD) Server in all QEMU versions before QEMU 5.0.1. This flaw occurs when an nbd-client sends a spec-compliant request that is near the boundary of maximum permitted request length. A remote nbd-client could use this flaw to crash the qemu-nbd server resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10761/">CVE-2020-10761</cve>
	<bugzilla href="https://bugzilla.suse.com/1172710">SUSE bug 1172710</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334251" comment="kvm is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11102</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11102" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11102" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11102" ref_url="https://www.suse.com/security/cve/CVE-2020-11102" source="SUSE CVE"/>
    <description>
    hw/net/tulip.c in QEMU 4.2.0 has a buffer overflow during the copying of tx/rx buffers because the frame size is not validated against the r/w data length.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11102/">CVE-2020-11102</cve>
	<bugzilla href="https://bugzilla.suse.com/1168713">SUSE bug 1168713</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334251" comment="kvm is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11655</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11655" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11655" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11655" ref_url="https://www.suse.com/security/cve/CVE-2020-11655" source="SUSE CVE"/>
    <description>
    SQLite through 3.31.1 allows attackers to cause a denial of service (segmentation fault) via a malformed window-function query because the AggInfo object's initialization is mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11655/">CVE-2020-11655</cve>
	<bugzilla href="https://bugzilla.suse.com/1169126">SUSE bug 1169126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333981" comment="sqlite2 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11656</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11656" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11656" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11656" ref_url="https://www.suse.com/security/cve/CVE-2020-11656" source="SUSE CVE"/>
    <description>
    In SQLite through 3.31.1, the ALTER TABLE implementation has a use-after-free, as demonstrated by an ORDER BY clause that belongs to a compound SELECT statement.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-11656/">CVE-2020-11656</cve>
	<bugzilla href="https://bugzilla.suse.com/1169111">SUSE bug 1169111</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333981" comment="sqlite2 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11869</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11869" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11869" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11869" ref_url="https://www.suse.com/security/cve/CVE-2020-11869" source="SUSE CVE"/>
    <description>
    An integer overflow was found in QEMU 4.0.1 through 4.2.0 in the way it implemented ATI VGA emulation. This flaw occurs in the ati_2d_blt() routine in hw/display/ati-2d.c while handling MMIO write operations through the ati_mm_write() callback. A malicious guest could abuse this flaw to crash the QEMU process, resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-07-23"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11869/">CVE-2020-11869</cve>
	<bugzilla href="https://bugzilla.suse.com/1170537">SUSE bug 1170537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188609">SUSE bug 1188609</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334251" comment="kvm is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12268</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12268" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12268" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12268" ref_url="https://www.suse.com/security/cve/CVE-2020-12268" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006802.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0653-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00034.html" source="SUSE-SU"/>
    <description>
    jbig2_image_compose in jbig2_image.c in Artifex jbig2dec before 0.18 has a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-12268/">CVE-2020-12268</cve>
	<bugzilla href="https://bugzilla.suse.com/1170603">SUSE bug 1170603</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334270" comment="ghostscript-library is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12829</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12829" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12829" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12829" ref_url="https://www.suse.com/security/cve/CVE-2020-12829" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0600-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATYM36RK6JXDXZ33F2KFHZHDZ3F3YD24/" source="SUSE-SU"/>
    <description>
    In QEMU through 5.0.0, an integer overflow was found in the SM501 display driver implementation. This flaw occurs in the COPY_AREA macro while handling MMIO write operations through the sm501_2d_engine_write() callback. A local attacker could abuse this flaw to crash the QEMU process in sm501_2d_operation() in hw/display/sm501.c on the host, resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12829/">CVE-2020-12829</cve>
	<bugzilla href="https://bugzilla.suse.com/1172385">SUSE bug 1172385</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334251" comment="kvm is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13362</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13362" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13362" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13362" ref_url="https://www.suse.com/security/cve/CVE-2020-13362" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00086.html" source="SUSE-SU"/>
    <description>
    In QEMU 5.0.0 and earlier, megasas_lookup_frame in hw/scsi/megasas.c has an out-of-bounds read via a crafted reply_queue_head field from a guest OS user.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-04"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13362/">CVE-2020-13362</cve>
	<bugzilla href="https://bugzilla.suse.com/1172383">SUSE bug 1172383</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334251" comment="kvm is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13434</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13434" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13434" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13434" ref_url="https://www.suse.com/security/cve/CVE-2020-13434" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    SQLite through 3.32.0 has an integer overflow in sqlite3_str_vappendf in printf.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13434/">CVE-2020-13434</cve>
	<bugzilla href="https://bugzilla.suse.com/1172115">SUSE bug 1172115</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333981" comment="sqlite2 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13435</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13435" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13435" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13435" ref_url="https://www.suse.com/security/cve/CVE-2020-13435" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    SQLite through 3.32.0 has a segmentation fault in sqlite3ExprCodeTarget in expr.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-04"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13435/">CVE-2020-13435</cve>
	<bugzilla href="https://bugzilla.suse.com/1172091">SUSE bug 1172091</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333981" comment="sqlite2 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13630</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13630" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13630" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13630" ref_url="https://www.suse.com/security/cve/CVE-2020-13630" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    ext/fts3/fts3.c in SQLite before 3.32.0 has a use-after-free in fts3EvalNextRow, related to the snippet feature.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13630/">CVE-2020-13630</cve>
	<bugzilla href="https://bugzilla.suse.com/1172234">SUSE bug 1172234</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333981" comment="sqlite2 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13631</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13631" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13631" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13631" ref_url="https://www.suse.com/security/cve/CVE-2020-13631" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    SQLite before 3.32.0 allows a virtual table to be renamed to the name of one of its shadow tables, related to alter.c and build.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-13631/">CVE-2020-13631</cve>
	<bugzilla href="https://bugzilla.suse.com/1172236">SUSE bug 1172236</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333981" comment="sqlite2 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13632</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13632" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13632" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13632" ref_url="https://www.suse.com/security/cve/CVE-2020-13632" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    ext/fts3/fts3_snippet.c in SQLite before 3.32.0 has a NULL pointer dereference via a crafted matchinfo() query.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13632/">CVE-2020-13632</cve>
	<bugzilla href="https://bugzilla.suse.com/1172240">SUSE bug 1172240</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333981" comment="sqlite2 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13791</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13791" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13791" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13791" ref_url="https://www.suse.com/security/cve/CVE-2020-13791" source="SUSE CVE"/>
    <description>
    hw/pci/pci.c in QEMU 4.2.0 allows guest OS users to trigger an out-of-bounds access by providing an address near the end of the PCI configuration space.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13791/">CVE-2020-13791</cve>
	<bugzilla href="https://bugzilla.suse.com/1172494">SUSE bug 1172494</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334251" comment="kvm is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13800</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13800" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13800" ref_url="https://www.suse.com/security/cve/CVE-2020-13800" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007171.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00086.html" source="SUSE-SU"/>
    <description>
    ati-vga in hw/display/ati.c in QEMU 4.2.0 allows guest OS users to trigger infinite recursion via a crafted mm_index value during an ati_mm_read or ati_mm_write call.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13800/">CVE-2020-13800</cve>
	<bugzilla href="https://bugzilla.suse.com/1172495">SUSE bug 1172495</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334251" comment="kvm is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13871</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13871" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13871" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13871" ref_url="https://www.suse.com/security/cve/CVE-2020-13871" source="SUSE CVE"/>
    <description>
    SQLite 3.32.2 has a use-after-free in resetAccumulator in select.c because the parse tree rewrite for window functions is too late.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-15"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-13871/">CVE-2020-13871</cve>
	<bugzilla href="https://bugzilla.suse.com/1172646">SUSE bug 1172646</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333981" comment="sqlite2 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13902</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13902" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13902" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13902" ref_url="https://www.suse.com/security/cve/CVE-2020-13902" source="SUSE CVE"/>
    <description>
    ImageMagick 7.0.9-27 through 7.0.10-17 has a heap-based buffer over-read in BlobToStringInfo in MagickCore/string.c during TIFF image decoding.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-13902/">CVE-2020-13902</cve>
	<bugzilla href="https://bugzilla.suse.com/1172642">SUSE bug 1172642</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14373</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14373" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14373" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14373" ref_url="https://www.suse.com/security/cve/CVE-2020-14373" source="SUSE CVE"/>
    <description>
    A use after free was found in igc_reloc_struct_ptr() of psi/igc.c of ghostscript-9.25. A local attacker could supply a specially crafted PDF file to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14373/">CVE-2020-14373</cve>
	<bugzilla href="https://bugzilla.suse.com/1176133">SUSE bug 1176133</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334270" comment="ghostscript-library is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14415</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14415" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14415" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14415" ref_url="https://www.suse.com/security/cve/CVE-2020-14415" source="SUSE CVE"/>
    <description>
    oss_write in audio/ossaudio.c in QEMU before 5.0.0 mishandles a buffer position.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14415/">CVE-2020-14415</cve>
	<bugzilla href="https://bugzilla.suse.com/1173109">SUSE bug 1173109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334251" comment="kvm is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14422</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14422" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14422" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14422" ref_url="https://www.suse.com/security/cve/CVE-2020-14422" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008118.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0931-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0940-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0989-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1002-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2332-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S3JTHM6LLDKL7VPNRJUSRPNZAD2FZ25H/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2333-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLGERALYYFTBIX3ZKPM6EQ2WJVUXLOXY/" source="SUSE-SU"/>
    <description>
    Lib/ipaddress.py in Python through 3.8.3 improperly computes hash values in the IPv4Interface and IPv6Interface classes, which might allow a remote attacker to cause a denial of service if an application is affected by the performance of a dictionary containing IPv4Interface or IPv6Interface objects, and this attacker can cause many dictionary entries to be created. This is fixed in: v3.5.10, v3.5.10rc1; v3.6.12; v3.7.9; v3.8.4, v3.8.4rc1, v3.8.5, v3.8.6, v3.8.6rc1; v3.9.0, v3.9.0b4, v3.9.0b5, v3.9.0rc1, v3.9.0rc2.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-01-28"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14422/">CVE-2020-14422</cve>
	<bugzilla href="https://bugzilla.suse.com/1173274">SUSE bug 1173274</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334122" comment="python is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15304</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15304" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15304" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15304" ref_url="https://www.suse.com/security/cve/CVE-2020-15304" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007164.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0970-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1015-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00048.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in OpenEXR before 2.5.2. An invalid tiled input file could cause invalid memory access in TiledInputFile::TiledInputFile() in IlmImf/ImfTiledInputFile.cpp, as demonstrated by a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15304/">CVE-2020-15304</cve>
	<bugzilla href="https://bugzilla.suse.com/1173466">SUSE bug 1173466</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334308" comment="OpenEXR is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15305</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15305" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15305" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15305" ref_url="https://www.suse.com/security/cve/CVE-2020-15305" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007164.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0970-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1015-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00048.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in OpenEXR before 2.5.2. Invalid input could cause a use-after-free in DeepScanLineInputFile::DeepScanLineInputFile() in IlmImf/ImfDeepScanLineInputFile.cpp.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2020-15305/">CVE-2020-15305</cve>
	<bugzilla href="https://bugzilla.suse.com/1173467">SUSE bug 1173467</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334308" comment="OpenEXR is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015306" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15306</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15306" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15306" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15306" ref_url="https://www.suse.com/security/cve/CVE-2020-15306" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007164.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0970-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1015-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00048.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in OpenEXR before v2.5.2. Invalid chunkCount attributes could cause a heap buffer overflow in getChunkOffsetTableSize() in IlmImf/ImfMisc.cpp.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2020-15306/">CVE-2020-15306</cve>
	<bugzilla href="https://bugzilla.suse.com/1173469">SUSE bug 1173469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334308" comment="OpenEXR is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015358" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15358</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15358" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15358" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15358" ref_url="https://www.suse.com/security/cve/CVE-2020-15358" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    In SQLite before 3.32.3, select.c mishandles query-flattener optimization, leading to a multiSelectOrderBy heap overflow because of misuse of transitive properties for constant propagation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15358/">CVE-2020-15358</cve>
	<bugzilla href="https://bugzilla.suse.com/1173641">SUSE bug 1173641</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333981" comment="sqlite2 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015365" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15365</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15365" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15365" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15365" ref_url="https://www.suse.com/security/cve/CVE-2020-15365" source="SUSE CVE"/>
    <description>
    LibRaw before 0.20-Beta3 has an out-of-bounds write in parse_exif() in metadata\exif_gps.cpp via an unrecognized AtomName and a zero value of tiff_nifds.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15365/">CVE-2020-15365</cve>
	<bugzilla href="https://bugzilla.suse.com/1173517">SUSE bug 1173517</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15389</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15389" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15389" ref_url="https://www.suse.com/security/cve/CVE-2020-15389" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010791.html" source="SUSE-SU"/>
    <description>
    jp2/opj_decompress.c in OpenJPEG through 2.3.1 has a use-after-free that can be triggered if there is a mix of valid and invalid files in a directory operated on by the decompressor. Triggering a double-free may also be possible. This is related to calling opj_image_destroy twice.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-22"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15389/">CVE-2020-15389</cve>
	<bugzilla href="https://bugzilla.suse.com/1173578">SUSE bug 1173578</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334270" comment="ghostscript-library is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15523</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15523" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15523" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15523" ref_url="https://www.suse.com/security/cve/CVE-2020-15523" source="SUSE CVE"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    In Python 3.6 through 3.6.10, 3.7 through 3.7.8, 3.8 through 3.8.4rc1, and 3.9 through 3.9.0b4 on Windows, a Trojan horse python3.dll might be used in cases where CPython is embedded in a native application. This occurs because python3X.dll may use an invalid search path for python3.dll loading (after Py_SetPath has been used). NOTE: this issue CANNOT occur when using python.exe from a standard (non-embedded) Python installation on Windows.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-17"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15523/">CVE-2020-15523</cve>
	<bugzilla href="https://bugzilla.suse.com/1173745">SUSE bug 1173745</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334122" comment="python is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15704</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15704" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15704" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15704" ref_url="https://www.suse.com/security/cve/CVE-2020-15704" source="SUSE CVE"/>
    <description>
    The modprobe child process in the ./debian/patches/load_ppp_generic_if_needed patch file incorrectly handled module loading. A local non-root attacker could exploit the MODPROBE_OPTIONS environment variable to read arbitrary root files. Fixed in 2.4.5-5ubuntu1.4, 2.4.5-5.1ubuntu2.3+esm2, 2.4.7-1+2ubuntu1.16.04.3, 2.4.7-2+2ubuntu1.3, 2.4.7-2+4.1ubuntu5.1, 2.4.7-2+4.1ubuntu6. Was ZDI-CAN-11504.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15704/">CVE-2020-15704</cve>
	<bugzilla href="https://bugzilla.suse.com/1174891">SUSE bug 1174891</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339004" comment="ppp is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15801</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15801" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15801" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15801" ref_url="https://www.suse.com/security/cve/CVE-2020-15801" source="SUSE CVE"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    In Python 3.8.4, sys.path restrictions specified in a python38._pth file are ignored, allowing code to be loaded from arbitrary locations. The &lt;executable-name&gt;._pth file (e.g., the python._pth file) is not affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-17"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15801/">CVE-2020-15801</cve>
	<bugzilla href="https://bugzilla.suse.com/1174241">SUSE bug 1174241</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334122" comment="python is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015859" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15859</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15859" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15859" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15859" ref_url="https://www.suse.com/security/cve/CVE-2020-15859" source="SUSE CVE"/>
    <description>
    QEMU 4.2.0 has a use-after-free in hw/net/e1000e_core.c because a guest OS user can trigger an e1000e packet with the data's address set to the e1000e's MMIO address.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15859/">CVE-2020-15859</cve>
	<bugzilla href="https://bugzilla.suse.com/1174373">SUSE bug 1174373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334251" comment="kvm is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15863</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15863" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15863" ref_url="https://www.suse.com/security/cve/CVE-2020-15863" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14774-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019812.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00024.html" source="SUSE-SU"/>
    <description>
    hw/net/xgmac.c in the XGMAC Ethernet controller in QEMU before 07-20-2020 has a buffer overflow. This occurs during packet transmission and affects the highbank and midway emulated machines. A guest user or process could use this flaw to crash the QEMU process on the host, resulting in a denial of service or potential privileged code execution. This was fixed in commit 5519724a13664b43e225ca05351c60b4468e4555.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-04"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15863/">CVE-2020-15863</cve>
	<bugzilla href="https://bugzilla.suse.com/1174386">SUSE bug 1174386</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334251" comment="kvm is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015889" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15889</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15889" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15889" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15889" ref_url="https://www.suse.com/security/cve/CVE-2020-15889" source="SUSE CVE"/>
    <description>
    Lua 5.4.0 has a getobjname heap-based buffer over-read because youngcollection in lgc.c uses markold for an insufficient number of list members.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2020-15889/">CVE-2020-15889</cve>
	<bugzilla href="https://bugzilla.suse.com/1174371">SUSE bug 1174371</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334180" comment="lua is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15900</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15900" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15900" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15900" ref_url="https://www.suse.com/security/cve/CVE-2020-15900" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007204.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1142-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1146-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00006.html" source="SUSE-SU"/>
    <description>
    A memory corruption issue was found in Artifex Ghostscript 9.50 and 9.52. Use of a non-standard PostScript operator can allow overriding of file access controls. The 'rsearch' calculation for the 'post' size resulted in a size that was too large, and could underflow to max uint32_t. This was fixed in commit 5d499272b95a6b890a1397e11d20937de000d31b.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15900/">CVE-2020-15900</cve>
	<bugzilla href="https://bugzilla.suse.com/1174415">SUSE bug 1174415</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334270" comment="ghostscript-library is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15945</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15945" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15945" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15945" ref_url="https://www.suse.com/security/cve/CVE-2020-15945" source="SUSE CVE"/>
    <description>
    Lua through 5.4.0 has a segmentation fault in changedline in ldebug.c (e.g., when called by luaG_traceexec) because it incorrectly expects that an oldpc value is always updated upon a return of the flow of control to a function.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15945/">CVE-2020-15945</cve>
	<bugzilla href="https://bugzilla.suse.com/1174540">SUSE bug 1174540</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334180" comment="lua is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16092</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16092" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16092" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16092" ref_url="https://www.suse.com/security/cve/CVE-2020-16092" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00024.html" source="SUSE-SU"/>
    <description>
    In QEMU through 5.0.0, an assertion failure can occur in the network packet processing. This issue affects the e1000e and vmxnet3 network devices. A malicious guest user/process could use this flaw to abort the QEMU process on the host, resulting in a denial of service condition in net_tx_pkt_add_raw_fragment in hw/net/net_tx_pkt.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-02-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16092/">CVE-2020-16092</cve>
	<bugzilla href="https://bugzilla.suse.com/1174641">SUSE bug 1174641</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334251" comment="kvm is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1711</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1711" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1711" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1711" ref_url="https://www.suse.com/security/cve/CVE-2020-1711" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006886.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0468-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00007.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds heap buffer access flaw was found in the way the iSCSI Block driver in QEMU versions 2.12.0 before 4.2.1 handled a response coming from an iSCSI server while checking the status of a Logical Address Block (LBA) in an iscsi_co_block_status() routine. A remote user could use this flaw to crash the QEMU process, resulting in a denial of service or potential execution of arbitrary code with privileges of the QEMU process on the host.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-1711/">CVE-2020-1711</cve>
	<bugzilla href="https://bugzilla.suse.com/1166240">SUSE bug 1166240</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334251" comment="kvm is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202017380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-17380</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-17380" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17380" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-17380" ref_url="https://www.suse.com/security/cve/CVE-2020-17380" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008986.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1942-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IEKBDJBTGKO53MSKM3SRYVUQDWIJ2N5I/" source="SUSE-SU"/>
    <description>
    A heap-based buffer overflow was found in QEMU through 5.0.0 in the SDHCI device emulation support. It could occur while doing a multi block SDMA transfer via the sdhci_sdma_transfer_multi_blocks() routine in hw/sd/sdhci.c. A guest user or process could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition, or potentially execute arbitrary code with privileges of the QEMU process on the host.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-07-13"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-17380/">CVE-2020-17380</cve>
	<bugzilla href="https://bugzilla.suse.com/1175144">SUSE bug 1175144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182282">SUSE bug 1182282</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334251" comment="kvm is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1967</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1967" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1967" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1967" ref_url="https://www.suse.com/security/cve/CVE-2020-1967" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007183.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0945-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00011.html" source="SUSE-SU"/>
    <description>
    Server or client applications that call the SSL_check_chain() function during or after a TLS 1.3 handshake may crash due to a NULL pointer dereference as a result of incorrect handling of the "signature_algorithms_cert" TLS extension. The crash occurs if an invalid or unrecognised signature algorithm is received from the peer. This could be exploited by a malicious peer in a Denial of Service attack. OpenSSL version 1.1.1d, 1.1.1e, and 1.1.1f are affected by this issue. This issue did not affect OpenSSL versions prior to 1.1.1d. Fixed in OpenSSL 1.1.1g (Affected 1.1.1d-1.1.1f).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1967/">CVE-2020-1967</cve>
	<bugzilla href="https://bugzilla.suse.com/1169407">SUSE bug 1169407</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334233" comment="compat-openssl097g is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24342</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24342" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24342" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24342" ref_url="https://www.suse.com/security/cve/CVE-2020-24342" source="SUSE CVE"/>
    <description>
    Lua through 5.4.0 allows a stack redzone cross in luaO_pushvfstring because a protection mechanism wrongly calls luaD_callnoyield twice in a row.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-24342/">CVE-2020-24342</cve>
	<bugzilla href="https://bugzilla.suse.com/1175339">SUSE bug 1175339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334180" comment="lua is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024369" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24369</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24369" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24369" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24369" ref_url="https://www.suse.com/security/cve/CVE-2020-24369" source="SUSE CVE"/>
    <description>
    ldebug.c in Lua 5.4.0 attempts to access debug information via the line hook of a stripped function, leading to a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24369/">CVE-2020-24369</cve>
	<bugzilla href="https://bugzilla.suse.com/1175447">SUSE bug 1175447</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334180" comment="lua is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24370</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24370" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24370" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24370" ref_url="https://www.suse.com/security/cve/CVE-2020-24370" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009100.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0962-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OOVDNMRFDTKUTT25LOX5ABPHFFAREA4V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2196-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EASBVV4MIBIGZHO5CD23ITJBJVVHVDEU/" source="SUSE-SU"/>
    <description>
    ldebug.c in Lua 5.4.0 allows a negation overflow and segmentation fault in getlocal and setlocal, as demonstrated by getlocal(3,2^31).
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-24370/">CVE-2020-24370</cve>
	<bugzilla href="https://bugzilla.suse.com/1175448">SUSE bug 1175448</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334180" comment="lua is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24371</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24371" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24371" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24371" ref_url="https://www.suse.com/security/cve/CVE-2020-24371" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009100.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0962-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OOVDNMRFDTKUTT25LOX5ABPHFFAREA4V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2196-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EASBVV4MIBIGZHO5CD23ITJBJVVHVDEU/" source="SUSE-SU"/>
    <description>
    lgc.c in Lua 5.4.0 mishandles the interaction between barriers and the sweep phase, leading to a memory access violation involving collectgarbage.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24371/">CVE-2020-24371</cve>
	<bugzilla href="https://bugzilla.suse.com/1175449">SUSE bug 1175449</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334180" comment="lua is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6851</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6851" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6851" ref_url="https://www.suse.com/security/cve/CVE-2020-6851" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010745.html" source="SUSE-SU"/>
    <description>
    OpenJPEG through 2.3.1 has a heap-based buffer overflow in opj_t1_clbl_decode_processor in openjp2/t1.c because of lack of opj_j2k_update_image_dimensions validation.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6851/">CVE-2020-6851</cve>
	<bugzilla href="https://bugzilla.suse.com/1160782">SUSE bug 1160782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162090">SUSE bug 1162090</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334270" comment="ghostscript-library is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208315" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8315</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8315" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8315" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8315" ref_url="https://www.suse.com/security/cve/CVE-2020-8315" source="SUSE CVE"/>
    <description>
    In Python (CPython) 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1, an insecure dependency load upon launch on Windows 7 may result in an attacker's copy of api-ms-win-core-path-l1-1-0.dll being loaded and used instead of the system's copy. Windows 8 and later are unaffected.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-06-01"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-8315/">CVE-2020-8315</cve>
	<bugzilla href="https://bugzilla.suse.com/1173935">SUSE bug 1173935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334122" comment="python is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9327</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
            <platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9327" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9327" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9327" ref_url="https://www.suse.com/security/cve/CVE-2020-9327" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    In SQLite 3.31.1, isAuxiliaryVtabOperator allows attackers to trigger a NULL pointer dereference and segmentation fault because of generated column optimizations.
    </description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2022-04-04"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-9327/">CVE-2020-9327</cve>
	<bugzilla href="https://bugzilla.suse.com/1164719">SUSE bug 1164719</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333981" comment="sqlite2 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
			</criteria>
		</criteria>
</definition>
</definitions>
<tests>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586719" version="1" comment="krb5 is &lt;1.6.3-133.49.56.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586720" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586721" version="1" comment="krb5-client is &lt;1.6.3-133.49.56.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073771" version="1" comment="sled-release is ==11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077540" version="1" comment="sled-release is ==11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009586750" version="1" comment="mailx is &lt;12.5-1.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334270" version="1" comment="ghostscript-library is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117401" version="1" comment="sled-release is ==11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567423" version="1" comment="libecpg6 is &lt;9.4.6-0.14.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567424" version="1" comment="libpq5 is &lt;9.4.6-0.14.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567425" version="1" comment="libpq5-32bit is &lt;9.4.6-0.14.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567426" version="1" comment="postgresql94 is &lt;9.4.6-0.14.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567427" version="1" comment="postgresql94-docs is &lt;9.4.6-0.14.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009339511" version="1" comment="zsh is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566189" version="1" comment="telepathy-idle is &lt;0.1.5-1.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334017" version="1" comment="kernel-default is ==0" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333928" version="1" comment="kernel-source is ==0" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566185" version="1" comment="ruby is &lt;1.8.7.p357-0.9.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567394" version="1" comment="bytefx-data-mysql is &lt;2.6.7-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567395" version="1" comment="ibm-data-db2 is &lt;2.6.7-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567396" version="1" comment="mono-core is &lt;2.6.7-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567397" version="1" comment="mono-data is &lt;2.6.7-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567398" version="1" comment="mono-data-firebird is &lt;2.6.7-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567399" version="1" comment="mono-data-oracle is &lt;2.6.7-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567400" version="1" comment="mono-data-postgresql is &lt;2.6.7-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567401" version="1" comment="mono-data-sqlite is &lt;2.6.7-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567402" version="1" comment="mono-data-sybase is &lt;2.6.7-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567403" version="1" comment="mono-devel is &lt;2.6.7-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567404" version="1" comment="mono-extras is &lt;2.6.7-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567405" version="1" comment="mono-jscript is &lt;2.6.7-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567406" version="1" comment="mono-locale-extras is &lt;2.6.7-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567407" version="1" comment="mono-nunit is &lt;2.6.7-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567408" version="1" comment="mono-wcf is &lt;2.6.7-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567409" version="1" comment="mono-web is &lt;2.6.7-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567410" version="1" comment="mono-winforms is &lt;2.6.7-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567411" version="1" comment="monodoc-core is &lt;2.6.7-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009587393" version="1" comment="gnutls is &lt;2.4.1-24.39.49.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009587394" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.49.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009587395" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009587402" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.70.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009587403" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009587404" version="1" comment="openssl is &lt;0.9.8j-0.70.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009587785" version="1" comment="xorg-x11-server-rdp is &lt;7.3.99-3.18.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566369" version="1" comment="cabextract is &lt;1.2-2.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566167" version="1" comment="openssh is &lt;5.1p1-41.57.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566168" version="1" comment="openssh-askpass is &lt;5.1p1-41.57.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566855" version="1" comment="libpoppler-glib4 is &lt;0.12.3-1.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566856" version="1" comment="libpoppler-qt4-3 is &lt;0.12.3-1.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566857" version="1" comment="libpoppler5 is &lt;0.12.3-1.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563470" version="1" comment="poppler-tools is &lt;0.12.3-1.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009588509" version="1" comment="kernel-default is &lt;3.0.26-0.7.6 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009588510" version="1" comment="kernel-default-base is &lt;3.0.26-0.7.6 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009588511" version="1" comment="kernel-default-devel is &lt;3.0.26-0.7.6 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009588512" version="1" comment="kernel-default-extra is &lt;3.0.26-0.7.6 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566038" version="1" comment="kernel-pae is &lt;3.0.101-0.7.17.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566039" version="1" comment="kernel-pae-base is &lt;3.0.101-0.7.17.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566040" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.7.17.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566041" version="1" comment="kernel-pae-extra is &lt;3.0.101-0.7.17.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009588513" version="1" comment="kernel-source is &lt;3.0.26-0.7.6 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009588514" version="1" comment="kernel-syms is &lt;3.0.26-0.7.6 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009588515" version="1" comment="kernel-trace is &lt;3.0.26-0.7.6 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009588516" version="1" comment="kernel-trace-base is &lt;3.0.26-0.7.6 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009588517" version="1" comment="kernel-trace-devel is &lt;3.0.26-0.7.6 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009588518" version="1" comment="kernel-trace-extra is &lt;3.0.26-0.7.6 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009588519" version="1" comment="kernel-xen is &lt;3.0.26-0.7.6 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009588520" version="1" comment="kernel-xen-base is &lt;3.0.26-0.7.6 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009588521" version="1" comment="kernel-xen-devel is &lt;3.0.26-0.7.6 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009588522" version="1" comment="kernel-xen-extra is &lt;3.0.26-0.7.6 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566052" version="1" comment="xen-kmp-default is &lt;4.1.6_04_3.0.101_0.7.17-0.5.16 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566053" version="1" comment="xen-kmp-pae is &lt;4.1.6_04_3.0.101_0.7.17-0.5.16 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566054" version="1" comment="xen-kmp-trace is &lt;4.1.6_04_3.0.101_0.7.17-0.5.16 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009588591" version="1" comment="libwebkit-1_0-2 is &lt;1.2.7-0.15.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009588592" version="1" comment="libwebkit-lang is &lt;1.2.7-0.15.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566013" version="1" comment="gtk2 is &lt;2.18.9-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566014" version="1" comment="gtk2-32bit is &lt;2.18.9-0.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566015" version="1" comment="gtk2-devel is &lt;2.18.9-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566016" version="1" comment="gtk2-lang is &lt;2.18.9-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009588862" version="1" comment="evolution is &lt;2.28.2-0.28.21 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009588863" version="1" comment="evolution-data-server is &lt;2.28.2-0.29.24 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009588864" version="1" comment="evolution-data-server-32bit is &lt;2.28.2-0.29.24 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009588865" version="1" comment="evolution-data-server-lang is &lt;2.28.2-0.29.24 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009588866" version="1" comment="evolution-ews is &lt;2.28-0.10.20 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009588867" version="1" comment="evolution-ews-lang is &lt;2.28-0.10.20 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009588868" version="1" comment="evolution-lang is &lt;2.28.2-0.28.21 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009588869" version="1" comment="evolution-pilot is &lt;2.28.2-0.28.21 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566146" version="1" comment="libxslt is &lt;1.1.24-19.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566147" version="1" comment="libxslt-32bit is &lt;1.1.24-19.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562934" version="1" comment="icu is &lt;4.0-7.26.15 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566020" version="1" comment="libicu is &lt;4.0-7.26.15 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589035" version="1" comment="popt is &lt;1.7-37.50.6 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589036" version="1" comment="popt-32bit is &lt;1.7-37.50.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589037" version="1" comment="rpm is &lt;4.4.2.3-37.50.6 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589038" version="1" comment="rpm-32bit is &lt;4.4.2.3-37.50.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566190" version="1" comment="usbmuxd is &lt;1.0.7-5.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589049" version="1" comment="libvirt is &lt;0.9.6-0.15.71 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589050" version="1" comment="libvirt-client is &lt;0.9.6-0.15.71 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589051" version="1" comment="libvirt-client-32bit is &lt;0.9.6-0.15.71 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589052" version="1" comment="libvirt-doc is &lt;0.9.6-0.15.71 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589053" version="1" comment="libvirt-python is &lt;0.9.6-0.15.71 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589054" version="1" comment="virt-manager is &lt;0.9.0-3.17.26 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589055" version="1" comment="virt-utils is &lt;1.1.7-0.11.15 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589056" version="1" comment="vm-install is &lt;0.5.9-0.7.13 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589057" version="1" comment="xen is &lt;4.1.2_18-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589058" version="1" comment="xen-doc-html is &lt;4.1.2_18-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589059" version="1" comment="xen-doc-pdf is &lt;4.1.2_18-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589060" version="1" comment="xen-kmp-default is &lt;4.1.2_18_3.0.31_0.9-0.9.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589061" version="1" comment="xen-kmp-pae is &lt;4.1.2_18_3.0.31_0.9-0.9.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589062" version="1" comment="xen-kmp-trace is &lt;4.1.2_18_3.0.31_0.9-0.9.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589063" version="1" comment="xen-libs is &lt;4.1.2_18-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589064" version="1" comment="xen-libs-32bit is &lt;4.1.2_18-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589065" version="1" comment="xen-tools is &lt;4.1.2_18-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589066" version="1" comment="xen-tools-domU is &lt;4.1.2_18-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589067" version="1" comment="yast2-vm is &lt;2.17.10-0.5.42 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566299" version="1" comment="zypper is &lt;1.6.166-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566300" version="1" comment="zypper-log is &lt;1.6.166-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589071" version="1" comment="yast2-network is &lt;2.17.175-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589074" version="1" comment="inst-source-utils is &lt;2012.9.13-0.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589086" version="1" comment="java-1_6_0-openjdk is &lt;1.6.0.0_b24.1.11.4-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589087" version="1" comment="java-1_6_0-openjdk-demo is &lt;1.6.0.0_b24.1.11.4-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589088" version="1" comment="java-1_6_0-openjdk-devel is &lt;1.6.0.0_b24.1.11.4-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589096" version="1" comment="libtspi1 is &lt;0.3.7-3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589097" version="1" comment="libtspi1-32bit is &lt;0.3.7-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589098" version="1" comment="trousers is &lt;0.3.7-3.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566350" version="1" comment="libaugeas0 is &lt;0.9.0-3.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589107" version="1" comment="libldb1 is &lt;3.6.3-0.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589108" version="1" comment="libldb1-32bit is &lt;3.6.3-0.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589109" version="1" comment="libsmbclient0 is &lt;3.6.3-0.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589110" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589111" version="1" comment="libtalloc2 is &lt;3.6.3-0.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589112" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589113" version="1" comment="libtdb1 is &lt;3.6.3-0.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589114" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589115" version="1" comment="libtevent0 is &lt;3.6.3-0.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589116" version="1" comment="libtevent0-32bit is &lt;3.6.3-0.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589117" version="1" comment="libwbclient0 is &lt;3.6.3-0.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589118" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589119" version="1" comment="samba is &lt;3.6.3-0.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589120" version="1" comment="samba-32bit is &lt;3.6.3-0.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589121" version="1" comment="samba-client is &lt;3.6.3-0.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589122" version="1" comment="samba-client-32bit is &lt;3.6.3-0.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589123" version="1" comment="samba-doc is &lt;3.6.3-0.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589124" version="1" comment="samba-krb-printing is &lt;3.6.3-0.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589125" version="1" comment="samba-winbind is &lt;3.6.3-0.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589126" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567271" version="1" comment="xinetd is &lt;2.3.14-130.133.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589184" version="1" comment="glibc is &lt;2.11.3-17.35.4 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589185" version="1" comment="glibc-32bit is &lt;2.11.3-17.35.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589186" version="1" comment="glibc-devel is &lt;2.11.3-17.35.4 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589187" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.35.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589188" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.35.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589189" version="1" comment="glibc-locale is &lt;2.11.3-17.35.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589190" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.35.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589191" version="1" comment="nscd is &lt;2.11.3-17.35.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589222" version="1" comment="kernel-default is &lt;3.0.58-0.6.2.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589223" version="1" comment="kernel-default-base is &lt;3.0.58-0.6.2.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589224" version="1" comment="kernel-default-devel is &lt;3.0.58-0.6.2.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589225" version="1" comment="kernel-default-extra is &lt;3.0.58-0.6.2.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589226" version="1" comment="kernel-source is &lt;3.0.58-0.6.2.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589227" version="1" comment="kernel-syms is &lt;3.0.58-0.6.2.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589228" version="1" comment="kernel-trace is &lt;3.0.58-0.6.2.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589229" version="1" comment="kernel-trace-base is &lt;3.0.58-0.6.2.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589230" version="1" comment="kernel-trace-devel is &lt;3.0.58-0.6.2.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589231" version="1" comment="kernel-trace-extra is &lt;3.0.58-0.6.2.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589232" version="1" comment="kernel-xen is &lt;3.0.58-0.6.2.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589233" version="1" comment="kernel-xen-base is &lt;3.0.58-0.6.2.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589234" version="1" comment="kernel-xen-devel is &lt;3.0.58-0.6.2.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589235" version="1" comment="kernel-xen-extra is &lt;3.0.58-0.6.2.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589236" version="1" comment="xen-kmp-default is &lt;4.1.3_06_3.0.58_0.6.2-0.7.16 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589237" version="1" comment="xen-kmp-trace is &lt;4.1.3_06_3.0.58_0.6.2-0.7.16 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589376" version="1" comment="acroread is &lt;9.5.3-0.2.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589377" version="1" comment="acroread-cmaps is &lt;9.4.6-0.4.2.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589378" version="1" comment="acroread-fonts-ja is &lt;9.4.6-0.4.2.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589379" version="1" comment="acroread-fonts-ko is &lt;9.4.6-0.4.2.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589380" version="1" comment="acroread-fonts-zh_CN is &lt;9.4.6-0.4.2.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589381" version="1" comment="acroread-fonts-zh_TW is &lt;9.4.6-0.4.2.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565854" version="1" comment="acroread_ja is &lt;9.4.2-0.4.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589382" version="1" comment="java-1_6_0-openjdk is &lt;1.6.0.0_b24.1.11.5-0.2.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589383" version="1" comment="java-1_6_0-openjdk-demo is &lt;1.6.0.0_b24.1.11.5-0.2.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589384" version="1" comment="java-1_6_0-openjdk-devel is &lt;1.6.0.0_b24.1.11.5-0.2.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589405" version="1" comment="cifs-utils is &lt;5.1-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589408" version="1" comment="kernel-default is &lt;3.0.51-0.7.9.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589409" version="1" comment="kernel-default-base is &lt;3.0.51-0.7.9.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589410" version="1" comment="kernel-default-devel is &lt;3.0.51-0.7.9.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589411" version="1" comment="kernel-default-extra is &lt;3.0.51-0.7.9.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589412" version="1" comment="kernel-source is &lt;3.0.51-0.7.9.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589413" version="1" comment="kernel-syms is &lt;3.0.51-0.7.9.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589414" version="1" comment="kernel-trace is &lt;3.0.51-0.7.9.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589415" version="1" comment="kernel-trace-base is &lt;3.0.51-0.7.9.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589416" version="1" comment="kernel-trace-devel is &lt;3.0.51-0.7.9.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589417" version="1" comment="kernel-trace-extra is &lt;3.0.51-0.7.9.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589418" version="1" comment="kernel-xen is &lt;3.0.51-0.7.9.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589419" version="1" comment="kernel-xen-base is &lt;3.0.51-0.7.9.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589420" version="1" comment="kernel-xen-devel is &lt;3.0.51-0.7.9.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589421" version="1" comment="kernel-xen-extra is &lt;3.0.51-0.7.9.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589436" version="1" comment="bind-libs is &lt;9.6ESVR7P1-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589437" version="1" comment="bind-libs-32bit is &lt;9.6ESVR7P1-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589438" version="1" comment="bind-utils is &lt;9.6ESVR7P1-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565919" version="1" comment="MozillaFirefox is &lt;10.0.7-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565920" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.7.80 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565921" version="1" comment="MozillaFirefox-translations is &lt;10.0.7-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565922" version="1" comment="libfreebl3 is &lt;3.13.6-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565923" version="1" comment="libfreebl3-32bit is &lt;3.13.6-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565924" version="1" comment="mozilla-nspr is &lt;4.9.2-0.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565925" version="1" comment="mozilla-nspr-32bit is &lt;4.9.2-0.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565926" version="1" comment="mozilla-nss is &lt;3.13.6-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565927" version="1" comment="mozilla-nss-32bit is &lt;3.13.6-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565928" version="1" comment="mozilla-nss-tools is &lt;3.13.6-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565900" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565901" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566062" version="1" comment="libldb1 is &lt;3.6.3-0.24.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566063" version="1" comment="libldb1-32bit is &lt;3.6.3-0.24.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566064" version="1" comment="libsmbclient0 is &lt;3.6.3-0.24.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566065" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.24.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566066" version="1" comment="libtalloc2 is &lt;3.6.3-0.24.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566067" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.24.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566068" version="1" comment="libtdb1 is &lt;3.6.3-0.24.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566069" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.24.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566070" version="1" comment="libtevent0 is &lt;3.6.3-0.24.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566071" version="1" comment="libtevent0-32bit is &lt;3.6.3-0.24.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566072" version="1" comment="libwbclient0 is &lt;3.6.3-0.24.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566073" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.24.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566074" version="1" comment="samba is &lt;3.6.3-0.24.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566075" version="1" comment="samba-32bit is &lt;3.6.3-0.24.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566076" version="1" comment="samba-client is &lt;3.6.3-0.24.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566077" version="1" comment="samba-client-32bit is &lt;3.6.3-0.24.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566078" version="1" comment="samba-doc is &lt;3.6.3-0.24.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566079" version="1" comment="samba-krb-printing is &lt;3.6.3-0.24.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566080" version="1" comment="samba-winbind is &lt;3.6.3-0.24.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566081" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.24.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589500" version="1" comment="kernel-default is &lt;3.0.34-0.7.9 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589501" version="1" comment="kernel-default-base is &lt;3.0.34-0.7.9 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589502" version="1" comment="kernel-default-devel is &lt;3.0.34-0.7.9 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589503" version="1" comment="kernel-default-extra is &lt;3.0.34-0.7.9 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589504" version="1" comment="kernel-source is &lt;3.0.34-0.7.9 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589505" version="1" comment="kernel-syms is &lt;3.0.34-0.7.9 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589506" version="1" comment="kernel-trace is &lt;3.0.34-0.7.9 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589507" version="1" comment="kernel-trace-base is &lt;3.0.34-0.7.9 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589508" version="1" comment="kernel-trace-devel is &lt;3.0.34-0.7.9 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589509" version="1" comment="kernel-trace-extra is &lt;3.0.34-0.7.9 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589510" version="1" comment="kernel-xen is &lt;3.0.34-0.7.9 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589511" version="1" comment="kernel-xen-base is &lt;3.0.34-0.7.9 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589512" version="1" comment="kernel-xen-devel is &lt;3.0.34-0.7.9 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589513" version="1" comment="kernel-xen-extra is &lt;3.0.34-0.7.9 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589531" version="1" comment="kernel-default is &lt;3.0.31-0.9.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589532" version="1" comment="kernel-default-base is &lt;3.0.31-0.9.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589533" version="1" comment="kernel-default-devel is &lt;3.0.31-0.9.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589534" version="1" comment="kernel-default-extra is &lt;3.0.31-0.9.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589535" version="1" comment="kernel-source is &lt;3.0.31-0.9.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589536" version="1" comment="kernel-syms is &lt;3.0.31-0.9.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589537" version="1" comment="kernel-trace is &lt;3.0.31-0.9.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589538" version="1" comment="kernel-trace-base is &lt;3.0.31-0.9.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589539" version="1" comment="kernel-trace-devel is &lt;3.0.31-0.9.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589540" version="1" comment="kernel-trace-extra is &lt;3.0.31-0.9.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589541" version="1" comment="kernel-xen is &lt;3.0.31-0.9.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589542" version="1" comment="kernel-xen-base is &lt;3.0.31-0.9.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589543" version="1" comment="kernel-xen-devel is &lt;3.0.31-0.9.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589544" version="1" comment="kernel-xen-extra is &lt;3.0.31-0.9.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589559" version="1" comment="libsoup-2_4-1 is &lt;2.32.2-4.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589560" version="1" comment="libsoup-2_4-1-32bit is &lt;2.32.2-4.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589566" version="1" comment="kernel-default is &lt;3.0.74-0.6.6.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589567" version="1" comment="kernel-default-base is &lt;3.0.74-0.6.6.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589568" version="1" comment="kernel-default-devel is &lt;3.0.74-0.6.6.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589569" version="1" comment="kernel-default-extra is &lt;3.0.74-0.6.6.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589570" version="1" comment="kernel-source is &lt;3.0.74-0.6.6.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589571" version="1" comment="kernel-syms is &lt;3.0.74-0.6.6.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589572" version="1" comment="kernel-trace is &lt;3.0.74-0.6.6.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589573" version="1" comment="kernel-trace-base is &lt;3.0.74-0.6.6.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589574" version="1" comment="kernel-trace-devel is &lt;3.0.74-0.6.6.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589575" version="1" comment="kernel-trace-extra is &lt;3.0.74-0.6.6.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589576" version="1" comment="kernel-xen is &lt;3.0.74-0.6.6.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589577" version="1" comment="kernel-xen-base is &lt;3.0.74-0.6.6.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589578" version="1" comment="kernel-xen-devel is &lt;3.0.74-0.6.6.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589579" version="1" comment="kernel-xen-extra is &lt;3.0.74-0.6.6.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589580" version="1" comment="xen-kmp-default is &lt;4.1.4_02_3.0.74_0.6.6-0.5.22 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589581" version="1" comment="xen-kmp-trace is &lt;4.1.4_02_3.0.74_0.6.6-0.5.22 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567270" version="1" comment="xfsprogs is &lt;3.1.8-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566709" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.55.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589697" version="1" comment="kernel-default is &lt;3.0.101-0.35.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589698" version="1" comment="kernel-default-base is &lt;3.0.101-0.35.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589699" version="1" comment="kernel-default-devel is &lt;3.0.101-0.35.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589700" version="1" comment="kernel-default-extra is &lt;3.0.101-0.35.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566714" version="1" comment="kernel-pae is &lt;3.0.101-0.40.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566715" version="1" comment="kernel-pae-base is &lt;3.0.101-0.40.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566716" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.40.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566717" version="1" comment="kernel-pae-extra is &lt;3.0.101-0.40.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589701" version="1" comment="kernel-source is &lt;3.0.101-0.35.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589702" version="1" comment="kernel-syms is &lt;3.0.101-0.35.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589703" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.35.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589704" version="1" comment="kernel-xen is &lt;3.0.101-0.35.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589705" version="1" comment="kernel-xen-base is &lt;3.0.101-0.35.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589706" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.35.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589707" version="1" comment="kernel-xen-extra is &lt;3.0.101-0.35.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589708" version="1" comment="xen-kmp-default is &lt;4.2.4_02_3.0.101_0.35-0.7.45 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566726" version="1" comment="xen-kmp-pae is &lt;4.2.4_04_3.0.101_0.40-0.7.3 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589767" version="1" comment="kvm is &lt;0.15.1-0.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589831" version="1" comment="kernel-default is &lt;3.0.42-0.7.3 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589832" version="1" comment="kernel-default-base is &lt;3.0.42-0.7.3 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589833" version="1" comment="kernel-default-devel is &lt;3.0.42-0.7.3 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589834" version="1" comment="kernel-default-extra is &lt;3.0.42-0.7.3 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589835" version="1" comment="kernel-source is &lt;3.0.42-0.7.3 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589836" version="1" comment="kernel-syms is &lt;3.0.42-0.7.3 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589837" version="1" comment="kernel-trace is &lt;3.0.42-0.7.3 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589838" version="1" comment="kernel-trace-base is &lt;3.0.42-0.7.3 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589839" version="1" comment="kernel-trace-devel is &lt;3.0.42-0.7.3 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589840" version="1" comment="kernel-trace-extra is &lt;3.0.42-0.7.3 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589841" version="1" comment="kernel-xen is &lt;3.0.42-0.7.3 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589842" version="1" comment="kernel-xen-base is &lt;3.0.42-0.7.3 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589843" version="1" comment="kernel-xen-devel is &lt;3.0.42-0.7.3 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589844" version="1" comment="kernel-xen-extra is &lt;3.0.42-0.7.3 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589859" version="1" comment="kernel-default is &lt;3.0.38-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589860" version="1" comment="kernel-default-base is &lt;3.0.38-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589861" version="1" comment="kernel-default-devel is &lt;3.0.38-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589862" version="1" comment="kernel-default-extra is &lt;3.0.38-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589863" version="1" comment="kernel-source is &lt;3.0.38-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589864" version="1" comment="kernel-syms is &lt;3.0.38-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589865" version="1" comment="kernel-trace is &lt;3.0.38-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589866" version="1" comment="kernel-trace-base is &lt;3.0.38-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589867" version="1" comment="kernel-trace-devel is &lt;3.0.38-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589868" version="1" comment="kernel-trace-extra is &lt;3.0.38-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589869" version="1" comment="kernel-xen is &lt;3.0.38-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589870" version="1" comment="kernel-xen-base is &lt;3.0.38-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589871" version="1" comment="kernel-xen-devel is &lt;3.0.38-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589872" version="1" comment="kernel-xen-extra is &lt;3.0.38-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589887" version="1" comment="sblim-sfcb is &lt;1.3.11-0.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565859" version="1" comment="bytefx-data-mysql is &lt;2.6.7-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565860" version="1" comment="ibm-data-db2 is &lt;2.6.7-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565861" version="1" comment="mono-core is &lt;2.6.7-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565862" version="1" comment="mono-data is &lt;2.6.7-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565863" version="1" comment="mono-data-firebird is &lt;2.6.7-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565864" version="1" comment="mono-data-oracle is &lt;2.6.7-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565865" version="1" comment="mono-data-postgresql is &lt;2.6.7-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565866" version="1" comment="mono-data-sqlite is &lt;2.6.7-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565867" version="1" comment="mono-data-sybase is &lt;2.6.7-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565868" version="1" comment="mono-devel is &lt;2.6.7-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565869" version="1" comment="mono-extras is &lt;2.6.7-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565870" version="1" comment="mono-jscript is &lt;2.6.7-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565871" version="1" comment="mono-locale-extras is &lt;2.6.7-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565872" version="1" comment="mono-nunit is &lt;2.6.7-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565873" version="1" comment="mono-wcf is &lt;2.6.7-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565874" version="1" comment="mono-web is &lt;2.6.7-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565875" version="1" comment="mono-winforms is &lt;2.6.7-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565876" version="1" comment="monodoc-core is &lt;2.6.7-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589889" version="1" comment="glibc is &lt;2.11.3-17.43.1 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589890" version="1" comment="glibc-32bit is &lt;2.11.3-17.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589891" version="1" comment="glibc-devel is &lt;2.11.3-17.43.1 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589892" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589893" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.43.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589894" version="1" comment="glibc-locale is &lt;2.11.3-17.43.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589895" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589896" version="1" comment="nscd is &lt;2.11.3-17.43.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589908" version="1" comment="quota is &lt;3.16-50.39.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566116" version="1" comment="permissions is &lt;2013.1.7-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589913" version="1" comment="icedtea-web is &lt;1.4-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589914" version="1" comment="icedtea-web is &lt;1.4-0.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566203" version="1" comment="libvirt is &lt;0.9.6-0.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566204" version="1" comment="libvirt-client is &lt;0.9.6-0.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566205" version="1" comment="libvirt-client-32bit is &lt;0.9.6-0.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566206" version="1" comment="libvirt-doc is &lt;0.9.6-0.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566207" version="1" comment="libvirt-python is &lt;0.9.6-0.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566208" version="1" comment="virt-manager is &lt;0.9.0-3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566209" version="1" comment="vm-install is &lt;0.5.10-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566210" version="1" comment="xen is &lt;4.1.2_20-0.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566211" version="1" comment="xen-doc-html is &lt;4.1.2_20-0.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566212" version="1" comment="xen-doc-pdf is &lt;4.1.2_20-0.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566213" version="1" comment="xen-kmp-default is &lt;4.1.2_20_3.0.38_0.5-0.5.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566214" version="1" comment="xen-kmp-trace is &lt;4.1.2_20_3.0.38_0.5-0.5.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566215" version="1" comment="xen-libs is &lt;4.1.2_20-0.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566216" version="1" comment="xen-libs-32bit is &lt;4.1.2_20-0.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566217" version="1" comment="xen-tools is &lt;4.1.2_20-0.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566218" version="1" comment="xen-tools-domU is &lt;4.1.2_20-0.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565839" version="1" comment="ImageMagick is &lt;6.4.3.6-7.26.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565840" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.26.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565841" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.26.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565842" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565843" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.26.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566115" version="1" comment="libotr2 is &lt;3.2.0-10.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567313" version="1" comment="fetchmail is &lt;6.3.8.90-13.20.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589916" version="1" comment="vm-install is &lt;0.5.12-0.5.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566220" version="1" comment="xen is &lt;4.1.3_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566221" version="1" comment="xen-doc-html is &lt;4.1.3_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566222" version="1" comment="xen-doc-pdf is &lt;4.1.3_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566223" version="1" comment="xen-kmp-default is &lt;4.1.3_02_3.0.38_0.5-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566224" version="1" comment="xen-kmp-trace is &lt;4.1.3_02_3.0.38_0.5-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566225" version="1" comment="xen-libs is &lt;4.1.3_02-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566226" version="1" comment="xen-libs-32bit is &lt;4.1.3_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566227" version="1" comment="xen-tools is &lt;4.1.3_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566228" version="1" comment="xen-tools-domU is &lt;4.1.3_02-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566138" version="1" comment="libvirt is &lt;0.9.6-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566139" version="1" comment="libvirt-client is &lt;0.9.6-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566140" version="1" comment="libvirt-client-32bit is &lt;0.9.6-0.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566141" version="1" comment="libvirt-doc is &lt;0.9.6-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566142" version="1" comment="libvirt-python is &lt;0.9.6-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589917" version="1" comment="vm-install is &lt;0.5.14-0.5.7 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566229" version="1" comment="xen is &lt;4.1.3_04-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566230" version="1" comment="xen-doc-html is &lt;4.1.3_04-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566231" version="1" comment="xen-doc-pdf is &lt;4.1.3_04-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566232" version="1" comment="xen-kmp-default is &lt;4.1.3_04_3.0.42_0.7-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566233" version="1" comment="xen-kmp-pae is &lt;4.1.3_04_3.0.42_0.7-0.5.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566234" version="1" comment="xen-kmp-trace is &lt;4.1.3_04_3.0.42_0.7-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566235" version="1" comment="xen-libs is &lt;4.1.3_04-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566236" version="1" comment="xen-libs-32bit is &lt;4.1.3_04-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566237" version="1" comment="xen-tools is &lt;4.1.3_04-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566238" version="1" comment="xen-tools-domU is &lt;4.1.3_04-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589925" version="1" comment="binutils is &lt;2.25.0-5.5 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589926" version="1" comment="gdb is &lt;7.9.1-3.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589927" version="1" comment="libgcc_s1 is &lt;5.2.1+r226025-2.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589928" version="1" comment="libgcc_s1-32bit is &lt;5.2.1+r226025-2.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589929" version="1" comment="libgfortran3 is &lt;5.2.1+r226025-2.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589930" version="1" comment="libgfortran3-32bit is &lt;5.2.1+r226025-2.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589931" version="1" comment="libgomp1 is &lt;5.2.1+r226025-2.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589932" version="1" comment="libgomp1-32bit is &lt;5.2.1+r226025-2.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589933" version="1" comment="libquadmath0 is &lt;5.2.1+r226025-2.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589934" version="1" comment="libquadmath0-32bit is &lt;5.2.1+r226025-2.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589935" version="1" comment="libstdc++6 is &lt;5.2.1+r226025-2.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589936" version="1" comment="libstdc++6-32bit is &lt;5.2.1+r226025-2.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589937" version="1" comment="libstdc++6-locale is &lt;5.2.1+r226025-2.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589990" version="1" comment="kvm is &lt;0.15.1-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589991" version="1" comment="dbus-1 is &lt;1.2.10-3.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589992" version="1" comment="dbus-1-32bit is &lt;1.2.10-3.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009589993" version="1" comment="dbus-1-x11 is &lt;1.2.10-3.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590002" version="1" comment="dhcp is &lt;4.2.4.P1-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590003" version="1" comment="dhcp-client is &lt;4.2.4.P1-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590009" version="1" comment="bind-libs is &lt;9.6ESVR7P2-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590010" version="1" comment="bind-libs-32bit is &lt;9.6ESVR7P2-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590011" version="1" comment="bind-utils is &lt;9.6ESVR7P2-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590018" version="1" comment="dhcp is &lt;4.2.4.P2-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590019" version="1" comment="dhcp-client is &lt;4.2.4.P2-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565929" version="1" comment="MozillaFirefox is &lt;10.0.9-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565930" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.7.85 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565931" version="1" comment="MozillaFirefox-translations is &lt;10.0.9-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590025" version="1" comment="wireshark is &lt;1.4.15-0.2.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565932" version="1" comment="MozillaFirefox is &lt;10.0.10-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565933" version="1" comment="MozillaFirefox-translations is &lt;10.0.10-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565934" version="1" comment="mozilla-nspr is &lt;4.9.3-0.2.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565935" version="1" comment="mozilla-nspr-32bit is &lt;4.9.3-0.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565936" version="1" comment="MozillaFirefox is &lt;10.0.11-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565937" version="1" comment="MozillaFirefox-translations is &lt;10.0.11-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565938" version="1" comment="libfreebl3 is &lt;3.14-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565939" version="1" comment="libfreebl3-32bit is &lt;3.14-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565940" version="1" comment="mozilla-nss is &lt;3.14-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565941" version="1" comment="mozilla-nss-32bit is &lt;3.14-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565942" version="1" comment="mozilla-nss-tools is &lt;3.14-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563017" version="1" comment="libreoffice is &lt;3.5.4.13-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563018" version="1" comment="libreoffice-base is &lt;3.5.4.13-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563019" version="1" comment="libreoffice-base-drivers-postgresql is &lt;3.5.4.13-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563020" version="1" comment="libreoffice-base-extensions is &lt;3.5.4.13-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563022" version="1" comment="libreoffice-calc is &lt;3.5.4.13-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563023" version="1" comment="libreoffice-calc-extensions is &lt;3.5.4.13-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563024" version="1" comment="libreoffice-draw is &lt;3.5.4.13-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563025" version="1" comment="libreoffice-draw-extensions is &lt;3.5.4.13-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563026" version="1" comment="libreoffice-filters-optional is &lt;3.5.4.13-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563027" version="1" comment="libreoffice-gnome is &lt;3.5.4.13-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563028" version="1" comment="libreoffice-help-cs is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563029" version="1" comment="libreoffice-help-da is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563030" version="1" comment="libreoffice-help-de is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563031" version="1" comment="libreoffice-help-en-GB is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563032" version="1" comment="libreoffice-help-en-US is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563033" version="1" comment="libreoffice-help-es is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563034" version="1" comment="libreoffice-help-fr is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563035" version="1" comment="libreoffice-help-gu-IN is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563036" version="1" comment="libreoffice-help-hi-IN is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563037" version="1" comment="libreoffice-help-hu is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563038" version="1" comment="libreoffice-help-it is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563039" version="1" comment="libreoffice-help-ja is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563040" version="1" comment="libreoffice-help-ko is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563041" version="1" comment="libreoffice-help-nl is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563042" version="1" comment="libreoffice-help-pl is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563043" version="1" comment="libreoffice-help-pt is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563044" version="1" comment="libreoffice-help-pt-BR is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563045" version="1" comment="libreoffice-help-ru is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563046" version="1" comment="libreoffice-help-sv is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563047" version="1" comment="libreoffice-help-zh-CN is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563048" version="1" comment="libreoffice-help-zh-TW is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563049" version="1" comment="libreoffice-icon-themes is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563050" version="1" comment="libreoffice-impress is &lt;3.5.4.13-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563051" version="1" comment="libreoffice-impress-extensions is &lt;3.5.4.13-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563052" version="1" comment="libreoffice-kde is &lt;3.5.4.13-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563053" version="1" comment="libreoffice-kde4 is &lt;3.5.4.13-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563054" version="1" comment="libreoffice-l10n-af is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563055" version="1" comment="libreoffice-l10n-ar is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563056" version="1" comment="libreoffice-l10n-ca is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563057" version="1" comment="libreoffice-l10n-cs is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563058" version="1" comment="libreoffice-l10n-da is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563059" version="1" comment="libreoffice-l10n-de is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563061" version="1" comment="libreoffice-l10n-en-GB is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563062" version="1" comment="libreoffice-l10n-es is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563063" version="1" comment="libreoffice-l10n-fi is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563064" version="1" comment="libreoffice-l10n-fr is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563065" version="1" comment="libreoffice-l10n-gu-IN is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563066" version="1" comment="libreoffice-l10n-hi-IN is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563067" version="1" comment="libreoffice-l10n-hu is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563068" version="1" comment="libreoffice-l10n-it is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563069" version="1" comment="libreoffice-l10n-ja is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563070" version="1" comment="libreoffice-l10n-ko is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563071" version="1" comment="libreoffice-l10n-nb is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563072" version="1" comment="libreoffice-l10n-nl is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563073" version="1" comment="libreoffice-l10n-nn is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563074" version="1" comment="libreoffice-l10n-pl is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563076" version="1" comment="libreoffice-l10n-pt is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563077" version="1" comment="libreoffice-l10n-pt-BR is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563078" version="1" comment="libreoffice-l10n-ru is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563079" version="1" comment="libreoffice-l10n-sk is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563080" version="1" comment="libreoffice-l10n-sv is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563081" version="1" comment="libreoffice-l10n-xh is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563082" version="1" comment="libreoffice-l10n-zh-CN is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563083" version="1" comment="libreoffice-l10n-zh-TW is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563084" version="1" comment="libreoffice-l10n-zu is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563085" version="1" comment="libreoffice-mailmerge is &lt;3.5.4.13-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563086" version="1" comment="libreoffice-math is &lt;3.5.4.13-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563087" version="1" comment="libreoffice-mono is &lt;3.5.4.13-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563088" version="1" comment="libreoffice-officebean is &lt;3.5.4.13-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563089" version="1" comment="libreoffice-pyuno is &lt;3.5.4.13-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563091" version="1" comment="libreoffice-writer is &lt;3.5.4.13-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563092" version="1" comment="libreoffice-writer-extensions is &lt;3.5.4.13-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590028" version="1" comment="bind-libs is &lt;9.6ESVR7P3-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590029" version="1" comment="bind-libs-32bit is &lt;9.6ESVR7P3-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590030" version="1" comment="bind-utils is &lt;9.6ESVR7P3-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590044" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.46.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590045" version="1" comment="kernel-default is &lt;3.0.101-0.46.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590046" version="1" comment="kernel-default-base is &lt;3.0.101-0.46.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590047" version="1" comment="kernel-default-devel is &lt;3.0.101-0.46.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590048" version="1" comment="kernel-default-extra is &lt;3.0.101-0.46.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590049" version="1" comment="kernel-pae is &lt;3.0.101-0.42.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590050" version="1" comment="kernel-pae-base is &lt;3.0.101-0.42.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590051" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.42.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590052" version="1" comment="kernel-pae-extra is &lt;3.0.101-0.42.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590053" version="1" comment="kernel-source is &lt;3.0.101-0.46.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590054" version="1" comment="kernel-syms is &lt;3.0.101-0.46.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590055" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.46.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590056" version="1" comment="kernel-xen is &lt;3.0.101-0.46.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590057" version="1" comment="kernel-xen-base is &lt;3.0.101-0.46.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590058" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.46.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590059" version="1" comment="kernel-xen-extra is &lt;3.0.101-0.46.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590060" version="1" comment="xen-kmp-default is &lt;4.2.5_02_3.0.101_0.46-0.7.9 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590061" version="1" comment="xen-kmp-pae is &lt;4.2.5_02_3.0.101_0.42-0.7.2 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565993" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.34.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565994" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.34.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565995" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.34.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565996" version="1" comment="ghostscript-library is &lt;8.62-32.34.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565997" version="1" comment="ghostscript-omni is &lt;8.62-32.34.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565998" version="1" comment="ghostscript-x11 is &lt;8.62-32.34.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565999" version="1" comment="libgimpprint is &lt;4.2.7-32.34.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566000" version="1" comment="glibc is &lt;2.11.3-17.45.49.1 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566001" version="1" comment="glibc-32bit is &lt;2.11.3-17.45.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566002" version="1" comment="glibc-devel is &lt;2.11.3-17.45.49.1 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566003" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.45.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566004" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.45.49.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566005" version="1" comment="glibc-locale is &lt;2.11.3-17.45.49.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566006" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.45.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566007" version="1" comment="nscd is &lt;2.11.3-17.45.49.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590138" version="1" comment="glibc is &lt;2.11.3-17.56.2 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590139" version="1" comment="glibc-32bit is &lt;2.11.3-17.56.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590140" version="1" comment="glibc-devel is &lt;2.11.3-17.56.2 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590141" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.56.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590142" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.56.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590143" version="1" comment="glibc-locale is &lt;2.11.3-17.56.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590144" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.56.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590145" version="1" comment="nscd is &lt;2.11.3-17.56.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567013" version="1" comment="openslp is &lt;1.2.0-172.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567014" version="1" comment="openslp-32bit is &lt;1.2.0-172.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590180" version="1" comment="libtiff3 is &lt;3.8.2-141.150.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590181" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.150.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566123" version="1" comment="libproxy0 is &lt;0.3.1-2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566124" version="1" comment="libproxy0-32bit is &lt;0.3.1-2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566125" version="1" comment="libproxy0-config-gnome is &lt;0.3.1-2.6.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566126" version="1" comment="libproxy0-config-gnome-32bit is &lt;0.3.1-2.6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566127" version="1" comment="libproxy0-config-kde4 is &lt;0.3.1-2.6.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566128" version="1" comment="libproxy0-networkmanager is &lt;0.3.1-2.6.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566129" version="1" comment="libproxy0-networkmanager-32bit is &lt;0.3.1-2.6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566030" version="1" comment="kdelibs4 is &lt;4.3.5-0.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566031" version="1" comment="kdelibs4-core is &lt;4.3.5-0.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566032" version="1" comment="libkde4 is &lt;4.3.5-0.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562953" version="1" comment="libkde4-32bit is &lt;4.3.5-0.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566033" version="1" comment="libkdecore4 is &lt;4.3.5-0.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562955" version="1" comment="libkdecore4-32bit is &lt;4.3.5-0.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590195" version="1" comment="ruby is &lt;1.8.7.p357-0.9.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566019" version="1" comment="icedtea-web is &lt;1.4.1-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590204" version="1" comment="icedtea-web is &lt;1.4.1-0.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566130" version="1" comment="libssh2 is &lt;0.2-5.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590205" version="1" comment="libQtWebKit4 is &lt;4.6.3-5.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590206" version="1" comment="libQtWebKit4-32bit is &lt;4.6.3-5.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590207" version="1" comment="libqt4 is &lt;4.6.3-5.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590208" version="1" comment="libqt4-32bit is &lt;4.6.3-5.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590209" version="1" comment="libqt4-qt3support is &lt;4.6.3-5.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590210" version="1" comment="libqt4-qt3support-32bit is &lt;4.6.3-5.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590211" version="1" comment="libqt4-sql is &lt;4.6.3-5.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590212" version="1" comment="libqt4-sql-32bit is &lt;4.6.3-5.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590213" version="1" comment="libqt4-sql-mysql is &lt;4.6.3-5.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590214" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.6.3-5.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590215" version="1" comment="libqt4-sql-postgresql is &lt;4.6.3-5.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590216" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.6.3-5.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590217" version="1" comment="libqt4-sql-sqlite is &lt;4.6.3-5.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590218" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.6.3-5.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590219" version="1" comment="libqt4-sql-unixODBC is &lt;4.6.3-5.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590220" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.6.3-5.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590221" version="1" comment="libqt4-x11 is &lt;4.6.3-5.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590222" version="1" comment="libqt4-x11-32bit is &lt;4.6.3-5.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590245" version="1" comment="libxml2 is &lt;2.7.6-0.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590246" version="1" comment="libxml2-32bit is &lt;2.7.6-0.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590247" version="1" comment="libxml2-python is &lt;2.7.6-0.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590255" version="1" comment="bind-libs is &lt;9.6ESVR7P4-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590256" version="1" comment="bind-libs-32bit is &lt;9.6ESVR7P4-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590257" version="1" comment="bind-utils is &lt;9.6ESVR7P4-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590270" version="1" comment="flash-player is &lt;11.2.202.243-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565987" version="1" comment="flash-player-gnome is &lt;11.2.202.336-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565988" version="1" comment="flash-player-kde4 is &lt;11.2.202.336-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590271" version="1" comment="flash-player is &lt;11.2.202.251-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565858" version="1" comment="bogofilter is &lt;1.1.1-174.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590272" version="1" comment="xen is &lt;4.1.3_06-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590273" version="1" comment="xen-doc-html is &lt;4.1.3_06-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590274" version="1" comment="xen-doc-pdf is &lt;4.1.3_06-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590275" version="1" comment="xen-kmp-default is &lt;4.1.3_06_3.0.51_0.7.9-0.7.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566197" version="1" comment="xen-kmp-pae is &lt;4.1.4_02_3.0.58_0.6.6-0.5.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590276" version="1" comment="xen-kmp-trace is &lt;4.1.3_06_3.0.51_0.7.9-0.7.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590277" version="1" comment="xen-libs is &lt;4.1.3_06-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590278" version="1" comment="xen-libs-32bit is &lt;4.1.3_06-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590279" version="1" comment="xen-tools is &lt;4.1.3_06-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590280" version="1" comment="xen-tools-domU is &lt;4.1.3_06-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565904" version="1" comment="cups is &lt;1.3.9-8.46.48.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565905" version="1" comment="cups-client is &lt;1.3.9-8.46.48.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565906" version="1" comment="cups-libs is &lt;1.3.9-8.46.48.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565907" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.46.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566574" version="1" comment="gimp is &lt;2.6.2-3.34.45.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566575" version="1" comment="gimp-lang is &lt;2.6.2-3.34.45.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566576" version="1" comment="gimp-plugins-python is &lt;2.6.2-3.34.45.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590290" version="1" comment="wireshark is &lt;1.8.4-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566106" version="1" comment="libmysqlclient15 is &lt;5.0.96-0.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566107" version="1" comment="libmysqlclient15-32bit is &lt;5.0.96-0.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566108" version="1" comment="libmysqlclient_r15 is &lt;5.0.96-0.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566109" version="1" comment="libmysqlclient_r15-32bit is &lt;5.0.96-0.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566110" version="1" comment="mysql is &lt;5.0.96-0.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566111" version="1" comment="mysql-client is &lt;5.0.96-0.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590293" version="1" comment="libmysql55client18 is &lt;5.5.42-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590294" version="1" comment="libmysql55client18-32bit is &lt;5.5.42-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590295" version="1" comment="libmysql55client_r18 is &lt;5.5.42-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590296" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.42-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590297" version="1" comment="libmysqlclient15 is &lt;5.0.96-0.6.20 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590298" version="1" comment="libmysqlclient15-32bit is &lt;5.0.96-0.6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590299" version="1" comment="libmysqlclient_r15 is &lt;5.0.96-0.6.20 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590300" version="1" comment="libmysqlclient_r15-32bit is &lt;5.0.96-0.6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590301" version="1" comment="mysql is &lt;5.5.42-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590302" version="1" comment="mysql-client is &lt;5.5.42-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566193" version="1" comment="xen is &lt;4.1.4_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566194" version="1" comment="xen-doc-html is &lt;4.1.4_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566195" version="1" comment="xen-doc-pdf is &lt;4.1.4_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566196" version="1" comment="xen-kmp-default is &lt;4.1.4_02_3.0.58_0.6.6-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566198" version="1" comment="xen-kmp-trace is &lt;4.1.4_02_3.0.58_0.6.6-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566199" version="1" comment="xen-libs is &lt;4.1.4_02-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566200" version="1" comment="xen-libs-32bit is &lt;4.1.4_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566201" version="1" comment="xen-tools is &lt;4.1.4_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566202" version="1" comment="xen-tools-domU is &lt;4.1.4_02-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566021" version="1" comment="inkscape is &lt;0.46-62.38.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566022" version="1" comment="inkscape-extensions-dia is &lt;0.46-62.38.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566023" version="1" comment="inkscape-extensions-extra is &lt;0.46-62.38.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566024" version="1" comment="inkscape-extensions-fig is &lt;0.46-62.38.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566025" version="1" comment="inkscape-extensions-gimp is &lt;0.46-62.38.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566026" version="1" comment="inkscape-lang is &lt;0.46-62.38.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565989" version="1" comment="freetype2 is &lt;2.3.7-25.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565990" version="1" comment="freetype2-32bit is &lt;2.3.7-25.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565991" version="1" comment="freetype2-devel is &lt;2.3.7-25.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565992" version="1" comment="ft2demos is &lt;2.3.7-25.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590324" version="1" comment="flash-player is &lt;11.2.202.258-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565943" version="1" comment="MozillaFirefox is &lt;10.0.12-0.4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565944" version="1" comment="MozillaFirefox-translations is &lt;10.0.12-0.4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565945" version="1" comment="libfreebl3 is &lt;3.14.1-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565946" version="1" comment="libfreebl3-32bit is &lt;3.14.1-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565947" version="1" comment="mozilla-nspr is &lt;4.9.4-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565948" version="1" comment="mozilla-nspr-32bit is &lt;4.9.4-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565949" version="1" comment="mozilla-nss is &lt;3.14.1-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565950" version="1" comment="mozilla-nss-32bit is &lt;3.14.1-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565951" version="1" comment="mozilla-nss-tools is &lt;3.14.1-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590327" version="1" comment="gpg2 is &lt;2.0.9-25.33.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590328" version="1" comment="gpg2-lang is &lt;2.0.9-25.33.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590329" version="1" comment="gpg2 is &lt;2.0.9-25.33.33.5 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590330" version="1" comment="gpg2-lang is &lt;2.0.9-25.33.33.5 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565877" version="1" comment="libldb1 is &lt;3.6.3-0.33.39.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565878" version="1" comment="libldb1-32bit is &lt;3.6.3-0.33.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565879" version="1" comment="libsmbclient0 is &lt;3.6.3-0.33.39.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565880" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.33.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565881" version="1" comment="libtalloc1 is &lt;3.4.3-1.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565882" version="1" comment="libtalloc1-32bit is &lt;3.4.3-1.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565883" version="1" comment="libtalloc2 is &lt;3.6.3-0.33.39.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565884" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.33.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565885" version="1" comment="libtdb1 is &lt;3.6.3-0.33.39.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565886" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.33.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565887" version="1" comment="libtevent0 is &lt;3.6.3-0.33.39.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565888" version="1" comment="libtevent0-32bit is &lt;3.6.3-0.33.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565889" version="1" comment="libwbclient0 is &lt;3.6.3-0.33.39.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565890" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.33.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565891" version="1" comment="samba is &lt;3.6.3-0.33.39.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565892" version="1" comment="samba-32bit is &lt;3.6.3-0.33.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565893" version="1" comment="samba-client is &lt;3.6.3-0.33.39.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565894" version="1" comment="samba-client-32bit is &lt;3.6.3-0.33.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565895" version="1" comment="samba-doc is &lt;3.6.3-0.33.39.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565896" version="1" comment="samba-krb-printing is &lt;3.6.3-0.33.39.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565897" version="1" comment="samba-winbind is &lt;3.6.3-0.33.39.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565898" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.33.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590340" version="1" comment="libldb1 is &lt;3.6.3-0.46.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590341" version="1" comment="libldb1-32bit is &lt;3.6.3-0.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590342" version="1" comment="libsmbclient0 is &lt;3.6.3-0.46.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590343" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590344" version="1" comment="libtalloc2 is &lt;3.6.3-0.46.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590345" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590346" version="1" comment="libtdb1 is &lt;3.6.3-0.46.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590347" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590348" version="1" comment="libtevent0 is &lt;3.6.3-0.46.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590349" version="1" comment="libtevent0-32bit is &lt;3.6.3-0.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590350" version="1" comment="libwbclient0 is &lt;3.6.3-0.46.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590351" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590352" version="1" comment="samba is &lt;3.6.3-0.46.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590353" version="1" comment="samba-32bit is &lt;3.6.3-0.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590354" version="1" comment="samba-client is &lt;3.6.3-0.46.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590355" version="1" comment="samba-client-32bit is &lt;3.6.3-0.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590356" version="1" comment="samba-doc is &lt;3.6.3-0.46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590357" version="1" comment="samba-krb-printing is &lt;3.6.3-0.46.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590358" version="1" comment="samba-winbind is &lt;3.6.3-0.46.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590359" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566424" version="1" comment="finch is &lt;2.6.6-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566425" version="1" comment="libpurple is &lt;2.6.6-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566426" version="1" comment="libpurple-lang is &lt;2.6.6-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566427" version="1" comment="libpurple-meanwhile is &lt;2.6.6-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566428" version="1" comment="libpurple-tcl is &lt;2.6.6-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566429" version="1" comment="pidgin is &lt;2.6.6-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590449" version="1" comment="glibc is &lt;2.11.3-17.80.3 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590450" version="1" comment="glibc-32bit is &lt;2.11.3-17.80.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590451" version="1" comment="glibc-devel is &lt;2.11.3-17.80.3 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590452" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.80.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590453" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.80.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590454" version="1" comment="glibc-locale is &lt;2.11.3-17.80.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590455" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.80.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590456" version="1" comment="nscd is &lt;2.11.3-17.80.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566398" version="1" comment="dhcpcd is &lt;3.2.3-45.5.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590507" version="1" comment="kernel-default is &lt;3.0.80-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590508" version="1" comment="kernel-default-base is &lt;3.0.80-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590509" version="1" comment="kernel-default-devel is &lt;3.0.80-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590510" version="1" comment="kernel-default-extra is &lt;3.0.80-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590511" version="1" comment="kernel-source is &lt;3.0.80-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590512" version="1" comment="kernel-syms is &lt;3.0.80-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590513" version="1" comment="kernel-trace is &lt;3.0.80-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590514" version="1" comment="kernel-trace-base is &lt;3.0.80-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590515" version="1" comment="kernel-trace-devel is &lt;3.0.80-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590516" version="1" comment="kernel-trace-extra is &lt;3.0.80-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590517" version="1" comment="kernel-xen is &lt;3.0.80-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590518" version="1" comment="kernel-xen-base is &lt;3.0.80-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590519" version="1" comment="kernel-xen-devel is &lt;3.0.80-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590520" version="1" comment="kernel-xen-extra is &lt;3.0.80-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590521" version="1" comment="xen-kmp-default is &lt;4.1.5_02_3.0.80_0.5-0.5.5 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590522" version="1" comment="xen-kmp-trace is &lt;4.1.5_02_3.0.80_0.5-0.5.5 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590523" version="1" comment="kernel-default is &lt;3.0.82-0.7.9 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590524" version="1" comment="kernel-default-base is &lt;3.0.82-0.7.9 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590525" version="1" comment="kernel-default-devel is &lt;3.0.82-0.7.9 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590526" version="1" comment="kernel-default-extra is &lt;3.0.82-0.7.9 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590527" version="1" comment="kernel-source is &lt;3.0.82-0.7.9 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590528" version="1" comment="kernel-syms is &lt;3.0.82-0.7.9 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590529" version="1" comment="kernel-trace-devel is &lt;3.0.82-0.7.9 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590530" version="1" comment="kernel-xen is &lt;3.0.82-0.7.9 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590531" version="1" comment="kernel-xen-base is &lt;3.0.82-0.7.9 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590532" version="1" comment="kernel-xen-devel is &lt;3.0.82-0.7.9 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590533" version="1" comment="kernel-xen-extra is &lt;3.0.82-0.7.9 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590534" version="1" comment="xen-kmp-default is &lt;4.2.5_08_3.0.101_0.47.55-0.7.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590535" version="1" comment="xen-kmp-pae is &lt;4.2.5_08_3.0.101_0.47.55-0.7.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566112" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566113" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566114" version="1" comment="openssl is &lt;0.9.8j-0.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590584" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590585" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590590" version="1" comment="java-1_6_0-openjdk is &lt;1.6.0.0_b27.1.12.3-0.2.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590591" version="1" comment="java-1_6_0-openjdk-demo is &lt;1.6.0.0_b27.1.12.3-0.2.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590592" version="1" comment="java-1_6_0-openjdk-devel is &lt;1.6.0.0_b27.1.12.3-0.2.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590601" version="1" comment="libvirt is &lt;0.9.6-0.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590602" version="1" comment="libvirt-client is &lt;0.9.6-0.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590603" version="1" comment="libvirt-client-32bit is &lt;0.9.6-0.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590604" version="1" comment="libvirt-doc is &lt;0.9.6-0.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590605" version="1" comment="libvirt-python is &lt;0.9.6-0.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566017" version="1" comment="hplip is &lt;3.11.10-0.6.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566018" version="1" comment="hplip-hpijs is &lt;3.11.10-0.6.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590613" version="1" comment="libldb1 is &lt;3.6.3-0.30.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590614" version="1" comment="libldb1-32bit is &lt;3.6.3-0.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590615" version="1" comment="libsmbclient0 is &lt;3.6.3-0.30.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590616" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590617" version="1" comment="libtalloc1 is &lt;3.4.3-1.42.11 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590618" version="1" comment="libtalloc1-32bit is &lt;3.4.3-1.42.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590619" version="1" comment="libtalloc2 is &lt;3.6.3-0.30.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590620" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590621" version="1" comment="libtdb1 is &lt;3.6.3-0.30.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590622" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590623" version="1" comment="libtevent0 is &lt;3.6.3-0.30.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590624" version="1" comment="libtevent0-32bit is &lt;3.6.3-0.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590625" version="1" comment="libwbclient0 is &lt;3.6.3-0.30.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590626" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590627" version="1" comment="samba is &lt;3.6.3-0.30.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590628" version="1" comment="samba-32bit is &lt;3.6.3-0.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590629" version="1" comment="samba-client is &lt;3.6.3-0.30.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590630" version="1" comment="samba-client-32bit is &lt;3.6.3-0.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590631" version="1" comment="samba-krb-printing is &lt;3.6.3-0.30.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590632" version="1" comment="samba-winbind is &lt;3.6.3-0.30.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590633" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565902" version="1" comment="coreutils is &lt;8.12-6.25.29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565903" version="1" comment="coreutils-lang is &lt;8.12-6.25.29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566082" version="1" comment="libQtWebKit4 is &lt;4.6.3-5.20.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566083" version="1" comment="libQtWebKit4-32bit is &lt;4.6.3-5.20.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566084" version="1" comment="libqt4 is &lt;4.6.3-5.20.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566085" version="1" comment="libqt4-32bit is &lt;4.6.3-5.20.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566086" version="1" comment="libqt4-qt3support is &lt;4.6.3-5.20.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566087" version="1" comment="libqt4-qt3support-32bit is &lt;4.6.3-5.20.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566088" version="1" comment="libqt4-sql is &lt;4.6.3-5.20.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566089" version="1" comment="libqt4-sql-32bit is &lt;4.6.3-5.20.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566090" version="1" comment="libqt4-sql-mysql is &lt;4.6.3-5.20.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566091" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.6.3-5.20.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566092" version="1" comment="libqt4-sql-postgresql is &lt;4.6.3-5.20.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566093" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.6.3-5.20.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566094" version="1" comment="libqt4-sql-sqlite is &lt;4.6.3-5.20.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566095" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.6.3-5.20.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566096" version="1" comment="libqt4-sql-unixODBC is &lt;4.6.3-5.20.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566097" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.6.3-5.20.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566098" version="1" comment="libqt4-x11 is &lt;4.6.3-5.20.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566099" version="1" comment="libqt4-x11-32bit is &lt;4.6.3-5.20.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590679" version="1" comment="libecpg6 is &lt;9.1.8-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590680" version="1" comment="libpq5 is &lt;9.1.8-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590681" version="1" comment="libpq5-32bit is &lt;9.1.8-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566175" version="1" comment="postgresql is &lt;8.3.23-0.4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590682" version="1" comment="postgresql91 is &lt;9.1.8-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565913" version="1" comment="finch is &lt;2.6.6-0.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565914" version="1" comment="libpurple is &lt;2.6.6-0.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565915" version="1" comment="libpurple-lang is &lt;2.6.6-0.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565916" version="1" comment="libpurple-meanwhile is &lt;2.6.6-0.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565917" version="1" comment="libpurple-tcl is &lt;2.6.6-0.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565918" version="1" comment="pidgin is &lt;2.6.6-0.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590708" version="1" comment="libxml2 is &lt;2.7.6-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590709" version="1" comment="libxml2-32bit is &lt;2.7.6-0.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590710" version="1" comment="libxml2-python is &lt;2.7.6-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590718" version="1" comment="java-1_6_0-openjdk is &lt;1.6.0.0_b27.1.12.5-0.2.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590719" version="1" comment="java-1_6_0-openjdk-demo is &lt;1.6.0.0_b27.1.12.5-0.2.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590720" version="1" comment="java-1_6_0-openjdk-devel is &lt;1.6.0.0_b27.1.12.5-0.2.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590731" version="1" comment="java-1_6_0-openjdk is &lt;1.6.0.0_b27.1.12.2-0.2.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590732" version="1" comment="java-1_6_0-openjdk-demo is &lt;1.6.0.0_b27.1.12.2-0.2.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590733" version="1" comment="java-1_6_0-openjdk-devel is &lt;1.6.0.0_b27.1.12.2-0.2.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590738" version="1" comment="flash-player is &lt;11.2.202.273-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590739" version="1" comment="flash-player-gnome is &lt;11.2.202.273-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590740" version="1" comment="flash-player-kde4 is &lt;11.2.202.273-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590741" version="1" comment="flash-player is &lt;11.2.202.261-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590742" version="1" comment="flash-player is &lt;11.2.202.262-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590743" version="1" comment="flash-player-gnome is &lt;11.2.202.262-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590744" version="1" comment="flash-player-kde4 is &lt;11.2.202.262-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590745" version="1" comment="flash-player is &lt;11.2.202.270-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590746" version="1" comment="flash-player-gnome is &lt;11.2.202.270-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590747" version="1" comment="flash-player-kde4 is &lt;11.2.202.270-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590748" version="1" comment="acroread is &lt;9.5.4-0.3.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590749" version="1" comment="acroread-cmaps is &lt;9.4.6-0.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590750" version="1" comment="acroread-fonts-ja is &lt;9.4.6-0.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590751" version="1" comment="acroread-fonts-ko is &lt;9.4.6-0.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590752" version="1" comment="acroread-fonts-zh_CN is &lt;9.4.6-0.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590753" version="1" comment="acroread-fonts-zh_TW is &lt;9.4.6-0.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590754" version="1" comment="flash-player is &lt;11.2.202.275-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590755" version="1" comment="flash-player-gnome is &lt;11.2.202.275-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590756" version="1" comment="flash-player-kde4 is &lt;11.2.202.275-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590757" version="1" comment="MozillaFirefox is &lt;17.0.3esr-0.4.4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565953" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.9.5 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590758" version="1" comment="MozillaFirefox-translations is &lt;17.0.3esr-0.4.4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565955" version="1" comment="beagle is &lt;0.3.8-56.51.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565956" version="1" comment="beagle-evolution is &lt;0.3.8-56.51.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565957" version="1" comment="beagle-firefox is &lt;0.3.8-56.51.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565958" version="1" comment="beagle-gui is &lt;0.3.8-56.51.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565959" version="1" comment="beagle-lang is &lt;0.3.8-56.51.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565960" version="1" comment="libfreebl3 is &lt;3.14.2-0.4.3.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565961" version="1" comment="libfreebl3-32bit is &lt;3.14.2-0.4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565962" version="1" comment="mhtml-firefox is &lt;0.5-1.47.51.5 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565963" version="1" comment="mozilla-nspr is &lt;4.9.5-0.3.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565964" version="1" comment="mozilla-nspr-32bit is &lt;4.9.5-0.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565965" version="1" comment="mozilla-nss is &lt;3.14.2-0.4.3.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565966" version="1" comment="mozilla-nss-32bit is &lt;3.14.2-0.4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565967" version="1" comment="mozilla-nss-tools is &lt;3.14.2-0.4.3.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565952" version="1" comment="MozillaFirefox is &lt;17.0.4esr-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565954" version="1" comment="MozillaFirefox-translations is &lt;17.0.4esr-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565978" version="1" comment="MozillaFirefox is &lt;17.0.6esr-0.4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565969" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.9.17 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565979" version="1" comment="MozillaFirefox-translations is &lt;17.0.6esr-0.4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565971" version="1" comment="libfreebl3 is &lt;3.14.3-0.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565972" version="1" comment="libfreebl3-32bit is &lt;3.14.3-0.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565973" version="1" comment="mozilla-nspr is &lt;4.9.6-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565974" version="1" comment="mozilla-nspr-32bit is &lt;4.9.6-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565975" version="1" comment="mozilla-nss is &lt;3.14.3-0.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565976" version="1" comment="mozilla-nss-32bit is &lt;3.14.3-0.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565977" version="1" comment="mozilla-nss-tools is &lt;3.14.3-0.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565968" version="1" comment="MozillaFirefox is &lt;17.0.5esr-0.4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565970" version="1" comment="MozillaFirefox-translations is &lt;17.0.5esr-0.4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590767" version="1" comment="java-1_6_0-openjdk is &lt;1.6.0.0_b27.1.12.4-0.2.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590768" version="1" comment="java-1_6_0-openjdk-demo is &lt;1.6.0.0_b27.1.12.4-0.2.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590769" version="1" comment="java-1_6_0-openjdk-devel is &lt;1.6.0.0_b27.1.12.4-0.2.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590770" version="1" comment="kernel-default is &lt;3.0.58-0.6.6.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590771" version="1" comment="kernel-default-base is &lt;3.0.58-0.6.6.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590772" version="1" comment="kernel-default-devel is &lt;3.0.58-0.6.6.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590773" version="1" comment="kernel-default-extra is &lt;3.0.58-0.6.6.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590774" version="1" comment="kernel-source is &lt;3.0.58-0.6.6.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590775" version="1" comment="kernel-syms is &lt;3.0.58-0.6.6.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590776" version="1" comment="kernel-trace is &lt;3.0.58-0.6.6.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590777" version="1" comment="kernel-trace-base is &lt;3.0.58-0.6.6.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590778" version="1" comment="kernel-trace-devel is &lt;3.0.58-0.6.6.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590779" version="1" comment="kernel-trace-extra is &lt;3.0.58-0.6.6.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590780" version="1" comment="kernel-xen is &lt;3.0.58-0.6.6.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590781" version="1" comment="kernel-xen-base is &lt;3.0.58-0.6.6.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590782" version="1" comment="kernel-xen-devel is &lt;3.0.58-0.6.6.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590783" version="1" comment="kernel-xen-extra is &lt;3.0.58-0.6.6.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590784" version="1" comment="xen-kmp-default is &lt;4.1.3_06_3.0.58_0.6.6-0.7.22 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590785" version="1" comment="xen-kmp-trace is &lt;4.1.3_06_3.0.58_0.6.6-0.7.22 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590800" version="1" comment="kernel-default is &lt;3.0.93-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590801" version="1" comment="kernel-default-base is &lt;3.0.93-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590802" version="1" comment="kernel-default-devel is &lt;3.0.93-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590803" version="1" comment="kernel-default-extra is &lt;3.0.93-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590804" version="1" comment="kernel-source is &lt;3.0.93-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590805" version="1" comment="kernel-syms is &lt;3.0.93-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590806" version="1" comment="kernel-trace is &lt;3.0.93-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590807" version="1" comment="kernel-trace-base is &lt;3.0.93-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590808" version="1" comment="kernel-trace-devel is &lt;3.0.93-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590809" version="1" comment="kernel-trace-extra is &lt;3.0.93-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590810" version="1" comment="kernel-xen is &lt;3.0.93-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590811" version="1" comment="kernel-xen-base is &lt;3.0.93-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590812" version="1" comment="kernel-xen-devel is &lt;3.0.93-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590813" version="1" comment="kernel-xen-extra is &lt;3.0.93-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590814" version="1" comment="xen-kmp-default is &lt;4.1.5_02_3.0.93_0.5-0.5.39 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590815" version="1" comment="xen-kmp-trace is &lt;4.1.5_02_3.0.93_0.5-0.5.39 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590816" version="1" comment="kernel-default is &lt;3.0.93-0.8.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590817" version="1" comment="kernel-default-base is &lt;3.0.93-0.8.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590818" version="1" comment="kernel-default-devel is &lt;3.0.93-0.8.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590819" version="1" comment="kernel-default-extra is &lt;3.0.93-0.8.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590820" version="1" comment="kernel-source is &lt;3.0.93-0.8.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590821" version="1" comment="kernel-syms is &lt;3.0.93-0.8.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590822" version="1" comment="kernel-trace-devel is &lt;3.0.93-0.8.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590823" version="1" comment="kernel-xen is &lt;3.0.93-0.8.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590824" version="1" comment="kernel-xen-base is &lt;3.0.93-0.8.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590825" version="1" comment="kernel-xen-devel is &lt;3.0.93-0.8.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590826" version="1" comment="kernel-xen-extra is &lt;3.0.93-0.8.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590827" version="1" comment="xen-kmp-default is &lt;4.2.2_06_3.0.93_0.8-0.7.17 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590896" version="1" comment="flash-player is &lt;11.2.202.280-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590897" version="1" comment="flash-player-gnome is &lt;11.2.202.280-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590898" version="1" comment="flash-player-kde4 is &lt;11.2.202.280-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590899" version="1" comment="krb5 is &lt;1.6.3-133.49.54.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590900" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009138409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590901" version="1" comment="krb5-client is &lt;1.6.3-133.49.54.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566055" version="1" comment="krb5 is &lt;1.6.3-133.49.58.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566056" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566057" version="1" comment="krb5-client is &lt;1.6.3-133.49.58.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566249" version="1" comment="xen is &lt;4.1.6_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566250" version="1" comment="xen-doc-html is &lt;4.1.6_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566251" version="1" comment="xen-doc-pdf is &lt;4.1.6_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566252" version="1" comment="xen-kmp-default is &lt;4.1.6_02_3.0.93_0.5-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566253" version="1" comment="xen-kmp-pae is &lt;4.1.6_02_3.0.93_0.5-0.5.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566254" version="1" comment="xen-kmp-trace is &lt;4.1.6_02_3.0.93_0.5-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566255" version="1" comment="xen-libs is &lt;4.1.6_02-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566256" version="1" comment="xen-libs-32bit is &lt;4.1.6_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566257" version="1" comment="xen-tools is &lt;4.1.6_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566258" version="1" comment="xen-tools-domU is &lt;4.1.6_02-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567207" version="1" comment="xen is &lt;4.2.3_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567208" version="1" comment="xen-doc-html is &lt;4.2.3_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567209" version="1" comment="xen-doc-pdf is &lt;4.2.3_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567210" version="1" comment="xen-kmp-default is &lt;4.2.3_02_3.0.93_0.8-0.7.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567211" version="1" comment="xen-kmp-pae is &lt;4.2.3_02_3.0.93_0.8-0.7.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567212" version="1" comment="xen-libs is &lt;4.2.3_02-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567213" version="1" comment="xen-libs-32bit is &lt;4.2.3_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567214" version="1" comment="xen-tools is &lt;4.2.3_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567215" version="1" comment="xen-tools-domU is &lt;4.2.3_02-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590914" version="1" comment="java-1_6_0-openjdk is &lt;1.6.0.0_b27.1.12.6-0.2.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590915" version="1" comment="java-1_6_0-openjdk-demo is &lt;1.6.0.0_b27.1.12.6-0.2.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590916" version="1" comment="java-1_6_0-openjdk-devel is &lt;1.6.0.0_b27.1.12.6-0.2.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590917" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.6-0.19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590918" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.6-0.19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590919" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.6-0.19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590928" version="1" comment="wireshark is &lt;1.8.5-0.2.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590931" version="1" comment="libpixman-1-0 is &lt;0.24.4-0.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590932" version="1" comment="libpixman-1-0-32bit is &lt;0.24.4-0.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590936" version="1" comment="gnutls is &lt;2.4.1-24.39.45.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590937" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.45.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590938" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567098" version="1" comment="python-setuptools is &lt;0.6c8-10.19.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591050" version="1" comment="puppet is &lt;2.6.18-0.4.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566171" version="1" comment="perl is &lt;5.10.0-64.61.61.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566172" version="1" comment="perl-32bit is &lt;5.10.0-64.61.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566173" version="1" comment="perl-base is &lt;5.10.0-64.61.61.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566174" version="1" comment="perl-doc is &lt;5.10.0-64.61.61.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565980" version="1" comment="MozillaFirefox is &lt;17.0.7esr-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565981" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.9.31 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565982" version="1" comment="MozillaFirefox-translations is &lt;17.0.7esr-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566430" version="1" comment="MozillaFirefox is &lt;17.0.7esr-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566431" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566432" version="1" comment="MozillaFirefox-translations is &lt;17.0.7esr-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591053" version="1" comment="MozillaFirefox is &lt;17.0.8esr-0.4.2.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591054" version="1" comment="MozillaFirefox-translations is &lt;17.0.8esr-0.4.2.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591055" version="1" comment="MozillaFirefox is &lt;17.0.8esr-0.7.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591056" version="1" comment="MozillaFirefox-translations is &lt;17.0.8esr-0.7.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565846" version="1" comment="MozillaFirefox is &lt;17.0.9esr-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565847" version="1" comment="MozillaFirefox-translations is &lt;17.0.9esr-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566318" version="1" comment="MozillaFirefox is &lt;17.0.9esr-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566319" version="1" comment="MozillaFirefox-translations is &lt;17.0.9esr-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565983" version="1" comment="MozillaFirefox is &lt;17.0.10esr-0.4.2.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565984" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.9.62 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565985" version="1" comment="MozillaFirefox-translations is &lt;17.0.10esr-0.4.2.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566148" version="1" comment="libfreebl3 is &lt;3.15.2-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566149" version="1" comment="libfreebl3-32bit is &lt;3.15.2-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566150" version="1" comment="mozilla-nspr is &lt;4.10.1-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566151" version="1" comment="mozilla-nspr-32bit is &lt;4.10.1-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566152" version="1" comment="mozilla-nss is &lt;3.15.2-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566153" version="1" comment="mozilla-nss-32bit is &lt;3.15.2-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566154" version="1" comment="mozilla-nss-tools is &lt;3.15.2-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566433" version="1" comment="MozillaFirefox is &lt;17.0.10esr-0.7.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566434" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.12.41 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566435" version="1" comment="MozillaFirefox-translations is &lt;17.0.10esr-0.7.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566964" version="1" comment="libfreebl3 is &lt;3.15.2-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566965" version="1" comment="libfreebl3-32bit is &lt;3.15.2-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566966" version="1" comment="libsoftokn3 is &lt;3.15.2-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566967" version="1" comment="libsoftokn3-32bit is &lt;3.15.2-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566968" version="1" comment="mozilla-nss is &lt;3.15.2-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566969" version="1" comment="mozilla-nss-32bit is &lt;3.15.2-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566970" version="1" comment="mozilla-nss-tools is &lt;3.15.2-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566155" version="1" comment="libfreebl3 is &lt;3.15.3-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566156" version="1" comment="libfreebl3-32bit is &lt;3.15.3-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566157" version="1" comment="mozilla-nspr is &lt;4.10.2-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566158" version="1" comment="mozilla-nspr-32bit is &lt;4.10.2-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566159" version="1" comment="mozilla-nss is &lt;3.15.3-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566160" version="1" comment="mozilla-nss-32bit is &lt;3.15.3-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566161" version="1" comment="mozilla-nss-tools is &lt;3.15.3-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566997" version="1" comment="libfreebl3 is &lt;3.15.3-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566998" version="1" comment="libfreebl3-32bit is &lt;3.15.3-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566999" version="1" comment="libsoftokn3 is &lt;3.15.3-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567000" version="1" comment="libsoftokn3-32bit is &lt;3.15.3-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567001" version="1" comment="mozilla-nss is &lt;3.15.3-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567002" version="1" comment="mozilla-nss-32bit is &lt;3.15.3-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567003" version="1" comment="mozilla-nss-tools is &lt;3.15.3-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334122" version="1" comment="python is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563167" version="1" comment="telepathy-gabble is &lt;0.7.10-2.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566188" version="1" comment="sudo is &lt;1.7.6p2-0.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566120" version="1" comment="libpoppler-glib4 is &lt;0.12.3-1.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566121" version="1" comment="libpoppler-qt4-3 is &lt;0.12.3-1.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566122" version="1" comment="libpoppler5 is &lt;0.12.3-1.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563015" version="1" comment="poppler-tools is &lt;0.12.3-1.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567102" version="1" comment="ruby is &lt;1.8.7.p357-0.9.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591077" version="1" comment="libmysql55client18 is &lt;5.5.33-0.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591078" version="1" comment="libmysql55client18-32bit is &lt;5.5.33-0.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591079" version="1" comment="libmysql55client_r18 is &lt;5.5.33-0.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591080" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.33-0.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591081" version="1" comment="libmysqlclient15 is &lt;5.0.96-0.6.9 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591082" version="1" comment="libmysqlclient15-32bit is &lt;5.0.96-0.6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591083" version="1" comment="libmysqlclient_r15 is &lt;5.0.96-0.6.9 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591084" version="1" comment="libmysqlclient_r15-32bit is &lt;5.0.96-0.6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591085" version="1" comment="mysql is &lt;5.5.33-0.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591086" version="1" comment="mysql-client is &lt;5.5.33-0.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567061" version="1" comment="pwlib is &lt;1.10.10-120.35.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567062" version="1" comment="pwlib-plugins-avc is &lt;1.10.10-120.35.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567063" version="1" comment="pwlib-plugins-dc is &lt;1.10.10-120.35.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567064" version="1" comment="pwlib-plugins-v4l2 is &lt;1.10.10-120.35.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591117" version="1" comment="Mesa is &lt;9.0.3-0.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591118" version="1" comment="Mesa-32bit is &lt;9.0.3-0.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566909" version="1" comment="librsvg is &lt;2.26.0-2.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566910" version="1" comment="librsvg-32bit is &lt;2.26.0-2.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566911" version="1" comment="rsvg-view is &lt;2.26.0-2.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566100" version="1" comment="libecpg6 is &lt;9.1.9-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566101" version="1" comment="libpq5 is &lt;9.1.9-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566102" version="1" comment="libpq5-32bit is &lt;9.1.9-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566103" version="1" comment="postgresql91 is &lt;9.1.9-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566239" version="1" comment="xen is &lt;4.1.5_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566240" version="1" comment="xen-doc-html is &lt;4.1.5_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566241" version="1" comment="xen-doc-pdf is &lt;4.1.5_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566242" version="1" comment="xen-kmp-default is &lt;4.1.5_02_3.0.74_0.6.10-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566243" version="1" comment="xen-kmp-pae is &lt;4.1.5_02_3.0.74_0.6.10-0.5.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566244" version="1" comment="xen-kmp-trace is &lt;4.1.5_02_3.0.74_0.6.10-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566245" version="1" comment="xen-libs is &lt;4.1.5_02-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566246" version="1" comment="xen-libs-32bit is &lt;4.1.5_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566247" version="1" comment="xen-tools is &lt;4.1.5_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566248" version="1" comment="xen-tools-domU is &lt;4.1.5_02-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567216" version="1" comment="xen is &lt;4.2.3_08-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567217" version="1" comment="xen-doc-html is &lt;4.2.3_08-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567218" version="1" comment="xen-doc-pdf is &lt;4.2.3_08-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567219" version="1" comment="xen-kmp-default is &lt;4.2.3_08_3.0.101_0.8-0.7.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567220" version="1" comment="xen-kmp-pae is &lt;4.2.3_08_3.0.101_0.8-0.7.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567221" version="1" comment="xen-libs is &lt;4.2.3_08-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567222" version="1" comment="xen-libs-32bit is &lt;4.2.3_08-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567223" version="1" comment="xen-tools is &lt;4.2.3_08-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567224" version="1" comment="xen-tools-domU is &lt;4.2.3_08-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591144" version="1" comment="nfs-client is &lt;1.2.3-18.31.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591145" version="1" comment="nfs-kernel-server is &lt;1.2.3-18.29.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591149" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.70.72.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591150" version="1" comment="xorg-x11-server is &lt;7.4-27.70.72.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591151" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.70.72.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591162" version="1" comment="curl is &lt;7.19.7-1.20.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591163" version="1" comment="libcurl4 is &lt;7.19.7-1.20.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591164" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.20.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334050" version="1" comment="ruby is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591172" version="1" comment="libtiff3 is &lt;3.8.2-141.152.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591173" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.152.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566710" version="1" comment="kernel-default is &lt;3.0.101-0.40.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566711" version="1" comment="kernel-default-base is &lt;3.0.101-0.40.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566712" version="1" comment="kernel-default-devel is &lt;3.0.101-0.40.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566713" version="1" comment="kernel-default-extra is &lt;3.0.101-0.40.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566718" version="1" comment="kernel-source is &lt;3.0.101-0.40.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566719" version="1" comment="kernel-syms is &lt;3.0.101-0.40.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566720" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.40.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566721" version="1" comment="kernel-xen is &lt;3.0.101-0.40.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566722" version="1" comment="kernel-xen-base is &lt;3.0.101-0.40.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566723" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.40.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566724" version="1" comment="kernel-xen-extra is &lt;3.0.101-0.40.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566275" version="1" comment="xorg-x11-libX11 is &lt;7.4-5.11.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566276" version="1" comment="xorg-x11-libX11-32bit is &lt;7.4-5.11.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566277" version="1" comment="xorg-x11-libX11-devel is &lt;7.4-5.11.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566278" version="1" comment="xorg-x11-libXext is &lt;7.4-1.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566279" version="1" comment="xorg-x11-libXext-32bit is &lt;7.4-1.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566280" version="1" comment="xorg-x11-libXext-devel is &lt;7.4-1.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567276" version="1" comment="xorg-x11-libXext is &lt;7.4-1.18.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567277" version="1" comment="xorg-x11-libXext-32bit is &lt;7.4-1.18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566281" version="1" comment="xorg-x11-libXfixes is &lt;7.4-1.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566282" version="1" comment="xorg-x11-libXfixes-32bit is &lt;7.4-1.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566283" version="1" comment="xorg-x11-libXfixes-devel is &lt;7.4-1.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567278" version="1" comment="xorg-x11-libXfixes is &lt;7.4-1.16.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567279" version="1" comment="xorg-x11-libXfixes-32bit is &lt;7.4-1.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591191" version="1" comment="xorg-x11-devel is &lt;7.4-8.26.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591192" version="1" comment="xorg-x11-libs is &lt;7.4-8.26.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591193" version="1" comment="xorg-x11-libs-32bit is &lt;7.4-8.26.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591194" version="1" comment="xorg-x11-libs is &lt;7.4-8.26.38.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591195" version="1" comment="xorg-x11-libs-32bit is &lt;7.4-8.26.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566287" version="1" comment="xorg-x11-libXrender is &lt;7.4-1.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566288" version="1" comment="xorg-x11-libXrender-32bit is &lt;7.4-1.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566289" version="1" comment="xorg-x11-libXrender-devel is &lt;7.4-1.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567280" version="1" comment="xorg-x11-libXrender is &lt;7.4-1.16.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567281" version="1" comment="xorg-x11-libXrender-32bit is &lt;7.4-1.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566293" version="1" comment="xorg-x11-libXv is &lt;7.4-1.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566294" version="1" comment="xorg-x11-libXv-32bit is &lt;7.4-1.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566295" version="1" comment="xorg-x11-libXv-devel is &lt;7.4-1.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567284" version="1" comment="xorg-x11-libXv is &lt;7.4-1.16.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567285" version="1" comment="xorg-x11-libXv-32bit is &lt;7.4-1.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565844" version="1" comment="Mesa is &lt;7.11.2-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565845" version="1" comment="Mesa-32bit is &lt;7.11.2-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566290" version="1" comment="xorg-x11-libXt is &lt;7.4-1.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566291" version="1" comment="xorg-x11-libXt-32bit is &lt;7.4-1.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566292" version="1" comment="xorg-x11-libXt-devel is &lt;7.4-1.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567282" version="1" comment="xorg-x11-libXt is &lt;7.4-1.19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567283" version="1" comment="xorg-x11-libXt-32bit is &lt;7.4-1.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566058" version="1" comment="kvm is &lt;0.15.1-0.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591216" version="1" comment="kvm is &lt;1.4.2-0.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565899" version="1" comment="clamav is &lt;0.97.8-0.2.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566170" version="1" comment="openvpn is &lt;2.0.9-143.33.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567028" version="1" comment="openvpn is &lt;2.0.9-143.40.5 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566284" version="1" comment="xorg-x11-libXp is &lt;7.4-1.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566285" version="1" comment="xorg-x11-libXp-32bit is &lt;7.4-1.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566286" version="1" comment="xorg-x11-libXp-devel is &lt;7.4-1.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566296" version="1" comment="xorg-x11-libxcb is &lt;7.4-1.22.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566297" version="1" comment="xorg-x11-libxcb-32bit is &lt;7.4-1.22.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566298" version="1" comment="xorg-x11-libxcb-devel is &lt;7.4-1.22.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591224" version="1" comment="kernel-default is &lt;3.0.74-0.6.8.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591225" version="1" comment="kernel-default-base is &lt;3.0.74-0.6.8.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591226" version="1" comment="kernel-default-devel is &lt;3.0.74-0.6.8.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591227" version="1" comment="kernel-default-extra is &lt;3.0.74-0.6.8.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591228" version="1" comment="kernel-source is &lt;3.0.74-0.6.8.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591229" version="1" comment="kernel-syms is &lt;3.0.74-0.6.8.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591230" version="1" comment="kernel-trace is &lt;3.0.74-0.6.8.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591231" version="1" comment="kernel-trace-base is &lt;3.0.74-0.6.8.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591232" version="1" comment="kernel-trace-devel is &lt;3.0.74-0.6.8.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591233" version="1" comment="kernel-trace-extra is &lt;3.0.74-0.6.8.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591234" version="1" comment="kernel-xen is &lt;3.0.74-0.6.8.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591235" version="1" comment="kernel-xen-base is &lt;3.0.74-0.6.8.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591236" version="1" comment="kernel-xen-devel is &lt;3.0.74-0.6.8.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591237" version="1" comment="kernel-xen-extra is &lt;3.0.74-0.6.8.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591238" version="1" comment="xen-kmp-default is &lt;4.1.4_02_3.0.74_0.6.8-0.5.26 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591239" version="1" comment="xen-kmp-trace is &lt;4.1.4_02_3.0.74_0.6.8-0.5.26 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566008" version="1" comment="gnutls is &lt;2.4.1-24.39.47.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566009" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.47.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566010" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591274" version="1" comment="kernel-default is &lt;3.0.101-0.15.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591275" version="1" comment="kernel-default-base is &lt;3.0.101-0.15.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591276" version="1" comment="kernel-default-devel is &lt;3.0.101-0.15.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591277" version="1" comment="kernel-default-extra is &lt;3.0.101-0.15.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591278" version="1" comment="kernel-source is &lt;3.0.101-0.15.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591279" version="1" comment="kernel-syms is &lt;3.0.101-0.15.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591280" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.15.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591281" version="1" comment="kernel-xen is &lt;3.0.101-0.15.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591282" version="1" comment="kernel-xen-base is &lt;3.0.101-0.15.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591283" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.15.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591284" version="1" comment="kernel-xen-extra is &lt;3.0.101-0.15.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591285" version="1" comment="xen-kmp-default is &lt;4.2.3_08_3.0.101_0.15-0.7.22 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591320" version="1" comment="curl is &lt;7.19.7-1.20.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591321" version="1" comment="libcurl4 is &lt;7.19.7-1.20.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591322" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.20.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591323" version="1" comment="curl is &lt;7.19.7-1.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591324" version="1" comment="libcurl4 is &lt;7.19.7-1.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591325" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333957" version="1" comment="libreoffice is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567198" version="1" comment="xen is &lt;4.2.2_06-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567199" version="1" comment="xen-doc-html is &lt;4.2.2_06-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567200" version="1" comment="xen-doc-pdf is &lt;4.2.2_06-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567201" version="1" comment="xen-kmp-default is &lt;4.2.2_06_3.0.82_0.7-0.7.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567202" version="1" comment="xen-kmp-pae is &lt;4.2.2_06_3.0.82_0.7-0.7.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567203" version="1" comment="xen-libs is &lt;4.2.2_06-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567204" version="1" comment="xen-libs-32bit is &lt;4.2.2_06-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567205" version="1" comment="xen-tools is &lt;4.2.2_06-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567206" version="1" comment="xen-tools-domU is &lt;4.2.2_06-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591334" version="1" comment="kernel-default is &lt;3.0.101-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591335" version="1" comment="kernel-default-base is &lt;3.0.101-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591336" version="1" comment="kernel-default-devel is &lt;3.0.101-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591337" version="1" comment="kernel-default-extra is &lt;3.0.101-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591338" version="1" comment="kernel-source is &lt;3.0.101-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591339" version="1" comment="kernel-syms is &lt;3.0.101-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591340" version="1" comment="kernel-trace is &lt;3.0.101-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591341" version="1" comment="kernel-trace-base is &lt;3.0.101-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591342" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591343" version="1" comment="kernel-trace-extra is &lt;3.0.101-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591344" version="1" comment="kernel-xen is &lt;3.0.101-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591345" version="1" comment="kernel-xen-base is &lt;3.0.101-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591346" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591347" version="1" comment="kernel-xen-extra is &lt;3.0.101-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591348" version="1" comment="xen-kmp-default is &lt;4.1.6_02_3.0.101_0.5-0.5.5 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591349" version="1" comment="xen-kmp-trace is &lt;4.1.6_02_3.0.101_0.5-0.5.5 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591350" version="1" comment="kernel-default is &lt;3.0.101-0.8.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591351" version="1" comment="kernel-default-base is &lt;3.0.101-0.8.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591352" version="1" comment="kernel-default-devel is &lt;3.0.101-0.8.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591353" version="1" comment="kernel-default-extra is &lt;3.0.101-0.8.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591354" version="1" comment="kernel-source is &lt;3.0.101-0.8.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591355" version="1" comment="kernel-syms is &lt;3.0.101-0.8.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591356" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.8.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591357" version="1" comment="kernel-xen is &lt;3.0.101-0.8.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591358" version="1" comment="kernel-xen-base is &lt;3.0.101-0.8.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591359" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.8.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591360" version="1" comment="kernel-xen-extra is &lt;3.0.101-0.8.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591361" version="1" comment="xen-kmp-default is &lt;4.2.3_02_3.0.101_0.8-0.7.9 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566585" version="1" comment="glibc is &lt;2.11.3-17.87.3 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566586" version="1" comment="glibc-32bit is &lt;2.11.3-17.87.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566587" version="1" comment="glibc-devel is &lt;2.11.3-17.87.3 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566588" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.87.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566589" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.87.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566590" version="1" comment="glibc-locale is &lt;2.11.3-17.87.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566591" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.87.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566592" version="1" comment="nscd is &lt;2.11.3-17.87.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567225" version="1" comment="xen is &lt;4.2.4_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567226" version="1" comment="xen-doc-html is &lt;4.2.4_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567227" version="1" comment="xen-doc-pdf is &lt;4.2.4_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567228" version="1" comment="xen-kmp-default is &lt;4.2.4_02_3.0.101_0.15-0.7.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567229" version="1" comment="xen-kmp-pae is &lt;4.2.4_02_3.0.101_0.15-0.7.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567230" version="1" comment="xen-libs is &lt;4.2.4_02-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567231" version="1" comment="xen-libs-32bit is &lt;4.2.4_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567232" version="1" comment="xen-tools is &lt;4.2.4_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567233" version="1" comment="xen-tools-domU is &lt;4.2.4_02-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565911" version="1" comment="dhcp is &lt;4.2.4.P2-0.11.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565912" version="1" comment="dhcp-client is &lt;4.2.4.P2-0.11.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334125" version="1" comment="java-1_7_0-openjdk is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591440" version="1" comment="wireshark is &lt;1.8.6-0.2.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591443" version="1" comment="wireshark is &lt;1.8.8-0.2.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591446" version="1" comment="acroread is &lt;9.5.5-0.3.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591447" version="1" comment="acroread-cmaps is &lt;9.4.6-0.4.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591448" version="1" comment="acroread-fonts-ja is &lt;9.4.6-0.4.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591449" version="1" comment="acroread-fonts-ko is &lt;9.4.6-0.4.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591450" version="1" comment="acroread-fonts-zh_CN is &lt;9.4.6-0.4.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591451" version="1" comment="acroread-fonts-zh_TW is &lt;9.4.6-0.4.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591452" version="1" comment="flash-player is &lt;11.2.202.285-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591453" version="1" comment="flash-player-gnome is &lt;11.2.202.285-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591454" version="1" comment="flash-player-kde4 is &lt;11.2.202.285-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591455" version="1" comment="kernel-default is &lt;3.0.74-0.6.10.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591456" version="1" comment="kernel-default-base is &lt;3.0.74-0.6.10.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591457" version="1" comment="kernel-default-devel is &lt;3.0.74-0.6.10.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591458" version="1" comment="kernel-default-extra is &lt;3.0.74-0.6.10.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591459" version="1" comment="kernel-source is &lt;3.0.74-0.6.10.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591460" version="1" comment="kernel-syms is &lt;3.0.74-0.6.10.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591461" version="1" comment="kernel-trace is &lt;3.0.74-0.6.10.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591462" version="1" comment="kernel-trace-base is &lt;3.0.74-0.6.10.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591463" version="1" comment="kernel-trace-devel is &lt;3.0.74-0.6.10.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591464" version="1" comment="kernel-trace-extra is &lt;3.0.74-0.6.10.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591465" version="1" comment="kernel-xen is &lt;3.0.74-0.6.10.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591466" version="1" comment="kernel-xen-base is &lt;3.0.74-0.6.10.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591467" version="1" comment="kernel-xen-devel is &lt;3.0.74-0.6.10.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591468" version="1" comment="kernel-xen-extra is &lt;3.0.74-0.6.10.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591469" version="1" comment="xen-kmp-default is &lt;4.1.4_02_3.0.74_0.6.10-0.5.32 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591470" version="1" comment="xen-kmp-trace is &lt;4.1.4_02_3.0.74_0.6.10-0.5.32 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566143" version="1" comment="libxml2 is &lt;2.7.6-0.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566144" version="1" comment="libxml2-32bit is &lt;2.7.6-0.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566145" version="1" comment="libxml2-python is &lt;2.7.6-0.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591505" version="1" comment="strongswan is &lt;4.4.0-6.17.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591506" version="1" comment="strongswan-doc is &lt;4.4.0-6.17.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591507" version="1" comment="strongswan is &lt;4.4.0-6.17.5 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591508" version="1" comment="strongswan-doc is &lt;4.4.0-6.17.5 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591513" version="1" comment="flash-player is &lt;11.2.202.291-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591514" version="1" comment="flash-player-gnome is &lt;11.2.202.291-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591515" version="1" comment="flash-player-kde4 is &lt;11.2.202.291-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591516" version="1" comment="flash-player is &lt;11.2.202.297-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591517" version="1" comment="flash-player-gnome is &lt;11.2.202.297-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591518" version="1" comment="flash-player-kde4 is &lt;11.2.202.297-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591519" version="1" comment="flash-player is &lt;11.2.202.310-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591520" version="1" comment="flash-player-gnome is &lt;11.2.202.310-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591521" version="1" comment="flash-player-kde4 is &lt;11.2.202.310-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591530" version="1" comment="puppet is &lt;2.6.18-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567448" version="1" comment="socat is &lt;1.7.0.0-1.18.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591533" version="1" comment="libzypp is &lt;9.16.1-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591534" version="1" comment="libzypp is &lt;9.37.1-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334136" version="1" comment="evince is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566027" version="1" comment="java-1_6_0-openjdk is &lt;1.6.0.0_b27.1.12.7-0.2.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566028" version="1" comment="java-1_6_0-openjdk-demo is &lt;1.6.0.0_b27.1.12.7-0.2.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566029" version="1" comment="java-1_6_0-openjdk-devel is &lt;1.6.0.0_b27.1.12.7-0.2.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591540" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.6-0.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591541" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.6-0.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591542" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.6-0.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591543" version="1" comment="ruby is &lt;1.8.7.p357-0.9.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567073" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-0.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567074" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-0.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567075" version="1" comment="python is &lt;2.6.9-0.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567076" version="1" comment="python-base is &lt;2.6.9-0.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567077" version="1" comment="python-base-32bit is &lt;2.6.9-0.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567078" version="1" comment="python-curses is &lt;2.6.9-0.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567079" version="1" comment="python-devel is &lt;2.6.9-0.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563796" version="1" comment="python-tk is &lt;2.6.9-0.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567080" version="1" comment="python-xml is &lt;2.6.9-0.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334232" version="1" comment="freerdp is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591603" version="1" comment="libldb1 is &lt;3.6.3-0.33.35.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591604" version="1" comment="libldb1-32bit is &lt;3.6.3-0.33.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591605" version="1" comment="libsmbclient0 is &lt;3.6.3-0.33.35.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591606" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.33.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591607" version="1" comment="libtalloc1 is &lt;3.4.3-1.46.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591608" version="1" comment="libtalloc1-32bit is &lt;3.4.3-1.46.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591609" version="1" comment="libtalloc2 is &lt;3.6.3-0.33.35.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591610" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.33.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591611" version="1" comment="libtdb1 is &lt;3.6.3-0.33.35.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591612" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.33.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591613" version="1" comment="libtevent0 is &lt;3.6.3-0.33.35.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591614" version="1" comment="libtevent0-32bit is &lt;3.6.3-0.33.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591615" version="1" comment="libwbclient0 is &lt;3.6.3-0.33.35.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591616" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.33.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591617" version="1" comment="samba is &lt;3.6.3-0.33.35.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591618" version="1" comment="samba-32bit is &lt;3.6.3-0.33.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591619" version="1" comment="samba-client is &lt;3.6.3-0.33.35.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591620" version="1" comment="samba-client-32bit is &lt;3.6.3-0.33.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591621" version="1" comment="samba-doc is &lt;3.6.3-0.33.35.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591622" version="1" comment="samba-krb-printing is &lt;3.6.3-0.33.35.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591623" version="1" comment="samba-winbind is &lt;3.6.3-0.33.35.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591624" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.33.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591625" version="1" comment="libldb1 is &lt;3.6.3-0.42.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591626" version="1" comment="libldb1-32bit is &lt;3.6.3-0.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591627" version="1" comment="libsmbclient0 is &lt;3.6.3-0.42.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591628" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591629" version="1" comment="libtalloc2 is &lt;3.6.3-0.42.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591630" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591631" version="1" comment="libtdb1 is &lt;3.6.3-0.42.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591632" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591633" version="1" comment="libtevent0 is &lt;3.6.3-0.42.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591634" version="1" comment="libtevent0-32bit is &lt;3.6.3-0.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591635" version="1" comment="libwbclient0 is &lt;3.6.3-0.42.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591636" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591637" version="1" comment="samba is &lt;3.6.3-0.42.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591638" version="1" comment="samba-32bit is &lt;3.6.3-0.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591639" version="1" comment="samba-client is &lt;3.6.3-0.42.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591640" version="1" comment="samba-client-32bit is &lt;3.6.3-0.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591641" version="1" comment="samba-doc is &lt;3.6.3-0.42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591642" version="1" comment="samba-krb-printing is &lt;3.6.3-0.42.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591643" version="1" comment="samba-winbind is &lt;3.6.3-0.42.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591644" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566652" version="1" comment="kde4-kgreeter-plugins is &lt;4.3.5-0.12.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566653" version="1" comment="kdebase4-wallpapers is &lt;4.3.5-0.11.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566654" version="1" comment="kdebase4-workspace is &lt;4.3.5-0.12.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566655" version="1" comment="kdebase4-workspace-ksysguardd is &lt;4.3.5-0.12.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566656" version="1" comment="kdm is &lt;4.3.5-0.12.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566657" version="1" comment="kwin is &lt;4.3.5-0.12.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563580" version="1" comment="libreoffice is &lt;4.0.3.3.26-0.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563581" version="1" comment="libreoffice-base is &lt;4.0.3.3.26-0.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563582" version="1" comment="libreoffice-base-drivers-postgresql is &lt;4.0.3.3.26-0.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563583" version="1" comment="libreoffice-base-extensions is &lt;4.0.3.3.26-0.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563585" version="1" comment="libreoffice-calc is &lt;4.0.3.3.26-0.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563586" version="1" comment="libreoffice-calc-extensions is &lt;4.0.3.3.26-0.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563587" version="1" comment="libreoffice-draw is &lt;4.0.3.3.26-0.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563588" version="1" comment="libreoffice-draw-extensions is &lt;4.0.3.3.26-0.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563589" version="1" comment="libreoffice-filters-optional is &lt;4.0.3.3.26-0.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563590" version="1" comment="libreoffice-gnome is &lt;4.0.3.3.26-0.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563591" version="1" comment="libreoffice-help-cs is &lt;4.0.3.3.26-0.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563592" version="1" comment="libreoffice-help-da is &lt;4.0.3.3.26-0.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563593" version="1" comment="libreoffice-help-de is &lt;4.0.3.3.26-0.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563594" version="1" comment="libreoffice-help-en-GB is &lt;4.0.3.3.26-0.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563595" version="1" comment="libreoffice-help-en-US is &lt;4.0.3.3.26-0.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563596" version="1" comment="libreoffice-help-es is &lt;4.0.3.3.26-0.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563597" version="1" comment="libreoffice-help-fr is &lt;4.0.3.3.26-0.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563598" version="1" comment="libreoffice-help-gu-IN is &lt;4.0.3.3.26-0.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563599" version="1" comment="libreoffice-help-hi-IN is &lt;4.0.3.3.26-0.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563600" version="1" comment="libreoffice-help-hu is &lt;4.0.3.3.26-0.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563601" version="1" comment="libreoffice-help-it is &lt;4.0.3.3.26-0.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563602" version="1" comment="libreoffice-help-ja is &lt;4.0.3.3.26-0.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563603" version="1" comment="libreoffice-help-ko is &lt;4.0.3.3.26-0.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563604" version="1" comment="libreoffice-help-nl is &lt;4.0.3.3.26-0.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563605" version="1" comment="libreoffice-help-pl is &lt;4.0.3.3.26-0.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563606" version="1" comment="libreoffice-help-pt is &lt;4.0.3.3.26-0.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563607" version="1" comment="libreoffice-help-pt-BR is &lt;4.0.3.3.26-0.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563608" version="1" comment="libreoffice-help-ru is &lt;4.0.3.3.26-0.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563609" version="1" comment="libreoffice-help-sv is &lt;4.0.3.3.26-0.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563610" version="1" comment="libreoffice-help-zh-CN is &lt;4.0.3.3.26-0.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563611" version="1" comment="libreoffice-help-zh-TW is &lt;4.0.3.3.26-0.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563612" version="1" comment="libreoffice-icon-themes is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563613" version="1" comment="libreoffice-impress is &lt;4.0.3.3.26-0.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563614" version="1" comment="libreoffice-impress-extensions is &lt;4.0.3.3.26-0.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563615" version="1" comment="libreoffice-kde is &lt;4.0.3.3.26-0.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563616" version="1" comment="libreoffice-kde4 is &lt;4.0.3.3.26-0.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563617" version="1" comment="libreoffice-l10n-af is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563618" version="1" comment="libreoffice-l10n-ar is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563619" version="1" comment="libreoffice-l10n-ca is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563620" version="1" comment="libreoffice-l10n-cs is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563621" version="1" comment="libreoffice-l10n-da is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563622" version="1" comment="libreoffice-l10n-de is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563624" version="1" comment="libreoffice-l10n-en-GB is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563625" version="1" comment="libreoffice-l10n-es is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563626" version="1" comment="libreoffice-l10n-fi is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563627" version="1" comment="libreoffice-l10n-fr is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563628" version="1" comment="libreoffice-l10n-gu-IN is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563629" version="1" comment="libreoffice-l10n-hi-IN is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563630" version="1" comment="libreoffice-l10n-hu is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563631" version="1" comment="libreoffice-l10n-it is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563632" version="1" comment="libreoffice-l10n-ja is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563633" version="1" comment="libreoffice-l10n-ko is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563634" version="1" comment="libreoffice-l10n-nb is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563635" version="1" comment="libreoffice-l10n-nl is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563636" version="1" comment="libreoffice-l10n-nn is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563637" version="1" comment="libreoffice-l10n-pl is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563639" version="1" comment="libreoffice-l10n-pt is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563640" version="1" comment="libreoffice-l10n-pt-BR is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563641" version="1" comment="libreoffice-l10n-ru is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563642" version="1" comment="libreoffice-l10n-sk is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563643" version="1" comment="libreoffice-l10n-sv is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563644" version="1" comment="libreoffice-l10n-xh is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563645" version="1" comment="libreoffice-l10n-zh-CN is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563646" version="1" comment="libreoffice-l10n-zh-TW is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563647" version="1" comment="libreoffice-l10n-zu is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563648" version="1" comment="libreoffice-mailmerge is &lt;4.0.3.3.26-0.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563649" version="1" comment="libreoffice-math is &lt;4.0.3.3.26-0.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563650" version="1" comment="libreoffice-mono is &lt;4.0.3.3.26-0.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563651" version="1" comment="libreoffice-officebean is &lt;4.0.3.3.26-0.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563652" version="1" comment="libreoffice-pyuno is &lt;4.0.3.3.26-0.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563654" version="1" comment="libreoffice-writer is &lt;4.0.3.3.26-0.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563655" version="1" comment="libreoffice-writer-extensions is &lt;4.0.3.3.26-0.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566131" version="1" comment="libtiff3 is &lt;3.8.2-141.154.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566132" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.154.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566177" version="1" comment="libpython2_6-1_0 is &lt;2.6.8-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566178" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.8-0.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566179" version="1" comment="python is &lt;2.6.8-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566180" version="1" comment="python-base is &lt;2.6.8-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566181" version="1" comment="python-base-32bit is &lt;2.6.8-0.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566182" version="1" comment="python-curses is &lt;2.6.8-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566183" version="1" comment="python-devel is &lt;2.6.8-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563127" version="1" comment="python-tk is &lt;2.6.8-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566184" version="1" comment="python-xml is &lt;2.6.8-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566104" version="1" comment="libgcrypt11 is &lt;1.5.0-0.15.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566105" version="1" comment="libgcrypt11-32bit is &lt;1.5.0-0.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567029" version="1" comment="orca is &lt;2.28.3-0.5.10 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567030" version="1" comment="orca-lang is &lt;2.28.3-0.5.10 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566059" version="1" comment="lcms is &lt;1.17-77.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566060" version="1" comment="liblcms1 is &lt;1.17-77.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566061" version="1" comment="liblcms1-32bit is &lt;1.17-77.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566133" version="1" comment="libvirt is &lt;0.9.6-0.29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566134" version="1" comment="libvirt-client is &lt;0.9.6-0.29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566135" version="1" comment="libvirt-client-32bit is &lt;0.9.6-0.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566136" version="1" comment="libvirt-doc is &lt;0.9.6-0.29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566137" version="1" comment="libvirt-python is &lt;0.9.6-0.29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591817" version="1" comment="libvirt is &lt;1.0.5.6-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591818" version="1" comment="libvirt-client is &lt;1.0.5.6-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591819" version="1" comment="libvirt-client-32bit is &lt;1.0.5.6-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591820" version="1" comment="libvirt-doc is &lt;1.0.5.6-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591821" version="1" comment="libvirt-python is &lt;1.0.5.6-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334086" version="1" comment="ImageMagick is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591847" version="1" comment="libmysql55client18 is &lt;5.5.37-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591848" version="1" comment="libmysql55client18-32bit is &lt;5.5.37-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591849" version="1" comment="libmysql55client_r18 is &lt;5.5.37-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591850" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.37-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591851" version="1" comment="libmysqlclient15 is &lt;5.0.96-0.6.11 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591852" version="1" comment="libmysqlclient15-32bit is &lt;5.0.96-0.6.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591853" version="1" comment="libmysqlclient_r15 is &lt;5.0.96-0.6.11 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591854" version="1" comment="libmysqlclient_r15-32bit is &lt;5.0.96-0.6.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591855" version="1" comment="mysql is &lt;5.5.37-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591856" version="1" comment="mysql-client is &lt;5.5.37-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567234" version="1" comment="xen is &lt;4.2.4_04-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567235" version="1" comment="xen-doc-html is &lt;4.2.4_04-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567236" version="1" comment="xen-doc-pdf is &lt;4.2.4_04-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567237" version="1" comment="xen-kmp-default is &lt;4.2.4_04_3.0.101_0.40-0.9.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567238" version="1" comment="xen-kmp-pae is &lt;4.2.4_04_3.0.101_0.40-0.9.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567239" version="1" comment="xen-libs is &lt;4.2.4_04-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567240" version="1" comment="xen-libs-32bit is &lt;4.2.4_04-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567241" version="1" comment="xen-tools is &lt;4.2.4_04-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567242" version="1" comment="xen-tools-domU is &lt;4.2.4_04-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591868" version="1" comment="kernel-default is &lt;3.0.101-0.7.15.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591869" version="1" comment="kernel-default-base is &lt;3.0.101-0.7.15.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591870" version="1" comment="kernel-default-devel is &lt;3.0.101-0.7.15.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591871" version="1" comment="kernel-default-extra is &lt;3.0.101-0.7.15.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591872" version="1" comment="kernel-source is &lt;3.0.101-0.7.15.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591873" version="1" comment="kernel-syms is &lt;3.0.101-0.7.15.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591874" version="1" comment="kernel-trace is &lt;3.0.101-0.7.15.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591875" version="1" comment="kernel-trace-base is &lt;3.0.101-0.7.15.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591876" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.7.15.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591877" version="1" comment="kernel-trace-extra is &lt;3.0.101-0.7.15.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591878" version="1" comment="kernel-xen is &lt;3.0.101-0.7.15.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591879" version="1" comment="kernel-xen-base is &lt;3.0.101-0.7.15.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591880" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.7.15.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591881" version="1" comment="kernel-xen-extra is &lt;3.0.101-0.7.15.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591882" version="1" comment="xen-kmp-default is &lt;4.1.6_04_3.0.101_0.7.15-0.5.12 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591883" version="1" comment="xen-kmp-trace is &lt;4.1.6_04_3.0.101_0.7.15-0.5.12 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566011" version="1" comment="gpg2 is &lt;2.0.9-25.33.37.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566012" version="1" comment="gpg2-lang is &lt;2.0.9-25.33.37.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334233" version="1" comment="compat-openssl097g is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333942" version="1" comment="openssl is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591898" version="1" comment="glibc is &lt;2.11.3-17.62.1 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591899" version="1" comment="glibc-32bit is &lt;2.11.3-17.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591900" version="1" comment="glibc-devel is &lt;2.11.3-17.62.1 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591901" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591902" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.62.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591903" version="1" comment="glibc-locale is &lt;2.11.3-17.62.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591904" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591905" version="1" comment="nscd is &lt;2.11.3-17.62.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591928" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.70.74.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591929" version="1" comment="xorg-x11-server is &lt;7.4-27.70.74.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591930" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.70.74.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591931" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.83.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591932" version="1" comment="xorg-x11-server is &lt;7.4-27.83.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591933" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.83.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567007" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.30.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567008" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567009" version="1" comment="openldap2-client is &lt;2.4.26-0.30.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591945" version="1" comment="kernel-default is &lt;3.0.101-0.21.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591946" version="1" comment="kernel-default-base is &lt;3.0.101-0.21.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591947" version="1" comment="kernel-default-devel is &lt;3.0.101-0.21.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591948" version="1" comment="kernel-default-extra is &lt;3.0.101-0.21.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591949" version="1" comment="kernel-source is &lt;3.0.101-0.21.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591950" version="1" comment="kernel-syms is &lt;3.0.101-0.21.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591951" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.21.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591952" version="1" comment="kernel-xen is &lt;3.0.101-0.21.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591953" version="1" comment="kernel-xen-base is &lt;3.0.101-0.21.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591954" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.21.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591955" version="1" comment="kernel-xen-extra is &lt;3.0.101-0.21.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009591956" version="1" comment="xen-kmp-default is &lt;4.2.4_02_3.0.101_0.21-0.7.12 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566259" version="1" comment="xen is &lt;4.1.6_04-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566260" version="1" comment="xen-doc-html is &lt;4.1.6_04-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566261" version="1" comment="xen-doc-pdf is &lt;4.1.6_04-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566262" version="1" comment="xen-kmp-default is &lt;4.1.6_04_3.0.101_0.5-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566263" version="1" comment="xen-kmp-pae is &lt;4.1.6_04_3.0.101_0.5-0.5.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566264" version="1" comment="xen-kmp-trace is &lt;4.1.6_04_3.0.101_0.5-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566265" version="1" comment="xen-libs is &lt;4.1.6_04-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566266" version="1" comment="xen-libs-32bit is &lt;4.1.6_04-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566267" version="1" comment="xen-tools is &lt;4.1.6_04-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566268" version="1" comment="xen-tools-domU is &lt;4.1.6_04-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592009" version="1" comment="libldb1 is &lt;3.6.3-0.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592010" version="1" comment="libldb1-32bit is &lt;3.6.3-0.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592011" version="1" comment="libsmbclient0 is &lt;3.6.3-0.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592012" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592013" version="1" comment="libtalloc2 is &lt;3.6.3-0.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592014" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592015" version="1" comment="libtdb1 is &lt;3.6.3-0.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592016" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592017" version="1" comment="libtevent0 is &lt;3.6.3-0.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592018" version="1" comment="libtevent0-32bit is &lt;3.6.3-0.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592019" version="1" comment="libwbclient0 is &lt;3.6.3-0.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592020" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592021" version="1" comment="samba is &lt;3.6.3-0.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592022" version="1" comment="samba-32bit is &lt;3.6.3-0.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592023" version="1" comment="samba-client is &lt;3.6.3-0.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592024" version="1" comment="samba-client-32bit is &lt;3.6.3-0.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592025" version="1" comment="samba-doc is &lt;3.6.3-0.50.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592026" version="1" comment="samba-krb-printing is &lt;3.6.3-0.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592027" version="1" comment="samba-winbind is &lt;3.6.3-0.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592028" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567467" version="1" comment="xen is &lt;4.4.4_02-32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567468" version="1" comment="xen-doc-html is &lt;4.4.4_02-32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567469" version="1" comment="xen-kmp-default is &lt;4.4.4_02_3.0.101_68-32.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567470" version="1" comment="xen-kmp-pae is &lt;4.4.4_02_3.0.101_68-32.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567471" version="1" comment="xen-libs is &lt;4.4.4_02-32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567472" version="1" comment="xen-libs-32bit is &lt;4.4.4_02-32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567473" version="1" comment="xen-tools is &lt;4.4.4_02-32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567474" version="1" comment="xen-tools-domU is &lt;4.4.4_02-32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592089" version="1" comment="curl is &lt;7.19.7-1.20.29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592090" version="1" comment="libcurl4 is &lt;7.19.7-1.20.29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592091" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.20.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592092" version="1" comment="curl is &lt;7.19.7-1.30.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592093" version="1" comment="libcurl4 is &lt;7.19.7-1.30.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592094" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566789" version="1" comment="libQtWebKit4 is &lt;4.6.3-5.29.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566790" version="1" comment="libQtWebKit4-32bit is &lt;4.6.3-5.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566791" version="1" comment="libqt4 is &lt;4.6.3-5.29.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566792" version="1" comment="libqt4-32bit is &lt;4.6.3-5.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566793" version="1" comment="libqt4-qt3support is &lt;4.6.3-5.29.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566794" version="1" comment="libqt4-qt3support-32bit is &lt;4.6.3-5.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566795" version="1" comment="libqt4-sql is &lt;4.6.3-5.29.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566796" version="1" comment="libqt4-sql-32bit is &lt;4.6.3-5.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566797" version="1" comment="libqt4-sql-mysql is &lt;4.6.3-5.29.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566798" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.6.3-5.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566799" version="1" comment="libqt4-sql-postgresql is &lt;4.6.3-5.29.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566800" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.6.3-5.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566801" version="1" comment="libqt4-sql-sqlite is &lt;4.6.3-5.29.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566802" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.6.3-5.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566803" version="1" comment="libqt4-sql-unixODBC is &lt;4.6.3-5.29.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566804" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.6.3-5.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566805" version="1" comment="libqt4-x11 is &lt;4.6.3-5.29.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566806" version="1" comment="libqt4-x11-32bit is &lt;4.6.3-5.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566375" version="1" comment="compat-wireless-kmp-default is &lt;3.13_3.0.101_0.31-0.9.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566376" version="1" comment="compat-wireless-kmp-pae is &lt;3.13_3.0.101_0.31-0.9.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566377" version="1" comment="compat-wireless-kmp-xen is &lt;3.13_3.0.101_0.31-0.9.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566176" version="1" comment="puppet is &lt;2.6.18-0.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592111" version="1" comment="puppet is &lt;2.6.18-0.14.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592114" version="1" comment="bind-libs is &lt;9.9.3P2-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592115" version="1" comment="bind-libs-32bit is &lt;9.9.3P2-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592116" version="1" comment="bind-utils is &lt;9.9.3P2-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592124" version="1" comment="wireshark is &lt;1.8.9-0.2.5 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567060" version="1" comment="puppet is &lt;2.6.18-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566186" version="1" comment="strongswan is &lt;4.4.0-6.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566187" version="1" comment="strongswan-doc is &lt;4.4.0-6.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592127" version="1" comment="ntp is &lt;4.2.4p8-1.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592128" version="1" comment="ntp-doc is &lt;4.2.4p8-1.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592131" version="1" comment="flash-player is &lt;11.2.202.327-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592132" version="1" comment="flash-player-gnome is &lt;11.2.202.327-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592133" version="1" comment="flash-player-kde4 is &lt;11.2.202.327-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592134" version="1" comment="flash-player is &lt;11.2.202.332-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592135" version="1" comment="flash-player-gnome is &lt;11.2.202.332-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592136" version="1" comment="flash-player-kde4 is &lt;11.2.202.332-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566500" version="1" comment="MozillaFirefox is &lt;24.2.0esr-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566501" version="1" comment="MozillaFirefox-branding-SLED is &lt;24-0.7.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566502" version="1" comment="MozillaFirefox-translations is &lt;24.2.0esr-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566503" version="1" comment="libfreebl3 is &lt;3.15.3.1-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566504" version="1" comment="libfreebl3-32bit is &lt;3.15.3.1-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566505" version="1" comment="libsoftokn3 is &lt;3.15.3.1-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566506" version="1" comment="libsoftokn3-32bit is &lt;3.15.3.1-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566507" version="1" comment="mozilla-nss is &lt;3.15.3.1-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566508" version="1" comment="mozilla-nss-32bit is &lt;3.15.3.1-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566509" version="1" comment="mozilla-nss-tools is &lt;3.15.3.1-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566191" version="1" comment="vino is &lt;2.28.1-2.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566192" version="1" comment="vino-lang is &lt;2.28.1-2.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592137" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.6-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592138" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.6-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592139" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.6-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592154" version="1" comment="wireshark is &lt;1.8.11-0.2.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592158" version="1" comment="python-pywbem is &lt;0.7-6.20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566269" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.70.76.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566270" version="1" comment="xorg-x11-server is &lt;7.4-27.70.76.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566271" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.70.76.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592161" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.85.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592162" version="1" comment="xorg-x11-server is &lt;7.4-27.85.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592163" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.85.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566117" version="1" comment="libpixman-1-0 is &lt;0.16.0-1.4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566118" version="1" comment="libpixman-1-0-32bit is &lt;0.16.0-1.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566119" version="1" comment="libpixman-1-0-devel is &lt;0.16.0-1.4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566847" version="1" comment="libpixman-1-0 is &lt;0.24.4-0.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566848" version="1" comment="libpixman-1-0-32bit is &lt;0.24.4-0.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567040" version="1" comment="popt is &lt;1.7-37.60.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567041" version="1" comment="popt-32bit is &lt;1.7-37.60.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567042" version="1" comment="rpm is &lt;4.4.2.3-37.60.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567043" version="1" comment="rpm-32bit is &lt;4.4.2.3-37.60.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592175" version="1" comment="libvirt is &lt;1.0.5.8-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592176" version="1" comment="libvirt-client is &lt;1.0.5.8-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592177" version="1" comment="libvirt-client-32bit is &lt;1.0.5.8-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592178" version="1" comment="libvirt-doc is &lt;1.0.5.8-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592179" version="1" comment="libvirt-python is &lt;1.0.5.8-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563694" version="1" comment="lxc is &lt;0.8.0-0.21.6 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566926" version="1" comment="libvirt is &lt;1.0.5.9-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566927" version="1" comment="libvirt-client is &lt;1.0.5.9-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566928" version="1" comment="libvirt-client-32bit is &lt;1.0.5.9-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566929" version="1" comment="libvirt-doc is &lt;1.0.5.9-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566930" version="1" comment="libvirt-python is &lt;1.0.5.9-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592201" version="1" comment="libvirt is &lt;1.0.5.9-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592202" version="1" comment="libvirt-client is &lt;1.0.5.9-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592203" version="1" comment="libvirt-client-32bit is &lt;1.0.5.9-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592204" version="1" comment="libvirt-doc is &lt;1.0.5.9-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592205" version="1" comment="libvirt-python is &lt;1.0.5.9-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566272" version="1" comment="xorg-x11-devel is &lt;7.4-8.26.40.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566273" version="1" comment="xorg-x11-libs is &lt;7.4-8.26.40.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566274" version="1" comment="xorg-x11-libs-32bit is &lt;7.4-8.26.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566820" version="1" comment="libgadu is &lt;1.8.2-1.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566636" version="1" comment="icedtea-web is &lt;1.4.2-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592218" version="1" comment="clamav is &lt;0.98.5-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592272" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.6-0.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592273" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.6-0.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592274" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.6-0.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563168" version="1" comment="wireshark is &lt;1.8.12-0.2.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592282" version="1" comment="wireshark is &lt;1.8.12-0.4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566658" version="1" comment="kde4-l10n-ar is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566659" version="1" comment="kde4-l10n-cs is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566660" version="1" comment="kde4-l10n-da is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566661" version="1" comment="kde4-l10n-da-data is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566662" version="1" comment="kde4-l10n-da-doc is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566663" version="1" comment="kde4-l10n-de is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563389" version="1" comment="kde4-l10n-de-data is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563390" version="1" comment="kde4-l10n-de-doc is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566664" version="1" comment="kde4-l10n-en_GB is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566665" version="1" comment="kde4-l10n-es is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566666" version="1" comment="kde4-l10n-es-data is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566667" version="1" comment="kde4-l10n-es-doc is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566668" version="1" comment="kde4-l10n-fr is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566669" version="1" comment="kde4-l10n-fr-data is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566670" version="1" comment="kde4-l10n-fr-doc is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566671" version="1" comment="kde4-l10n-hu is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566672" version="1" comment="kde4-l10n-it is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566673" version="1" comment="kde4-l10n-it-data is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566674" version="1" comment="kde4-l10n-it-doc is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566675" version="1" comment="kde4-l10n-ja is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566676" version="1" comment="kde4-l10n-ko is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566677" version="1" comment="kde4-l10n-nb is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566678" version="1" comment="kde4-l10n-nl is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566679" version="1" comment="kde4-l10n-nl-data is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566680" version="1" comment="kde4-l10n-nl-doc is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566681" version="1" comment="kde4-l10n-pl is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566682" version="1" comment="kde4-l10n-pl-data is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566683" version="1" comment="kde4-l10n-pl-doc is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566684" version="1" comment="kde4-l10n-pt is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566685" version="1" comment="kde4-l10n-pt_BR is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566686" version="1" comment="kde4-l10n-pt_BR-data is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566687" version="1" comment="kde4-l10n-pt_BR-doc is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566688" version="1" comment="kde4-l10n-ru is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566689" version="1" comment="kde4-l10n-ru-data is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566690" version="1" comment="kde4-l10n-ru-doc is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566691" version="1" comment="kde4-l10n-sv is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566692" version="1" comment="kde4-l10n-sv-data is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566693" version="1" comment="kde4-l10n-sv-doc is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566694" version="1" comment="kde4-l10n-zh_CN is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566695" version="1" comment="kde4-l10n-zh_TW is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566696" version="1" comment="kdebase4-runtime is &lt;4.3.5-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566697" version="1" comment="kdebase4-runtime-xine is &lt;4.3.5-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592285" version="1" comment="kernel-default is &lt;3.0.101-0.47.50.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592286" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.50.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592287" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.50.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592288" version="1" comment="kernel-default-extra is &lt;3.0.101-0.47.50.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592289" version="1" comment="kernel-pae is &lt;3.0.101-0.47.50.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592290" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.50.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592291" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.50.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592292" version="1" comment="kernel-pae-extra is &lt;3.0.101-0.47.50.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592293" version="1" comment="kernel-source is &lt;3.0.101-0.47.50.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592294" version="1" comment="kernel-syms is &lt;3.0.101-0.47.50.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592295" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.50.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592296" version="1" comment="kernel-xen is &lt;3.0.101-0.47.50.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592297" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.50.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592298" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.50.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592299" version="1" comment="kernel-xen-extra is &lt;3.0.101-0.47.50.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592300" version="1" comment="xen-kmp-default is &lt;4.2.5_04_3.0.101_0.47.50-0.7.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592301" version="1" comment="xen-kmp-pae is &lt;4.2.5_04_3.0.101_0.47.50-0.7.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566849" version="1" comment="libpng12-0 is &lt;1.2.31-5.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566850" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334114" version="1" comment="perl is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592352" version="1" comment="glibc is &lt;2.11.3-17.82.11 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592353" version="1" comment="glibc-32bit is &lt;2.11.3-17.82.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592354" version="1" comment="glibc-devel is &lt;2.11.3-17.82.11 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592355" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.82.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592356" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.82.11 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592357" version="1" comment="glibc-locale is &lt;2.11.3-17.82.11 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592358" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.82.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592359" version="1" comment="nscd is &lt;2.11.3-17.82.11 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567274" version="1" comment="xorg-x11-libX11 is &lt;7.4-5.11.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567275" version="1" comment="xorg-x11-libX11-32bit is &lt;7.4-5.11.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334055" version="1" comment="xorg-x11 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567099" version="1" comment="python-setuptools is &lt;0.6c11-6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333981" version="1" comment="sqlite2 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333983" version="1" comment="sqlite3 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567353" version="1" comment="kernel-default is &lt;3.0.101-71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567354" version="1" comment="kernel-default-base is &lt;3.0.101-71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567355" version="1" comment="kernel-default-devel is &lt;3.0.101-71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567356" version="1" comment="kernel-default-extra is &lt;3.0.101-71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567357" version="1" comment="kernel-pae is &lt;3.0.101-71.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567358" version="1" comment="kernel-pae-base is &lt;3.0.101-71.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567359" version="1" comment="kernel-pae-devel is &lt;3.0.101-71.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567360" version="1" comment="kernel-pae-extra is &lt;3.0.101-71.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567361" version="1" comment="kernel-source is &lt;3.0.101-71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567362" version="1" comment="kernel-syms is &lt;3.0.101-71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567363" version="1" comment="kernel-trace-devel is &lt;3.0.101-71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567364" version="1" comment="kernel-xen is &lt;3.0.101-71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567365" version="1" comment="kernel-xen-base is &lt;3.0.101-71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567366" version="1" comment="kernel-xen-devel is &lt;3.0.101-71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567367" version="1" comment="kernel-xen-extra is &lt;3.0.101-71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565908" version="1" comment="curl is &lt;7.19.7-1.20.31.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565909" version="1" comment="libcurl4 is &lt;7.19.7-1.20.31.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565910" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.20.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592401" version="1" comment="curl is &lt;7.19.7-1.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592402" version="1" comment="libcurl4 is &lt;7.19.7-1.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592403" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566920" version="1" comment="libssh2 is &lt;0.2-5.20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566807" version="1" comment="libecpg6 is &lt;9.1.12-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566808" version="1" comment="libpq5 is &lt;9.1.12-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566809" version="1" comment="libpq5-32bit is &lt;9.1.12-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566810" version="1" comment="postgresql91 is &lt;9.1.12-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566811" version="1" comment="postgresql91-docs is &lt;9.1.12-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592420" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.54.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592421" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592422" version="1" comment="openssl is &lt;0.9.8j-0.54.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567150" version="1" comment="sudo is &lt;1.7.6p2-0.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567162" version="1" comment="xalan-j2 is &lt;2.7.0-217.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566384" version="1" comment="curl is &lt;7.19.7-1.38.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566385" version="1" comment="libcurl4 is &lt;7.19.7-1.38.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566386" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592438" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.28.5 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592439" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.28.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592440" version="1" comment="openldap2-client is &lt;2.4.26-0.28.5 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592469" version="1" comment="kvm is &lt;1.4.2-0.15.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592471" version="1" comment="libldb1 is &lt;3.6.3-0.52.5 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592472" version="1" comment="libldb1-32bit is &lt;3.6.3-0.52.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592473" version="1" comment="libsmbclient0 is &lt;3.6.3-0.52.5 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592474" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.52.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592475" version="1" comment="libtalloc2 is &lt;3.6.3-0.52.5 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592476" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.52.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592477" version="1" comment="libtdb1 is &lt;3.6.3-0.52.5 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592478" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.52.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592479" version="1" comment="libtevent0 is &lt;3.6.3-0.52.5 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592480" version="1" comment="libtevent0-32bit is &lt;3.6.3-0.52.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592481" version="1" comment="libwbclient0 is &lt;3.6.3-0.52.5 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592482" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.52.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592483" version="1" comment="samba is &lt;3.6.3-0.52.5 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592484" version="1" comment="samba-32bit is &lt;3.6.3-0.52.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592485" version="1" comment="samba-client is &lt;3.6.3-0.52.5 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592486" version="1" comment="samba-client-32bit is &lt;3.6.3-0.52.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592487" version="1" comment="samba-doc is &lt;3.6.3-0.52.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592488" version="1" comment="samba-krb-printing is &lt;3.6.3-0.52.5 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592489" version="1" comment="samba-winbind is &lt;3.6.3-0.52.5 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592490" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.52.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592521" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.50.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334121" version="1" comment="libqt4 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592539" version="1" comment="kernel-default is &lt;3.0.101-0.29.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592540" version="1" comment="kernel-default-base is &lt;3.0.101-0.29.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592541" version="1" comment="kernel-default-devel is &lt;3.0.101-0.29.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592542" version="1" comment="kernel-default-extra is &lt;3.0.101-0.29.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592543" version="1" comment="kernel-source is &lt;3.0.101-0.29.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592544" version="1" comment="kernel-syms is &lt;3.0.101-0.29.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592545" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.29.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592546" version="1" comment="kernel-xen is &lt;3.0.101-0.29.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592547" version="1" comment="kernel-xen-base is &lt;3.0.101-0.29.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592548" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.29.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592549" version="1" comment="kernel-xen-extra is &lt;3.0.101-0.29.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592550" version="1" comment="xen-kmp-default is &lt;4.2.4_02_3.0.101_0.29-0.7.24 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567272" version="1" comment="xorg-x11-libs is &lt;7.4-8.26.42.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567273" version="1" comment="xorg-x11-libs-32bit is &lt;7.4-8.26.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592639" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.58.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592640" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592641" version="1" comment="openssl is &lt;0.9.8j-0.58.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566778" version="1" comment="kvm is &lt;1.4.2-0.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567189" version="1" comment="xen is &lt;4.2.5_14-18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567190" version="1" comment="xen-doc-html is &lt;4.2.5_14-18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567191" version="1" comment="xen-doc-pdf is &lt;4.2.5_14-18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567192" version="1" comment="xen-kmp-default is &lt;4.2.5_14_3.0.101_0.47.67-18.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567193" version="1" comment="xen-kmp-pae is &lt;4.2.5_14_3.0.101_0.47.67-18.2 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567194" version="1" comment="xen-libs is &lt;4.2.5_14-18.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567195" version="1" comment="xen-libs-32bit is &lt;4.2.5_14-18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567196" version="1" comment="xen-tools is &lt;4.2.5_14-18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567197" version="1" comment="xen-tools-domU is &lt;4.2.5_14-18.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333946" version="1" comment="sssd is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566349" version="1" comment="a2ps is &lt;4.13-1326.37.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566971" version="1" comment="mutt is &lt;1.5.17-42.37.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592749" version="1" comment="glibc is &lt;2.11.3-17.68.1 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592750" version="1" comment="glibc-32bit is &lt;2.11.3-17.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592751" version="1" comment="glibc-devel is &lt;2.11.3-17.68.1 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592752" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592753" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.68.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592754" version="1" comment="glibc-locale is &lt;2.11.3-17.68.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592755" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592756" version="1" comment="nscd is &lt;2.11.3-17.68.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592776" version="1" comment="flash-player is &lt;11.2.202.335-0.4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592777" version="1" comment="flash-player-gnome is &lt;11.2.202.335-0.4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592778" version="1" comment="flash-player-kde4 is &lt;11.2.202.335-0.4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565986" version="1" comment="flash-player is &lt;11.2.202.336-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592779" version="1" comment="flash-player is &lt;11.2.202.341-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592780" version="1" comment="flash-player-gnome is &lt;11.2.202.341-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592781" version="1" comment="flash-player-kde4 is &lt;11.2.202.341-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592782" version="1" comment="flash-player is &lt;11.2.202.346-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592783" version="1" comment="flash-player-gnome is &lt;11.2.202.346-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592784" version="1" comment="flash-player-kde4 is &lt;11.2.202.346-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592785" version="1" comment="flash-player is &lt;11.2.202.350-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592786" version="1" comment="flash-player-gnome is &lt;11.2.202.350-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592787" version="1" comment="flash-player-kde4 is &lt;11.2.202.350-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592788" version="1" comment="flash-player is &lt;11.2.202.359-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592789" version="1" comment="flash-player-gnome is &lt;11.2.202.359-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592790" version="1" comment="flash-player-kde4 is &lt;11.2.202.359-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592791" version="1" comment="flash-player is &lt;11.2.202.356-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592792" version="1" comment="flash-player-gnome is &lt;11.2.202.356-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592793" version="1" comment="flash-player-kde4 is &lt;11.2.202.356-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592794" version="1" comment="flash-player is &lt;11.2.202.378-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592795" version="1" comment="flash-player-gnome is &lt;11.2.202.378-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592796" version="1" comment="flash-player-kde4 is &lt;11.2.202.378-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592797" version="1" comment="flash-player is &lt;11.2.202.394-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592798" version="1" comment="flash-player-gnome is &lt;11.2.202.394-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592799" version="1" comment="flash-player-kde4 is &lt;11.2.202.394-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592800" version="1" comment="flash-player is &lt;11.2.202.400-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592801" version="1" comment="flash-player-gnome is &lt;11.2.202.400-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592802" version="1" comment="flash-player-kde4 is &lt;11.2.202.400-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592803" version="1" comment="flash-player is &lt;11.2.202.406-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592804" version="1" comment="flash-player-gnome is &lt;11.2.202.406-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592805" version="1" comment="flash-player-kde4 is &lt;11.2.202.406-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592806" version="1" comment="flash-player is &lt;11.2.202.411-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592807" version="1" comment="flash-player-gnome is &lt;11.2.202.411-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592808" version="1" comment="flash-player-kde4 is &lt;11.2.202.411-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566535" version="1" comment="flash-player is &lt;11.2.202.418-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566536" version="1" comment="flash-player-gnome is &lt;11.2.202.418-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566537" version="1" comment="flash-player-kde4 is &lt;11.2.202.418-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566538" version="1" comment="flash-player is &lt;11.2.202.481-0.8.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566539" version="1" comment="flash-player-gnome is &lt;11.2.202.481-0.8.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566540" version="1" comment="flash-player-kde4 is &lt;11.2.202.481-0.8.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592809" version="1" comment="flash-player is &lt;11.2.202.425-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592810" version="1" comment="flash-player-gnome is &lt;11.2.202.425-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592811" version="1" comment="flash-player-kde4 is &lt;11.2.202.425-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565855" version="1" comment="bind-libs is &lt;9.9.4P2-0.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565856" version="1" comment="bind-libs-32bit is &lt;9.9.4P2-0.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565857" version="1" comment="bind-utils is &lt;9.9.4P2-0.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566994" version="1" comment="novell-qtgui is &lt;3.0.0-0.20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566995" version="1" comment="novell-qtgui-cli is &lt;3.0.0-0.20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566996" version="1" comment="novell-ui-base is &lt;3.0.0-0.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566436" version="1" comment="MozillaFirefox is &lt;24.3.0esr-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566437" version="1" comment="MozillaFirefox-branding-SLED is &lt;24-0.7.14 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566438" version="1" comment="MozillaFirefox-translations is &lt;24.3.0esr-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566439" version="1" comment="libfreebl3 is &lt;3.15.4-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566440" version="1" comment="libfreebl3-32bit is &lt;3.15.4-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566441" version="1" comment="libsoftokn3 is &lt;3.15.4-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566442" version="1" comment="libsoftokn3-32bit is &lt;3.15.4-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566443" version="1" comment="mozilla-nss is &lt;3.15.4-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566444" version="1" comment="mozilla-nss-32bit is &lt;3.15.4-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566445" version="1" comment="mozilla-nss-tools is &lt;3.15.4-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566446" version="1" comment="MozillaFirefox is &lt;24.4.0esr-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566447" version="1" comment="MozillaFirefox-branding-SLED is &lt;24-0.7.23 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566448" version="1" comment="MozillaFirefox-translations is &lt;24.4.0esr-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566331" version="1" comment="mozilla-nspr is &lt;4.10.4-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566332" version="1" comment="mozilla-nspr-32bit is &lt;4.10.4-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566324" version="1" comment="MozillaFirefox is &lt;24.5.0esr-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566325" version="1" comment="MozillaFirefox-branding-SLED is &lt;24-0.7.36 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566326" version="1" comment="MozillaFirefox-translations is &lt;24.5.0esr-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566327" version="1" comment="libfreebl3 is &lt;3.16-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566328" version="1" comment="libfreebl3-32bit is &lt;3.16-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566329" version="1" comment="libsoftokn3 is &lt;3.16-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566330" version="1" comment="libsoftokn3-32bit is &lt;3.16-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566333" version="1" comment="mozilla-nss is &lt;3.16-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566334" version="1" comment="mozilla-nss-32bit is &lt;3.16-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566335" version="1" comment="mozilla-nss-tools is &lt;3.16-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566301" version="1" comment="MozillaFirefox is &lt;24.6.0esr-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566302" version="1" comment="MozillaFirefox-branding-SLED is &lt;24-0.7.48 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566303" version="1" comment="MozillaFirefox-translations is &lt;24.6.0esr-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566304" version="1" comment="libfreebl3 is &lt;3.16.1-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566305" version="1" comment="libfreebl3-32bit is &lt;3.16.1-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566306" version="1" comment="libsoftokn3 is &lt;3.16.1-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566307" version="1" comment="libsoftokn3-32bit is &lt;3.16.1-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566308" version="1" comment="mozilla-nspr is &lt;4.10.6-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566309" version="1" comment="mozilla-nspr-32bit is &lt;4.10.6-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566310" version="1" comment="mozilla-nss is &lt;3.16.1-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566311" version="1" comment="mozilla-nss-32bit is &lt;3.16.1-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566312" version="1" comment="mozilla-nss-tools is &lt;3.16.1-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566449" version="1" comment="MozillaFirefox is &lt;24.7.0esr-0.8.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566450" version="1" comment="MozillaFirefox-translations is &lt;24.7.0esr-0.8.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566451" version="1" comment="libfreebl3 is &lt;3.16.2-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566452" version="1" comment="libfreebl3-32bit is &lt;3.16.2-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566453" version="1" comment="libsoftokn3 is &lt;3.16.2-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566454" version="1" comment="libsoftokn3-32bit is &lt;3.16.2-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566455" version="1" comment="mozilla-nss is &lt;3.16.2-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566456" version="1" comment="mozilla-nss-32bit is &lt;3.16.2-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566457" version="1" comment="mozilla-nss-tools is &lt;3.16.2-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566458" version="1" comment="MozillaFirefox is &lt;24.8.0esr-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566459" version="1" comment="MozillaFirefox-translations is &lt;24.8.0esr-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566460" version="1" comment="libfreebl3 is &lt;3.16.4-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566461" version="1" comment="libfreebl3-32bit is &lt;3.16.4-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566462" version="1" comment="libsoftokn3 is &lt;3.16.4-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566463" version="1" comment="libsoftokn3-32bit is &lt;3.16.4-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566464" version="1" comment="mozilla-nspr is &lt;4.10.7-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566465" version="1" comment="mozilla-nspr-32bit is &lt;4.10.7-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566466" version="1" comment="mozilla-nss is &lt;3.16.4-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566467" version="1" comment="mozilla-nss-32bit is &lt;3.16.4-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566468" version="1" comment="mozilla-nss-tools is &lt;3.16.4-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566813" version="1" comment="libfreebl3 is &lt;3.16.5-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566814" version="1" comment="libfreebl3-32bit is &lt;3.16.5-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566815" version="1" comment="libsoftokn3 is &lt;3.16.5-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566816" version="1" comment="libsoftokn3-32bit is &lt;3.16.5-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566817" version="1" comment="mozilla-nss is &lt;3.16.5-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566818" version="1" comment="mozilla-nss-32bit is &lt;3.16.5-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566819" version="1" comment="mozilla-nss-tools is &lt;3.16.5-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566471" version="1" comment="MozillaFirefox is &lt;31.4.0esr-0.8.7 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566472" version="1" comment="MozillaFirefox-translations is &lt;31.4.0esr-0.8.7 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566473" version="1" comment="libfreebl3 is &lt;3.17.3-0.8.11 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566474" version="1" comment="libfreebl3-32bit is &lt;3.17.3-0.8.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566475" version="1" comment="libsoftokn3 is &lt;3.17.3-0.8.11 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566476" version="1" comment="libsoftokn3-32bit is &lt;3.17.3-0.8.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566477" version="1" comment="mozilla-nss is &lt;3.17.3-0.8.11 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566478" version="1" comment="mozilla-nss-32bit is &lt;3.17.3-0.8.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566479" version="1" comment="mozilla-nss-tools is &lt;3.17.3-0.8.11 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566510" version="1" comment="MozillaFirefox is &lt;31.2.0esr-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566511" version="1" comment="MozillaFirefox-branding-SLED is &lt;31.0-0.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566512" version="1" comment="MozillaFirefox-translations is &lt;31.2.0esr-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566513" version="1" comment="libfreebl3 is &lt;3.17.2-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566514" version="1" comment="libfreebl3-32bit is &lt;3.17.2-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566515" version="1" comment="libsoftokn3 is &lt;3.17.2-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566516" version="1" comment="libsoftokn3-32bit is &lt;3.17.2-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566517" version="1" comment="mozilla-nspr is &lt;4.10.7-0.3.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566518" version="1" comment="mozilla-nspr-32bit is &lt;4.10.7-0.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566519" version="1" comment="mozilla-nss is &lt;3.17.2-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566520" version="1" comment="mozilla-nss-32bit is &lt;3.17.2-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566521" version="1" comment="mozilla-nss-tools is &lt;3.17.2-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566469" version="1" comment="MozillaFirefox is &lt;31.3.0esr-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566470" version="1" comment="MozillaFirefox-translations is &lt;31.3.0esr-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566725" version="1" comment="xen-kmp-default is &lt;4.2.4_04_3.0.101_0.40-0.7.3 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567081" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-0.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567082" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-0.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567083" version="1" comment="python is &lt;2.6.9-0.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567084" version="1" comment="python-base is &lt;2.6.9-0.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567085" version="1" comment="python-base-32bit is &lt;2.6.9-0.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567086" version="1" comment="python-curses is &lt;2.6.9-0.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567087" version="1" comment="python-devel is &lt;2.6.9-0.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563804" version="1" comment="python-tk is &lt;2.6.9-0.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567088" version="1" comment="python-xml is &lt;2.6.9-0.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592829" version="1" comment="ImageMagick is &lt;6.4.3.6-7.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592830" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592831" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592832" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592833" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592845" version="1" comment="file is &lt;4.24-43.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592846" version="1" comment="file-32bit is &lt;4.24-43.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592851" version="1" comment="wireshark is &lt;1.8.13-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592854" version="1" comment="libsnmp15 is &lt;5.4.2.1-8.12.20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592855" version="1" comment="libsnmp15-32bit is &lt;5.4.2.1-8.12.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592856" version="1" comment="net-snmp is &lt;5.4.2.1-8.12.20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592857" version="1" comment="perl-SNMP is &lt;5.4.2.1-8.12.20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592858" version="1" comment="snmp-mibs is &lt;5.4.2.1-8.12.20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592865" version="1" comment="strongswan is &lt;4.4.0-6.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592866" version="1" comment="strongswan-doc is &lt;4.4.0-6.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592869" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.65-0.7.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592870" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.65-0.7.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592871" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.65-0.7.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566834" version="1" comment="libmysql55client18 is &lt;5.5.39-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566835" version="1" comment="libmysql55client18-32bit is &lt;5.5.39-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566836" version="1" comment="libmysql55client_r18 is &lt;5.5.39-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566837" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.39-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566838" version="1" comment="libmysqlclient15 is &lt;5.0.96-0.6.13 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566839" version="1" comment="libmysqlclient15-32bit is &lt;5.0.96-0.6.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566840" version="1" comment="libmysqlclient_r15 is &lt;5.0.96-0.6.13 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566841" version="1" comment="libmysqlclient_r15-32bit is &lt;5.0.96-0.6.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566842" version="1" comment="mysql is &lt;5.5.39-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566843" version="1" comment="mysql-client is &lt;5.5.39-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566708" version="1" comment="kdirstat is &lt;2.4.4-255.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567015" version="1" comment="openssh is &lt;6.2p2-0.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567016" version="1" comment="openssh-askpass is &lt;6.2p2-0.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567017" version="1" comment="openssh-askpass-gnome is &lt;6.2p2-0.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567031" version="1" comment="pam is &lt;1.1.5-0.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567032" version="1" comment="pam-32bit is &lt;1.1.5-0.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567033" version="1" comment="pam-doc is &lt;1.1.5-0.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567146" version="1" comment="strongswan is &lt;4.4.0-6.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567147" version="1" comment="strongswan-doc is &lt;4.4.0-6.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334236" version="1" comment="DirectFB is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567103" version="1" comment="rxvt-unicode is &lt;9.05-1.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567097" version="1" comment="python-lxml is &lt;2.3.6-0.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567058" version="1" comment="ppp is &lt;2.4.5.git-2.29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566416" version="1" comment="emacs is &lt;22.3-4.42.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566417" version="1" comment="emacs-info is &lt;22.3-4.42.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566418" version="1" comment="emacs-x11 is &lt;22.3-4.42.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566601" version="1" comment="gnutls is &lt;2.4.1-24.39.51.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566602" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.51.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566603" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566921" version="1" comment="libtasn1 is &lt;1.5-1.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566922" version="1" comment="libtasn1-3 is &lt;1.5-1.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566923" version="1" comment="libtasn1-3-32bit is &lt;1.5-1.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334251" version="1" comment="kvm is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592883" version="1" comment="dbus-1 is &lt;1.2.10-3.29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592884" version="1" comment="dbus-1-32bit is &lt;1.2.10-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592885" version="1" comment="dbus-1-x11 is &lt;1.2.10-3.29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592891" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.62.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592892" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592893" version="1" comment="openssl is &lt;0.9.8j-0.62.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566380" version="1" comment="cups is &lt;1.3.9-8.46.52.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566381" version="1" comment="cups-client is &lt;1.3.9-8.46.52.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566382" version="1" comment="cups-libs is &lt;1.3.9-8.46.52.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566383" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.46.52.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566614" version="1" comment="gpgme is &lt;1.1.6-25.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566615" version="1" comment="libgpgme11 is &lt;1.1.6-25.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566916" version="1" comment="libsnmp15 is &lt;5.4.2.1-8.12.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563659" version="1" comment="libsnmp15-32bit is &lt;5.4.2.1-8.12.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566917" version="1" comment="net-snmp is &lt;5.4.2.1-8.12.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566918" version="1" comment="perl-SNMP is &lt;5.4.2.1-8.12.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566919" version="1" comment="snmp-mibs is &lt;5.4.2.1-8.12.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566419" version="1" comment="evolution-data-server is &lt;2.28.2-0.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566420" version="1" comment="evolution-data-server-32bit is &lt;2.28.2-0.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566421" version="1" comment="evolution-data-server-lang is &lt;2.28.2-0.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592957" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.75-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592958" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.75-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592959" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.75-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566844" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.66.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566845" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566933" version="1" comment="libwsman1 is &lt;2.2.3-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566846" version="1" comment="openssl is &lt;0.9.8j-0.66.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566934" version="1" comment="openwsman-client is &lt;2.2.3-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566935" version="1" comment="openwsman-server is &lt;2.2.3-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592960" version="1" comment="pure-ftpd is &lt;1.0.22-3.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592961" version="1" comment="suseRegister is &lt;1.4-1.35.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592963" version="1" comment="libmysql55client18 is &lt;5.5.43-0.7.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592964" version="1" comment="libmysql55client18-32bit is &lt;5.5.43-0.7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592965" version="1" comment="libmysql55client_r18 is &lt;5.5.43-0.7.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592966" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.43-0.7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592967" version="1" comment="mysql is &lt;5.5.43-0.7.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592968" version="1" comment="mysql-client is &lt;5.5.43-0.7.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592978" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592979" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592980" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.68.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592981" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009592982" version="1" comment="openssl is &lt;0.9.8j-0.68.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566821" version="1" comment="libgcrypt11 is &lt;1.5.0-0.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566822" version="1" comment="libgcrypt11-32bit is &lt;1.5.0-0.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333951" version="1" comment="gpg2 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566390" version="1" comment="curl is &lt;7.19.7-1.40.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566391" version="1" comment="libcurl4 is &lt;7.19.7-1.40.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566392" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567059" version="1" comment="procmail is &lt;3.22-240.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566781" version="1" comment="kvm is &lt;1.4.2-0.21.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566782" version="1" comment="libvirt is &lt;1.0.5.9-0.19.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566783" version="1" comment="libvirt-client is &lt;1.0.5.9-0.19.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566784" version="1" comment="libvirt-client-32bit is &lt;1.0.5.9-0.19.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566785" version="1" comment="libvirt-doc is &lt;1.0.5.9-0.19.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566786" version="1" comment="libvirt-python is &lt;1.0.5.9-0.19.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566393" version="1" comment="dbus-1 is &lt;1.2.10-3.31.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566394" version="1" comment="dbus-1-32bit is &lt;1.2.10-3.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566395" version="1" comment="dbus-1-x11 is &lt;1.2.10-3.31.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566936" version="1" comment="libxml2 is &lt;2.7.6-0.31.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566937" version="1" comment="libxml2-32bit is &lt;2.7.6-0.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566938" version="1" comment="libxml2-python is &lt;2.7.6-0.31.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567145" version="1" comment="shim is &lt;0.7.318.81ee561d-0.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567158" version="1" comment="wpa_supplicant is &lt;0.7.1-6.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567159" version="1" comment="wpa_supplicant-gui is &lt;0.7.1-6.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563504" version="1" comment="libreoffice is &lt;4.0.3.3.26-0.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563505" version="1" comment="libreoffice-base is &lt;4.0.3.3.26-0.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563506" version="1" comment="libreoffice-base-drivers-postgresql is &lt;4.0.3.3.26-0.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563507" version="1" comment="libreoffice-base-extensions is &lt;4.0.3.3.26-0.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563509" version="1" comment="libreoffice-calc is &lt;4.0.3.3.26-0.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563510" version="1" comment="libreoffice-calc-extensions is &lt;4.0.3.3.26-0.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563511" version="1" comment="libreoffice-draw is &lt;4.0.3.3.26-0.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563512" version="1" comment="libreoffice-draw-extensions is &lt;4.0.3.3.26-0.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563513" version="1" comment="libreoffice-filters-optional is &lt;4.0.3.3.26-0.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563514" version="1" comment="libreoffice-gnome is &lt;4.0.3.3.26-0.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563515" version="1" comment="libreoffice-help-cs is &lt;4.0.3.3.26-0.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563516" version="1" comment="libreoffice-help-da is &lt;4.0.3.3.26-0.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563517" version="1" comment="libreoffice-help-de is &lt;4.0.3.3.26-0.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563518" version="1" comment="libreoffice-help-en-GB is &lt;4.0.3.3.26-0.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563519" version="1" comment="libreoffice-help-en-US is &lt;4.0.3.3.26-0.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563520" version="1" comment="libreoffice-help-es is &lt;4.0.3.3.26-0.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563521" version="1" comment="libreoffice-help-fr is &lt;4.0.3.3.26-0.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563522" version="1" comment="libreoffice-help-gu-IN is &lt;4.0.3.3.26-0.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563523" version="1" comment="libreoffice-help-hi-IN is &lt;4.0.3.3.26-0.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563524" version="1" comment="libreoffice-help-hu is &lt;4.0.3.3.26-0.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563525" version="1" comment="libreoffice-help-it is &lt;4.0.3.3.26-0.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563526" version="1" comment="libreoffice-help-ja is &lt;4.0.3.3.26-0.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563527" version="1" comment="libreoffice-help-ko is &lt;4.0.3.3.26-0.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563528" version="1" comment="libreoffice-help-nl is &lt;4.0.3.3.26-0.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563529" version="1" comment="libreoffice-help-pl is &lt;4.0.3.3.26-0.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563530" version="1" comment="libreoffice-help-pt is &lt;4.0.3.3.26-0.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563531" version="1" comment="libreoffice-help-pt-BR is &lt;4.0.3.3.26-0.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563532" version="1" comment="libreoffice-help-ru is &lt;4.0.3.3.26-0.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563533" version="1" comment="libreoffice-help-sv is &lt;4.0.3.3.26-0.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563534" version="1" comment="libreoffice-help-zh-CN is &lt;4.0.3.3.26-0.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563535" version="1" comment="libreoffice-help-zh-TW is &lt;4.0.3.3.26-0.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563536" version="1" comment="libreoffice-icon-themes is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563537" version="1" comment="libreoffice-impress is &lt;4.0.3.3.26-0.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563538" version="1" comment="libreoffice-impress-extensions is &lt;4.0.3.3.26-0.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563539" version="1" comment="libreoffice-kde is &lt;4.0.3.3.26-0.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563540" version="1" comment="libreoffice-kde4 is &lt;4.0.3.3.26-0.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563541" version="1" comment="libreoffice-l10n-af is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563542" version="1" comment="libreoffice-l10n-ar is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563543" version="1" comment="libreoffice-l10n-ca is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563544" version="1" comment="libreoffice-l10n-cs is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563545" version="1" comment="libreoffice-l10n-da is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563546" version="1" comment="libreoffice-l10n-de is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563548" version="1" comment="libreoffice-l10n-en-GB is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563549" version="1" comment="libreoffice-l10n-es is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563550" version="1" comment="libreoffice-l10n-fi is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563551" version="1" comment="libreoffice-l10n-fr is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563552" version="1" comment="libreoffice-l10n-gu-IN is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563553" version="1" comment="libreoffice-l10n-hi-IN is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563554" version="1" comment="libreoffice-l10n-hu is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563555" version="1" comment="libreoffice-l10n-it is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563556" version="1" comment="libreoffice-l10n-ja is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563557" version="1" comment="libreoffice-l10n-ko is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563558" version="1" comment="libreoffice-l10n-nb is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563559" version="1" comment="libreoffice-l10n-nl is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563560" version="1" comment="libreoffice-l10n-nn is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563561" version="1" comment="libreoffice-l10n-pl is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563563" version="1" comment="libreoffice-l10n-pt is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563564" version="1" comment="libreoffice-l10n-pt-BR is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563565" version="1" comment="libreoffice-l10n-ru is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563566" version="1" comment="libreoffice-l10n-sk is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563567" version="1" comment="libreoffice-l10n-sv is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563568" version="1" comment="libreoffice-l10n-xh is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563569" version="1" comment="libreoffice-l10n-zh-CN is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563570" version="1" comment="libreoffice-l10n-zh-TW is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563571" version="1" comment="libreoffice-l10n-zu is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563572" version="1" comment="libreoffice-mailmerge is &lt;4.0.3.3.26-0.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563573" version="1" comment="libreoffice-math is &lt;4.0.3.3.26-0.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563574" version="1" comment="libreoffice-mono is &lt;4.0.3.3.26-0.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563575" version="1" comment="libreoffice-officebean is &lt;4.0.3.3.26-0.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563576" version="1" comment="libreoffice-pyuno is &lt;4.0.3.3.26-0.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563578" version="1" comment="libreoffice-writer is &lt;4.0.3.3.26-0.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563579" version="1" comment="libreoffice-writer-extensions is &lt;4.0.3.3.26-0.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593062" version="1" comment="finch is &lt;2.6.6-0.25.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593063" version="1" comment="libpurple is &lt;2.6.6-0.25.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593064" version="1" comment="libpurple-lang is &lt;2.6.6-0.25.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593065" version="1" comment="libpurple-meanwhile is &lt;2.6.6-0.25.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593066" version="1" comment="libpurple-tcl is &lt;2.6.6-0.25.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593067" version="1" comment="pidgin is &lt;2.6.6-0.25.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566422" version="1" comment="file is &lt;4.24-43.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566423" version="1" comment="file-32bit is &lt;4.24-43.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566858" version="1" comment="libpulse-browse0 is &lt;0.9.23-0.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566859" version="1" comment="libpulse-mainloop-glib0 is &lt;0.9.23-0.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566860" version="1" comment="libpulse0 is &lt;0.9.23-0.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566861" version="1" comment="libpulse0-32bit is &lt;0.9.23-0.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566862" version="1" comment="pulseaudio is &lt;0.9.23-0.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566863" version="1" comment="pulseaudio-esound-compat is &lt;0.9.23-0.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566864" version="1" comment="pulseaudio-gdm-hooks is &lt;0.9.23-0.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566865" version="1" comment="pulseaudio-lang is &lt;0.9.23-0.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566866" version="1" comment="pulseaudio-module-bluetooth is &lt;0.9.23-0.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566867" version="1" comment="pulseaudio-module-gconf is &lt;0.9.23-0.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566868" version="1" comment="pulseaudio-module-jack is &lt;0.9.23-0.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566869" version="1" comment="pulseaudio-module-lirc is &lt;0.9.23-0.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566870" version="1" comment="pulseaudio-module-x11 is &lt;0.9.23-0.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566871" version="1" comment="pulseaudio-module-zeroconf is &lt;0.9.23-0.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566872" version="1" comment="pulseaudio-utils is &lt;0.9.23-0.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593075" version="1" comment="glibc is &lt;2.11.3-17.66.1 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593076" version="1" comment="glibc-32bit is &lt;2.11.3-17.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593077" version="1" comment="glibc-devel is &lt;2.11.3-17.66.1 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593078" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593079" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.66.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593080" version="1" comment="glibc-locale is &lt;2.11.3-17.66.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593081" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593082" version="1" comment="nscd is &lt;2.11.3-17.66.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566640" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.71-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566641" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.71-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566642" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.71-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567034" version="1" comment="perl is &lt;5.10.0-64.70.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567035" version="1" comment="perl-32bit is &lt;5.10.0-64.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567036" version="1" comment="perl-Module-Build is &lt;0.2808.01-0.70.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567037" version="1" comment="perl-Test-Simple is &lt;0.72-0.70.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567038" version="1" comment="perl-base is &lt;5.10.0-64.70.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567039" version="1" comment="perl-doc is &lt;5.10.0-64.70.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593219" version="1" comment="krb5 is &lt;1.6.3-133.49.60.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593220" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593221" version="1" comment="krb5-client is &lt;1.6.3-133.49.60.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566760" version="1" comment="krb5 is &lt;1.6.3-133.49.62.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566761" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566762" version="1" comment="krb5-client is &lt;1.6.3-133.49.62.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566829" version="1" comment="liblzo2-2 is &lt;2.03-12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566830" version="1" comment="liblzo2-2-32bit is &lt;2.03-12.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566610" version="1" comment="gpg2 is &lt;2.0.9-25.33.39.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566611" version="1" comment="gpg2-lang is &lt;2.0.9-25.33.39.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567089" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-0.31.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567090" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-0.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567091" version="1" comment="python is &lt;2.6.9-0.31.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567092" version="1" comment="python-base is &lt;2.6.9-0.31.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567093" version="1" comment="python-base-32bit is &lt;2.6.9-0.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567094" version="1" comment="python-curses is &lt;2.6.9-0.31.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567095" version="1" comment="python-devel is &lt;2.6.9-0.31.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563812" version="1" comment="python-tk is &lt;2.6.9-0.31.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567096" version="1" comment="python-xml is &lt;2.6.9-0.31.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567157" version="1" comment="wget is &lt;1.11.4-1.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566577" version="1" comment="glibc is &lt;2.11.3-17.72.14 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566578" version="1" comment="glibc-32bit is &lt;2.11.3-17.72.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566579" version="1" comment="glibc-devel is &lt;2.11.3-17.72.14 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566580" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.72.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566581" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.72.14 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566582" version="1" comment="glibc-locale is &lt;2.11.3-17.72.14 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566583" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.72.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566584" version="1" comment="nscd is &lt;2.11.3-17.72.14 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338872" version="1" comment="mdadm is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566823" version="1" comment="libgcrypt11 is &lt;1.5.0-0.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566824" version="1" comment="libgcrypt11-32bit is &lt;1.5.0-0.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566769" version="1" comment="krb5 is &lt;1.6.3-133.49.64.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566770" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566771" version="1" comment="krb5-client is &lt;1.6.3-133.49.64.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566772" version="1" comment="krb5 is &lt;1.6.3-133.49.66.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566773" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566774" version="1" comment="krb5-client is &lt;1.6.3-133.49.66.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566775" version="1" comment="krb5 is &lt;1.6.3-133.49.68.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566776" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566777" version="1" comment="krb5-client is &lt;1.6.3-133.49.68.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566931" version="1" comment="LibVNCServer is &lt;0.9.1-156.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593235" version="1" comment="bash is &lt;3.2-147.20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593236" version="1" comment="bash-doc is &lt;3.2-147.20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593237" version="1" comment="libreadline5 is &lt;5.2-147.20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593238" version="1" comment="libreadline5-32bit is &lt;5.2-147.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593239" version="1" comment="readline-doc is &lt;5.2-147.20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566812" version="1" comment="libevent-1_4-2 is &lt;1.4.5-24.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593247" version="1" comment="wireshark is &lt;1.10.10-0.2.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566352" version="1" comment="bash is &lt;3.2-147.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566353" version="1" comment="bash-doc is &lt;3.2-147.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563235" version="1" comment="libreadline5 is &lt;5.2-147.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566354" version="1" comment="libreadline5-32bit is &lt;5.2-147.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566355" version="1" comment="readline-doc is &lt;5.2-147.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567065" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-0.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567066" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-0.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567067" version="1" comment="python is &lt;2.6.9-0.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567068" version="1" comment="python-base is &lt;2.6.9-0.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567069" version="1" comment="python-base-32bit is &lt;2.6.9-0.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567070" version="1" comment="python-curses is &lt;2.6.9-0.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567071" version="1" comment="python-devel is &lt;2.6.9-0.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563788" version="1" comment="python-tk is &lt;2.6.9-0.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567072" version="1" comment="python-xml is &lt;2.6.9-0.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593254" version="1" comment="ruby is &lt;1.8.7.p357-0.9.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593262" version="1" comment="kernel-default is &lt;3.0.101-0.47.55.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593263" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.55.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593264" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.55.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593265" version="1" comment="kernel-default-extra is &lt;3.0.101-0.47.55.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593266" version="1" comment="kernel-pae is &lt;3.0.101-0.47.55.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593267" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.55.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593268" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.55.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593269" version="1" comment="kernel-pae-extra is &lt;3.0.101-0.47.55.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593270" version="1" comment="kernel-source is &lt;3.0.101-0.47.55.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593271" version="1" comment="kernel-syms is &lt;3.0.101-0.47.55.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593272" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.55.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593273" version="1" comment="kernel-xen is &lt;3.0.101-0.47.55.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593274" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.55.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593275" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.55.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593276" version="1" comment="kernel-xen-extra is &lt;3.0.101-0.47.55.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593327" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.101.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593328" version="1" comment="xorg-x11-server is &lt;7.4-27.101.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593329" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.101.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593337" version="1" comment="openvpn is &lt;2.0.9-143.44.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334026" version="1" comment="file is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566351" version="1" comment="libaugeas0 is &lt;0.9.0-3.17.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567153" version="1" comment="libtiff3 is &lt;3.8.2-141.160.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567154" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.160.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333954" version="1" comment="libvirt is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334173" version="1" comment="libssh is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566638" version="1" comment="libjasper is &lt;1.900.1-134.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566639" version="1" comment="libjasper-32bit is &lt;1.900.1-134.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567155" version="1" comment="unzip is &lt;6.00-11.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593374" version="1" comment="unzip is &lt;6.00-11.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333940" version="1" comment="samba is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564685" version="1" comment="google-carlito-fonts is &lt;1.1.03.beta1-2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564687" version="1" comment="libhyphen0 is &lt;2.8.8-2.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564688" version="1" comment="libmythes-1_2-0 is &lt;1.2.4-2.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564689" version="1" comment="libreoffice is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564690" version="1" comment="libreoffice-base is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564691" version="1" comment="libreoffice-base-drivers-postgresql is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564693" version="1" comment="libreoffice-calc is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564694" version="1" comment="libreoffice-calc-extensions is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564695" version="1" comment="libreoffice-draw is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564696" version="1" comment="libreoffice-filters-optional is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564697" version="1" comment="libreoffice-gnome is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564698" version="1" comment="libreoffice-icon-theme-galaxy is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564699" version="1" comment="libreoffice-icon-theme-tango is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564700" version="1" comment="libreoffice-impress is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564701" version="1" comment="libreoffice-kde4 is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564702" version="1" comment="libreoffice-l10n-af is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564703" version="1" comment="libreoffice-l10n-ar is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564704" version="1" comment="libreoffice-l10n-ca is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564705" version="1" comment="libreoffice-l10n-cs is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564706" version="1" comment="libreoffice-l10n-da is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564707" version="1" comment="libreoffice-l10n-de is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564708" version="1" comment="libreoffice-l10n-en is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564709" version="1" comment="libreoffice-l10n-es is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564710" version="1" comment="libreoffice-l10n-fi is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564711" version="1" comment="libreoffice-l10n-fr is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564712" version="1" comment="libreoffice-l10n-gu is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564713" version="1" comment="libreoffice-l10n-hi is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564714" version="1" comment="libreoffice-l10n-hu is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564715" version="1" comment="libreoffice-l10n-it is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564716" version="1" comment="libreoffice-l10n-ja is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564717" version="1" comment="libreoffice-l10n-ko is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564718" version="1" comment="libreoffice-l10n-nb is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564719" version="1" comment="libreoffice-l10n-nl is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564720" version="1" comment="libreoffice-l10n-nn is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564721" version="1" comment="libreoffice-l10n-pl is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564722" version="1" comment="libreoffice-l10n-pt-BR is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564723" version="1" comment="libreoffice-l10n-pt-PT is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564724" version="1" comment="libreoffice-l10n-ru is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564725" version="1" comment="libreoffice-l10n-sk is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564726" version="1" comment="libreoffice-l10n-sv is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564727" version="1" comment="libreoffice-l10n-xh is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564728" version="1" comment="libreoffice-l10n-zh-Hans is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564729" version="1" comment="libreoffice-l10n-zh-Hant is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564730" version="1" comment="libreoffice-l10n-zu is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564731" version="1" comment="libreoffice-mailmerge is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564732" version="1" comment="libreoffice-math is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564733" version="1" comment="libreoffice-officebean is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564734" version="1" comment="libreoffice-pyuno is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564735" version="1" comment="libreoffice-sdk is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515206" version="1" comment="libreoffice-share-linker is &lt;1-2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564736" version="1" comment="libreoffice-voikko is &lt;4.1-2.26 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564737" version="1" comment="libreoffice-writer is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564738" version="1" comment="libreoffice-writer-extensions is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564740" version="1" comment="libvoikko1 is &lt;3.7.1-5.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564741" version="1" comment="myspell-af_NA is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564742" version="1" comment="myspell-af_ZA is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564743" version="1" comment="myspell-ar is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564744" version="1" comment="myspell-ar_AE is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564745" version="1" comment="myspell-ar_BH is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564746" version="1" comment="myspell-ar_DZ is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564747" version="1" comment="myspell-ar_EG is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564748" version="1" comment="myspell-ar_IQ is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564749" version="1" comment="myspell-ar_JO is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564750" version="1" comment="myspell-ar_KW is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564751" version="1" comment="myspell-ar_LB is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564752" version="1" comment="myspell-ar_LY is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564753" version="1" comment="myspell-ar_MA is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564754" version="1" comment="myspell-ar_OM is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564755" version="1" comment="myspell-ar_QA is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564756" version="1" comment="myspell-ar_SA is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564757" version="1" comment="myspell-ar_SD is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564758" version="1" comment="myspell-ar_SY is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564759" version="1" comment="myspell-ar_TN is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564760" version="1" comment="myspell-ar_YE is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564761" version="1" comment="myspell-be_BY is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564762" version="1" comment="myspell-bg_BG is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564763" version="1" comment="myspell-bn_BD is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564764" version="1" comment="myspell-bn_IN is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564765" version="1" comment="myspell-bs is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564766" version="1" comment="myspell-bs_BA is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564767" version="1" comment="myspell-ca is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564768" version="1" comment="myspell-ca_AD is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564769" version="1" comment="myspell-ca_ES is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564770" version="1" comment="myspell-ca_ES_valencia is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564771" version="1" comment="myspell-ca_FR is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564772" version="1" comment="myspell-ca_IT is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564773" version="1" comment="myspell-cs_CZ is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564774" version="1" comment="myspell-da_DK is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564775" version="1" comment="myspell-de is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564776" version="1" comment="myspell-de_AT is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564777" version="1" comment="myspell-de_CH is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564778" version="1" comment="myspell-de_DE is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564779" version="1" comment="myspell-dictionaries is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564780" version="1" comment="myspell-el_GR is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564781" version="1" comment="myspell-en is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564782" version="1" comment="myspell-en_AU is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564783" version="1" comment="myspell-en_BS is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564784" version="1" comment="myspell-en_BZ is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564785" version="1" comment="myspell-en_CA is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564786" version="1" comment="myspell-en_GB is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564787" version="1" comment="myspell-en_GH is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564788" version="1" comment="myspell-en_IE is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564789" version="1" comment="myspell-en_IN is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564790" version="1" comment="myspell-en_JM is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564791" version="1" comment="myspell-en_MW is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564792" version="1" comment="myspell-en_NA is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564793" version="1" comment="myspell-en_NZ is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564794" version="1" comment="myspell-en_PH is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564795" version="1" comment="myspell-en_TT is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564796" version="1" comment="myspell-en_US is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564797" version="1" comment="myspell-en_ZA is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564798" version="1" comment="myspell-en_ZW is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564799" version="1" comment="myspell-es is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564800" version="1" comment="myspell-es_AR is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564801" version="1" comment="myspell-es_BO is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564802" version="1" comment="myspell-es_CL is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564803" version="1" comment="myspell-es_CO is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564804" version="1" comment="myspell-es_CR is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564805" version="1" comment="myspell-es_CU is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564806" version="1" comment="myspell-es_DO is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564807" version="1" comment="myspell-es_EC is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564808" version="1" comment="myspell-es_ES is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564809" version="1" comment="myspell-es_GT is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564810" version="1" comment="myspell-es_HN is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564811" version="1" comment="myspell-es_MX is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564812" version="1" comment="myspell-es_NI is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564813" version="1" comment="myspell-es_PA is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564814" version="1" comment="myspell-es_PE is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564815" version="1" comment="myspell-es_PR is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564816" version="1" comment="myspell-es_PY is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564817" version="1" comment="myspell-es_SV is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564818" version="1" comment="myspell-es_UY is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564819" version="1" comment="myspell-es_VE is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564820" version="1" comment="myspell-et_EE is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564821" version="1" comment="myspell-fr_BE is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564822" version="1" comment="myspell-fr_CA is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564823" version="1" comment="myspell-fr_CH is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564824" version="1" comment="myspell-fr_FR is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564825" version="1" comment="myspell-fr_LU is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564826" version="1" comment="myspell-fr_MC is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564827" version="1" comment="myspell-gu_IN is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564828" version="1" comment="myspell-he_IL is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564829" version="1" comment="myspell-hi_IN is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564830" version="1" comment="myspell-hr_HR is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564831" version="1" comment="myspell-hu_HU is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564832" version="1" comment="myspell-it_IT is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564833" version="1" comment="myspell-lightproof-en is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564834" version="1" comment="myspell-lightproof-hu_HU is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564835" version="1" comment="myspell-lightproof-pt_BR is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564836" version="1" comment="myspell-lightproof-ru_RU is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564837" version="1" comment="myspell-lo_LA is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564838" version="1" comment="myspell-lt_LT is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564839" version="1" comment="myspell-lv_LV is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564840" version="1" comment="myspell-nb_NO is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564841" version="1" comment="myspell-nl_BE is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564842" version="1" comment="myspell-nl_NL is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564843" version="1" comment="myspell-nn_NO is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564844" version="1" comment="myspell-no is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564845" version="1" comment="myspell-pl_PL is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564846" version="1" comment="myspell-pt_AO is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564847" version="1" comment="myspell-pt_BR is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564848" version="1" comment="myspell-pt_PT is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564849" version="1" comment="myspell-ro is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564850" version="1" comment="myspell-ro_RO is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564851" version="1" comment="myspell-ru_RU is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564852" version="1" comment="myspell-sk_SK is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564853" version="1" comment="myspell-sl_SI is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564854" version="1" comment="myspell-sr is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564855" version="1" comment="myspell-sr_CS is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564856" version="1" comment="myspell-sr_Latn_CS is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564857" version="1" comment="myspell-sr_Latn_RS is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564858" version="1" comment="myspell-sr_RS is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564859" version="1" comment="myspell-sv_FI is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564860" version="1" comment="myspell-sv_SE is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564861" version="1" comment="myspell-te is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564862" version="1" comment="myspell-te_IN is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564863" version="1" comment="myspell-th_TH is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564864" version="1" comment="myspell-vi is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564865" version="1" comment="myspell-vi_VN is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564866" version="1" comment="myspell-zu_ZA is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564868" version="1" comment="python-importlib is &lt;1.0.2-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333977" version="1" comment="curl is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593474" version="1" comment="gnutls is &lt;2.4.1-24.39.55.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593475" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.55.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593476" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567049" version="1" comment="libecpg6 is &lt;9.1.15-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567050" version="1" comment="libpq5 is &lt;9.1.15-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567051" version="1" comment="libpq5-32bit is &lt;9.1.15-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567052" version="1" comment="postgresql91 is &lt;9.1.15-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567053" version="1" comment="postgresql91-docs is &lt;9.1.15-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009336726" version="1" comment="openldap2-client is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567101" version="1" comment="rsync is &lt;3.0.4-2.49.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566313" version="1" comment="ImageMagick is &lt;6.4.3.6-7.30.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566314" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.30.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566315" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.30.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566316" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566317" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.30.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593490" version="1" comment="flash-player is &lt;11.2.202.424-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593491" version="1" comment="flash-player-gnome is &lt;11.2.202.424-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593492" version="1" comment="flash-player-kde4 is &lt;11.2.202.424-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566368" version="1" comment="binutils is &lt;2.23.1-0.23.15 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593494" version="1" comment="bind-libs is &lt;9.9.6P1-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593495" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593496" version="1" comment="bind-utils is &lt;9.9.6P1-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567172" version="1" comment="xen is &lt;4.2.5_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567173" version="1" comment="xen-doc-html is &lt;4.2.5_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567174" version="1" comment="xen-doc-pdf is &lt;4.2.5_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567175" version="1" comment="xen-kmp-default is &lt;4.2.5_02_3.0.101_0.40-0.7.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567176" version="1" comment="xen-libs is &lt;4.2.5_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567177" version="1" comment="xen-libs-32bit is &lt;4.2.5_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567178" version="1" comment="xen-tools is &lt;4.2.5_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567179" version="1" comment="xen-tools-domU is &lt;4.2.5_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566698" version="1" comment="kde4-kgreeter-plugins is &lt;4.3.5-0.12.20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566699" version="1" comment="kdebase4-wallpapers is &lt;4.3.5-0.11.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566700" version="1" comment="kdebase4-workspace is &lt;4.3.5-0.12.20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566701" version="1" comment="kdebase4-workspace-ksysguardd is &lt;4.3.5-0.12.20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566702" version="1" comment="kdm is &lt;4.3.5-0.12.20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566703" version="1" comment="kwin is &lt;4.3.5-0.12.20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563891" version="1" comment="wireshark is &lt;1.10.11-0.2.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593519" version="1" comment="tcpdump is &lt;3.9.8-1.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566532" version="1" comment="libFLAC++6 is &lt;1.2.1-68.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566533" version="1" comment="libFLAC8 is &lt;1.2.1-68.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566534" version="1" comment="libFLAC8-32bit is &lt;1.2.1-68.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334068" version="1" comment="pcre is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566825" version="1" comment="libjasper is &lt;1.900.1-134.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566826" version="1" comment="libjasper-32bit is &lt;1.900.1-134.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566827" version="1" comment="libksba is &lt;1.0.4-1.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566378" version="1" comment="cpio is &lt;2.9-75.78.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566379" version="1" comment="cpio-lang is &lt;2.9-75.78.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593546" version="1" comment="libblkid1 is &lt;2.19.1-6.62.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593547" version="1" comment="libblkid1-32bit is &lt;2.19.1-6.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593548" version="1" comment="libuuid-devel is &lt;2.19.1-6.62.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593549" version="1" comment="libuuid1 is &lt;2.19.1-6.62.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593550" version="1" comment="libuuid1-32bit is &lt;2.19.1-6.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593551" version="1" comment="util-linux is &lt;2.19.1-6.62.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593552" version="1" comment="util-linux-lang is &lt;2.19.1-6.62.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593553" version="1" comment="uuid-runtime is &lt;2.19.1-6.62.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593573" version="1" comment="mutt is &lt;1.5.17-42.39.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567151" version="1" comment="tcpdump is &lt;3.9.8-1.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334142" version="1" comment="graphviz is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333984" version="1" comment="strongswan is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333996" version="1" comment="openssh is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593576" version="1" comment="ntp is &lt;4.2.4p8-1.29.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593577" version="1" comment="ntp-doc is &lt;4.2.4p8-1.29.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593580" version="1" comment="ntp is &lt;4.2.4p8-1.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593581" version="1" comment="ntp-doc is &lt;4.2.4p8-1.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593584" version="1" comment="clamav is &lt;0.98.6-0.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566409" version="1" comment="elfutils is &lt;0.152-4.9.17 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566410" version="1" comment="libasm1 is &lt;0.152-4.9.17 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566411" version="1" comment="libdw1 is &lt;0.152-4.9.17 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566412" version="1" comment="libdw1-32bit is &lt;0.152-4.9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566413" version="1" comment="libebl1 is &lt;0.152-4.9.17 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566414" version="1" comment="libebl1-32bit is &lt;0.152-4.9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566415" version="1" comment="libelf1 is &lt;0.152-4.9.17 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563274" version="1" comment="libelf1-32bit is &lt;0.152-4.9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593586" version="1" comment="coreutils is &lt;8.12-6.25.32.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593587" version="1" comment="coreutils-lang is &lt;8.12-6.25.32.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566831" version="1" comment="libmpfr1 is &lt;2.3.2-3.118.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566912" version="1" comment="libsndfile is &lt;1.0.20-2.6.5 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566913" version="1" comment="libsndfile-32bit is &lt;1.0.20-2.6.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566370" version="1" comment="cabextract is &lt;1.2-2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566832" version="1" comment="libmspack0 is &lt;0.0.20060920alpha-74.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334243" version="1" comment="xdg-utils is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567156" version="1" comment="vorbis-tools is &lt;1.1.1-174.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563371" version="1" comment="icu is &lt;4.0-7.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566637" version="1" comment="libicu is &lt;4.0-7.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564553" version="1" comment="icu is &lt;4.0-7.30.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567334" version="1" comment="libicu is &lt;4.0-7.30.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566566" version="1" comment="freetype2 is &lt;2.3.7-25.34.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566567" version="1" comment="freetype2-32bit is &lt;2.3.7-25.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566568" version="1" comment="ft2demos is &lt;2.3.7-25.34.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593594" version="1" comment="freetype2 is &lt;2.3.7-25.35.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593595" version="1" comment="freetype2-32bit is &lt;2.3.7-25.35.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593596" version="1" comment="ft2demos is &lt;2.3.7-25.35.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593605" version="1" comment="cups is &lt;1.3.9-8.46.54.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593606" version="1" comment="cups-client is &lt;1.3.9-8.46.54.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593607" version="1" comment="cups-libs is &lt;1.3.9-8.46.54.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593608" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.46.54.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593615" version="1" comment="sudo is &lt;1.7.6p2-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566407" version="1" comment="ecryptfs-utils is &lt;61-1.35.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566408" version="1" comment="ecryptfs-utils-32bit is &lt;61-1.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566571" version="1" comment="gd is &lt;2.0.36.RC1-52.20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566727" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.67.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566728" version="1" comment="kernel-default is &lt;3.0.101-0.47.67.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566729" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.67.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566730" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.67.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566731" version="1" comment="kernel-default-extra is &lt;3.0.101-0.47.67.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566732" version="1" comment="kernel-pae is &lt;3.0.101-0.47.67.2 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566733" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.67.2 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566734" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.67.2 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566735" version="1" comment="kernel-pae-extra is &lt;3.0.101-0.47.67.2 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566736" version="1" comment="kernel-source is &lt;3.0.101-0.47.67.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566737" version="1" comment="kernel-syms is &lt;3.0.101-0.47.67.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566738" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.67.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566739" version="1" comment="kernel-xen is &lt;3.0.101-0.47.67.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566740" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.67.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566741" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.67.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566742" version="1" comment="kernel-xen-extra is &lt;3.0.101-0.47.67.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567338" version="1" comment="kernel-default is &lt;3.0.101-65.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567339" version="1" comment="kernel-default-base is &lt;3.0.101-65.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567340" version="1" comment="kernel-default-devel is &lt;3.0.101-65.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567341" version="1" comment="kernel-default-extra is &lt;3.0.101-65.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567342" version="1" comment="kernel-pae is &lt;3.0.101-65.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567343" version="1" comment="kernel-pae-base is &lt;3.0.101-65.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567344" version="1" comment="kernel-pae-devel is &lt;3.0.101-65.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567345" version="1" comment="kernel-pae-extra is &lt;3.0.101-65.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567346" version="1" comment="kernel-source is &lt;3.0.101-65.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567347" version="1" comment="kernel-syms is &lt;3.0.101-65.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567348" version="1" comment="kernel-trace-devel is &lt;3.0.101-65.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567349" version="1" comment="kernel-xen is &lt;3.0.101-65.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567350" version="1" comment="kernel-xen-base is &lt;3.0.101-65.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567351" version="1" comment="kernel-xen-devel is &lt;3.0.101-65.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567352" version="1" comment="kernel-xen-extra is &lt;3.0.101-65.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566833" version="1" comment="libmspack0 is &lt;0.0.20060920alpha-74.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566914" version="1" comment="libsndfile is &lt;1.0.20-2.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566915" version="1" comment="libsndfile-32bit is &lt;1.0.20-2.10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566593" version="1" comment="glibc is &lt;2.11.3-17.95.2 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566594" version="1" comment="glibc-32bit is &lt;2.11.3-17.95.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566595" version="1" comment="glibc-devel is &lt;2.11.3-17.95.2 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566596" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.95.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566597" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.95.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566598" version="1" comment="glibc-locale is &lt;2.11.3-17.95.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566599" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.95.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566600" version="1" comment="nscd is &lt;2.11.3-17.95.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009339303" version="1" comment="imlib2 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593743" version="1" comment="glibc is &lt;2.11.3-17.74.13 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593744" version="1" comment="glibc-32bit is &lt;2.11.3-17.74.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593745" version="1" comment="glibc-devel is &lt;2.11.3-17.74.13 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593746" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.74.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593747" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.74.13 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593748" version="1" comment="glibc-locale is &lt;2.11.3-17.74.13 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593749" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.74.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593750" version="1" comment="nscd is &lt;2.11.3-17.74.13 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567104" version="1" comment="libldb1 is &lt;3.6.3-0.56.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567105" version="1" comment="libldb1-32bit is &lt;3.6.3-0.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567106" version="1" comment="libsmbclient0 is &lt;3.6.3-0.56.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567107" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567108" version="1" comment="libtalloc2 is &lt;3.6.3-0.56.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567109" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567110" version="1" comment="libtdb1 is &lt;3.6.3-0.56.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567111" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567112" version="1" comment="libtevent0 is &lt;3.6.3-0.56.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567113" version="1" comment="libtevent0-32bit is &lt;3.6.3-0.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567114" version="1" comment="libwbclient0 is &lt;3.6.3-0.56.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567115" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567116" version="1" comment="samba is &lt;3.6.3-0.56.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567117" version="1" comment="samba-32bit is &lt;3.6.3-0.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567118" version="1" comment="samba-client is &lt;3.6.3-0.56.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567119" version="1" comment="samba-client-32bit is &lt;3.6.3-0.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567120" version="1" comment="samba-doc is &lt;3.6.3-0.56.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567121" version="1" comment="samba-krb-printing is &lt;3.6.3-0.56.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567122" version="1" comment="samba-winbind is &lt;3.6.3-0.56.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567123" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334246" version="1" comment="dbus-1 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566399" version="1" comment="e2fsprogs is &lt;1.41.9-2.10.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566400" version="1" comment="libblkid1 is &lt;2.19.1-6.62.7 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009440332" version="1" comment="libblkid1-32bit is &lt;2.19.1-6.62.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009101461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566401" version="1" comment="libcom_err2 is &lt;1.41.9-2.10.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566402" version="1" comment="libcom_err2-32bit is &lt;1.41.9-2.10.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566403" version="1" comment="libext2fs2 is &lt;1.41.9-2.10.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566404" version="1" comment="libuuid-devel is &lt;2.19.1-6.62.7 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566405" version="1" comment="libuuid1 is &lt;2.19.1-6.62.7 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009440334" version="1" comment="libuuid1-32bit is &lt;2.19.1-6.62.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009101461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566406" version="1" comment="uuid-runtime is &lt;2.19.1-6.62.7 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593820" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.103.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593821" version="1" comment="xorg-x11-server is &lt;7.4-27.103.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593822" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.103.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566744" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.71.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566745" version="1" comment="kernel-default is &lt;3.0.101-0.47.71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566746" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566747" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566748" version="1" comment="kernel-default-extra is &lt;3.0.101-0.47.71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566749" version="1" comment="kernel-pae is &lt;3.0.101-0.47.71.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566750" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.71.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566751" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.71.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566752" version="1" comment="kernel-pae-extra is &lt;3.0.101-0.47.71.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566753" version="1" comment="kernel-source is &lt;3.0.101-0.47.71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566754" version="1" comment="kernel-syms is &lt;3.0.101-0.47.71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566755" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566756" version="1" comment="kernel-xen is &lt;3.0.101-0.47.71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566757" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566758" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566759" version="1" comment="kernel-xen-extra is &lt;3.0.101-0.47.71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567368" version="1" comment="kernel-default is &lt;3.0.101-68.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567369" version="1" comment="kernel-default-base is &lt;3.0.101-68.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567370" version="1" comment="kernel-default-devel is &lt;3.0.101-68.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567371" version="1" comment="kernel-default-extra is &lt;3.0.101-68.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567372" version="1" comment="kernel-pae is &lt;3.0.101-68.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567373" version="1" comment="kernel-pae-base is &lt;3.0.101-68.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567374" version="1" comment="kernel-pae-devel is &lt;3.0.101-68.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567375" version="1" comment="kernel-pae-extra is &lt;3.0.101-68.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567376" version="1" comment="kernel-source is &lt;3.0.101-68.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567377" version="1" comment="kernel-syms is &lt;3.0.101-68.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567378" version="1" comment="kernel-trace-devel is &lt;3.0.101-68.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567379" version="1" comment="kernel-xen is &lt;3.0.101-68.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567380" version="1" comment="kernel-xen-base is &lt;3.0.101-68.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567381" version="1" comment="kernel-xen-devel is &lt;3.0.101-68.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567382" version="1" comment="kernel-xen-extra is &lt;3.0.101-68.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593830" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009590589" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009139612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566978" version="1" comment="libmysql55client18 is &lt;5.5.46-0.14.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566979" version="1" comment="libmysql55client18-32bit is &lt;5.5.46-0.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566980" version="1" comment="libmysql55client_r18 is &lt;5.5.46-0.14.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566981" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.46-0.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566982" version="1" comment="mysql is &lt;5.5.46-0.14.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566983" version="1" comment="mysql-client is &lt;5.5.46-0.14.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593831" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593832" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593833" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.74.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593834" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593835" version="1" comment="openssl is &lt;0.9.8j-0.74.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566891" version="1" comment="libQtWebKit4 is &lt;4.6.3-5.34.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566892" version="1" comment="libQtWebKit4-32bit is &lt;4.6.3-5.34.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566893" version="1" comment="libqt4 is &lt;4.6.3-5.34.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566894" version="1" comment="libqt4-32bit is &lt;4.6.3-5.34.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566895" version="1" comment="libqt4-qt3support is &lt;4.6.3-5.34.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566896" version="1" comment="libqt4-qt3support-32bit is &lt;4.6.3-5.34.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566897" version="1" comment="libqt4-sql is &lt;4.6.3-5.34.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566898" version="1" comment="libqt4-sql-32bit is &lt;4.6.3-5.34.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566899" version="1" comment="libqt4-sql-mysql is &lt;4.6.3-5.34.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566900" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.6.3-5.34.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566901" version="1" comment="libqt4-sql-postgresql is &lt;4.6.3-5.34.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566902" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.6.3-5.34.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566903" version="1" comment="libqt4-sql-sqlite is &lt;4.6.3-5.34.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566904" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.6.3-5.34.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566905" version="1" comment="libqt4-sql-unixODBC is &lt;4.6.3-5.34.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566906" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.6.3-5.34.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566907" version="1" comment="libqt4-x11 is &lt;4.6.3-5.34.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566908" version="1" comment="libqt4-x11-32bit is &lt;4.6.3-5.34.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334271" version="1" comment="texlive is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334247" version="1" comment="flash-player is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593860" version="1" comment="flash-player is &lt;11.2.202.429-0.4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593861" version="1" comment="flash-player-gnome is &lt;11.2.202.429-0.4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593862" version="1" comment="flash-player-kde4 is &lt;11.2.202.429-0.4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593863" version="1" comment="flash-player is &lt;11.2.202.438-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593864" version="1" comment="flash-player-gnome is &lt;11.2.202.438-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593865" version="1" comment="flash-player-kde4 is &lt;11.2.202.438-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593866" version="1" comment="flash-player is &lt;11.2.202.440-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593867" version="1" comment="flash-player-gnome is &lt;11.2.202.440-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593868" version="1" comment="flash-player-kde4 is &lt;11.2.202.440-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593869" version="1" comment="flash-player is &lt;11.2.202.442-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593870" version="1" comment="flash-player-gnome is &lt;11.2.202.442-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593871" version="1" comment="flash-player-kde4 is &lt;11.2.202.442-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593872" version="1" comment="flash-player is &lt;11.2.202.451-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593873" version="1" comment="flash-player-gnome is &lt;11.2.202.451-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593874" version="1" comment="flash-player-kde4 is &lt;11.2.202.451-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593875" version="1" comment="flash-player is &lt;11.2.202.457-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593876" version="1" comment="flash-player-gnome is &lt;11.2.202.457-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593877" version="1" comment="flash-player-kde4 is &lt;11.2.202.457-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593878" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.75-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593879" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.75-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593880" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.75-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593881" version="1" comment="wireshark is &lt;1.10.12-0.2.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566482" version="1" comment="MozillaFirefox is &lt;31.7.0esr-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566483" version="1" comment="MozillaFirefox-translations is &lt;31.7.0esr-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566618" version="1" comment="gstreamer-0_10-plugins-bad is &lt;0.10.22-7.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566619" version="1" comment="gstreamer-0_10-plugins-bad-lang is &lt;0.10.22-7.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566620" version="1" comment="libgstbasecamerabinsrc-0_10-0 is &lt;0.10.22-7.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566621" version="1" comment="libgstbasecamerabinsrc-0_10-0-32bit is &lt;0.10.22-7.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566622" version="1" comment="libgstbasevideo-0_10-0 is &lt;0.10.22-7.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566623" version="1" comment="libgstbasevideo-0_10-0-32bit is &lt;0.10.22-7.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566624" version="1" comment="libgstphotography-0_10-0 is &lt;0.10.22-7.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566625" version="1" comment="libgstphotography-0_10-0-32bit is &lt;0.10.22-7.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566626" version="1" comment="libgstsignalprocessor-0_10-0 is &lt;0.10.22-7.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566627" version="1" comment="libgstsignalprocessor-0_10-0-32bit is &lt;0.10.22-7.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566628" version="1" comment="libgstvdp-0_10-0 is &lt;0.10.22-7.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566629" version="1" comment="libgstvdp-0_10-0-32bit is &lt;0.10.22-7.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333936" version="1" comment="MozillaFirefox is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566336" version="1" comment="MozillaFirefox is &lt;31.6.0esr-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566337" version="1" comment="MozillaFirefox-translations is &lt;31.6.0esr-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566480" version="1" comment="MozillaFirefox is &lt;31.5.3esr-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566481" version="1" comment="MozillaFirefox-translations is &lt;31.5.3esr-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593884" version="1" comment="MozillaFirefox is &lt;31.5.0esr-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593885" version="1" comment="MozillaFirefox-translations is &lt;31.5.0esr-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566932" version="1" comment="libwmf is &lt;0.2.8.4-206.29.29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333929" version="1" comment="patch is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338991" version="1" comment="cpio is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333999" version="1" comment="NetworkManager is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009339306" version="1" comment="lxc is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563696" version="1" comment="lxc is &lt;0.8.0-0.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009339307" version="1" comment="apport is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333967" version="1" comment="grep is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593894" version="1" comment="bind-libs is &lt;9.9.6P1-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593895" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593896" version="1" comment="bind-utils is &lt;9.9.6P1-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566612" version="1" comment="gpg2 is &lt;2.0.9-25.33.41.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566613" version="1" comment="gpg2-lang is &lt;2.0.9-25.33.41.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593907" version="1" comment="kvm is &lt;1.4.2-0.22.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563663" version="1" comment="libssh2-1 is &lt;1.2.9-4.2.4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593909" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.72.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593910" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593911" version="1" comment="openssl is &lt;0.9.8j-0.72.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566371" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.31.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566372" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593919" version="1" comment="ntp is &lt;4.2.4p8-1.29.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593920" version="1" comment="ntp-doc is &lt;4.2.4p8-1.29.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593923" version="1" comment="xorg-x11-libs is &lt;7.4-8.26.44.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593924" version="1" comment="xorg-x11-libs-32bit is &lt;7.4-8.26.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593932" version="1" comment="xorg-x11-libs is &lt;7.4-8.26.46.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593933" version="1" comment="xorg-x11-libs-32bit is &lt;7.4-8.26.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566939" version="1" comment="libxml2 is &lt;2.7.6-0.34.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566940" version="1" comment="libxml2-32bit is &lt;2.7.6-0.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566941" version="1" comment="libxml2-python is &lt;2.7.6-0.34.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334146" version="1" comment="wpa_supplicant is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333935" version="1" comment="coreutils is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567243" version="1" comment="xen is &lt;4.2.5_04-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567244" version="1" comment="xen-doc-html is &lt;4.2.5_04-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567245" version="1" comment="xen-doc-pdf is &lt;4.2.5_04-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567246" version="1" comment="xen-kmp-default is &lt;4.2.5_04_3.0.101_0.47.52-0.9.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567247" version="1" comment="xen-kmp-pae is &lt;4.2.5_04_3.0.101_0.47.52-0.9.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567248" version="1" comment="xen-libs is &lt;4.2.5_04-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567249" version="1" comment="xen-libs-32bit is &lt;4.2.5_04-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567250" version="1" comment="xen-tools is &lt;4.2.5_04-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567251" version="1" comment="xen-tools-domU is &lt;4.2.5_04-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333975" version="1" comment="tcpdump is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593948" version="1" comment="clamav is &lt;0.98.7-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333947" version="1" comment="wireshark is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593950" version="1" comment="wireshark is &lt;1.10.13-0.2.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593953" version="1" comment="bytefx-data-mysql is &lt;2.6.7-0.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593954" version="1" comment="ibm-data-db2 is &lt;2.6.7-0.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593955" version="1" comment="mono-core is &lt;2.6.7-0.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593956" version="1" comment="mono-data is &lt;2.6.7-0.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593957" version="1" comment="mono-data-firebird is &lt;2.6.7-0.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593958" version="1" comment="mono-data-oracle is &lt;2.6.7-0.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593959" version="1" comment="mono-data-postgresql is &lt;2.6.7-0.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593960" version="1" comment="mono-data-sqlite is &lt;2.6.7-0.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593961" version="1" comment="mono-data-sybase is &lt;2.6.7-0.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593962" version="1" comment="mono-devel is &lt;2.6.7-0.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593963" version="1" comment="mono-extras is &lt;2.6.7-0.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593964" version="1" comment="mono-jscript is &lt;2.6.7-0.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593965" version="1" comment="mono-locale-extras is &lt;2.6.7-0.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593966" version="1" comment="mono-nunit is &lt;2.6.7-0.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593967" version="1" comment="mono-wcf is &lt;2.6.7-0.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593968" version="1" comment="mono-web is &lt;2.6.7-0.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593969" version="1" comment="mono-winforms is &lt;2.6.7-0.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009593970" version="1" comment="monodoc-core is &lt;2.6.7-0.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334250" version="1" comment="libzip1 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566972" version="1" comment="libmysql55client18 is &lt;5.5.45-0.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566973" version="1" comment="libmysql55client18-32bit is &lt;5.5.45-0.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566974" version="1" comment="libmysql55client_r18 is &lt;5.5.45-0.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566975" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.45-0.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566976" version="1" comment="mysql is &lt;5.5.45-0.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566977" version="1" comment="mysql-client is &lt;5.5.45-0.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566643" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.85-0.11.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566644" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.85-0.11.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566645" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.85-0.11.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333953" version="1" comment="krb5 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566766" version="1" comment="krb5 is &lt;1.6.3-133.49.103.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566767" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566768" version="1" comment="krb5-client is &lt;1.6.3-133.49.103.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566338" version="1" comment="MozillaFirefox is &lt;31.8.0esr-0.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566339" version="1" comment="MozillaFirefox-translations is &lt;31.8.0esr-0.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566340" version="1" comment="libfreebl3 is &lt;3.19.2_CKBI_1.98-0.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566341" version="1" comment="libfreebl3-32bit is &lt;3.19.2_CKBI_1.98-0.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566342" version="1" comment="libsoftokn3 is &lt;3.19.2_CKBI_1.98-0.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566343" version="1" comment="libsoftokn3-32bit is &lt;3.19.2_CKBI_1.98-0.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566344" version="1" comment="mozilla-nspr is &lt;4.10.8-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566345" version="1" comment="mozilla-nspr-32bit is &lt;4.10.8-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566346" version="1" comment="mozilla-nss is &lt;3.19.2_CKBI_1.98-0.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566347" version="1" comment="mozilla-nss-32bit is &lt;3.19.2_CKBI_1.98-0.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566348" version="1" comment="mozilla-nss-tools is &lt;3.19.2_CKBI_1.98-0.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567180" version="1" comment="xen is &lt;4.2.5_12-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567181" version="1" comment="xen-doc-html is &lt;4.2.5_12-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567182" version="1" comment="xen-doc-pdf is &lt;4.2.5_12-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567183" version="1" comment="xen-kmp-default is &lt;4.2.5_12_3.0.101_0.47.55-15.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567184" version="1" comment="xen-kmp-pae is &lt;4.2.5_12_3.0.101_0.47.55-15.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567185" version="1" comment="xen-libs is &lt;4.2.5_12-15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567186" version="1" comment="xen-libs-32bit is &lt;4.2.5_12-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567187" version="1" comment="xen-tools is &lt;4.2.5_12-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567188" version="1" comment="xen-tools-domU is &lt;4.2.5_12-15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566607" version="1" comment="gnutls is &lt;2.4.1-24.39.60.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566608" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.60.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566609" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594005" version="1" comment="libtasn1 is &lt;1.5-1.30.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594006" version="1" comment="libtasn1-3 is &lt;1.5-1.30.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594007" version="1" comment="libtasn1-3-32bit is &lt;1.5-1.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594015" version="1" comment="flash-player is &lt;11.2.202.460-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594016" version="1" comment="flash-player-gnome is &lt;11.2.202.460-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594017" version="1" comment="flash-player-kde4 is &lt;11.2.202.460-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594018" version="1" comment="flash-player is &lt;11.2.202.466-0.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594019" version="1" comment="flash-player-gnome is &lt;11.2.202.466-0.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594020" version="1" comment="flash-player-kde4 is &lt;11.2.202.466-0.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566544" version="1" comment="flash-player is &lt;11.2.202.508-0.14.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566545" version="1" comment="flash-player-gnome is &lt;11.2.202.508-0.14.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566546" version="1" comment="flash-player-kde4 is &lt;11.2.202.508-0.14.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594021" version="1" comment="flash-player is &lt;11.2.202.468-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594022" version="1" comment="flash-player-gnome is &lt;11.2.202.468-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594023" version="1" comment="flash-player-kde4 is &lt;11.2.202.468-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594024" version="1" comment="curl is &lt;7.19.7-1.42.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594025" version="1" comment="libcurl4 is &lt;7.19.7-1.42.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594026" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567054" version="1" comment="postgresql91 is &lt;9.1.18-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567055" version="1" comment="postgresql91-docs is &lt;9.1.18-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334044" version="1" comment="postgresql94 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566373" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566374" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567024" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.80.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567025" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567026" version="1" comment="openssl is &lt;0.9.8j-0.80.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567311" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.41.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567312" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567420" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.89.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567421" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567422" version="1" comment="openssl is &lt;0.9.8j-0.89.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566569" version="1" comment="fuse is &lt;2.8.7-0.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566570" version="1" comment="libfuse2 is &lt;2.8.7-0.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594037" version="1" comment="kvm is &lt;1.4.2-0.22.31.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567252" version="1" comment="xen is &lt;4.2.5_08-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567253" version="1" comment="xen-doc-html is &lt;4.2.5_08-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567254" version="1" comment="xen-doc-pdf is &lt;4.2.5_08-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567255" version="1" comment="xen-kmp-default is &lt;4.2.5_08_3.0.101_0.47.55-0.9.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567256" version="1" comment="xen-kmp-pae is &lt;4.2.5_08_3.0.101_0.47.55-0.9.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567257" version="1" comment="xen-libs is &lt;4.2.5_08-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567258" version="1" comment="xen-libs-32bit is &lt;4.2.5_08-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567259" version="1" comment="xen-tools is &lt;4.2.5_08-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567260" version="1" comment="xen-tools-domU is &lt;4.2.5_08-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009339308" version="1" comment="clutter is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333937" version="1" comment="xen is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334253" version="1" comment="PolicyKit is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567451" version="1" comment="xen is &lt;4.4.2_10-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567452" version="1" comment="xen-doc-html is &lt;4.4.2_10-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567453" version="1" comment="xen-kmp-default is &lt;4.4.2_10_3.0.101_63-5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567454" version="1" comment="xen-kmp-pae is &lt;4.4.2_10_3.0.101_63-5.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567455" version="1" comment="xen-libs is &lt;4.4.2_10-5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567456" version="1" comment="xen-libs-32bit is &lt;4.4.2_10-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567457" version="1" comment="xen-tools is &lt;4.4.2_10-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567458" version="1" comment="xen-tools-domU is &lt;4.4.2_10-5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338881" version="1" comment="mozilla-nss is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594048" version="1" comment="dnsmasq is &lt;2.71-0.12.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333974" version="1" comment="gnutls is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594152" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.105.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594153" version="1" comment="xorg-x11-server is &lt;7.4-27.105.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594154" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.105.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334254" version="1" comment="perl-XML-LibXML is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594162" version="1" comment="kvm is &lt;1.4.2-0.22.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567163" version="1" comment="xen is &lt;4.2.5_06-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567164" version="1" comment="xen-doc-html is &lt;4.2.5_06-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567165" version="1" comment="xen-doc-pdf is &lt;4.2.5_06-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567166" version="1" comment="xen-kmp-default is &lt;4.2.5_06_3.0.101_0.47.52-0.7.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567167" version="1" comment="xen-kmp-pae is &lt;4.2.5_06_3.0.101_0.47.52-0.7.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567168" version="1" comment="xen-libs is &lt;4.2.5_06-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567169" version="1" comment="xen-libs-32bit is &lt;4.2.5_06-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567170" version="1" comment="xen-tools is &lt;4.2.5_06-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567171" version="1" comment="xen-tools-domU is &lt;4.2.5_06-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594173" version="1" comment="wireshark is &lt;1.10.14-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563893" version="1" comment="wireshark is &lt;1.12.7-0.5.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334257" version="1" comment="netpbm is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566604" version="1" comment="gnutls is &lt;2.4.1-24.39.57.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566605" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.57.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566606" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567004" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.35.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567005" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594176" version="1" comment="libmysql55client18 is &lt;5.5.43-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594177" version="1" comment="libmysql55client18-32bit is &lt;5.5.43-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594178" version="1" comment="libmysql55client_r18 is &lt;5.5.43-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594179" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.43-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594180" version="1" comment="libmysqlclient15 is &lt;5.0.96-0.8.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594181" version="1" comment="libmysqlclient15-32bit is &lt;5.0.96-0.8.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594182" version="1" comment="libmysqlclient_r15 is &lt;5.0.96-0.8.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594183" version="1" comment="libmysqlclient_r15-32bit is &lt;5.0.96-0.8.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594184" version="1" comment="mysql is &lt;5.5.43-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594185" version="1" comment="mysql-client is &lt;5.5.43-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567006" version="1" comment="openldap2-client is &lt;2.4.26-0.35.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567018" version="1" comment="openssh is &lt;6.2p2-0.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567019" version="1" comment="openssh-askpass is &lt;6.2p2-0.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567020" version="1" comment="openssh-askpass-gnome is &lt;6.2p2-0.21.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567414" version="1" comment="openssh is &lt;6.6p1-13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567415" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-13.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567416" version="1" comment="openssh-helpers is &lt;6.6p1-13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338883" version="1" comment="xz is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567459" version="1" comment="xen is &lt;4.4.3_02-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567460" version="1" comment="xen-doc-html is &lt;4.4.3_02-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567461" version="1" comment="xen-kmp-default is &lt;4.4.3_02_3.0.101_65-26.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567462" version="1" comment="xen-kmp-pae is &lt;4.4.3_02_3.0.101_65-26.2 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567463" version="1" comment="xen-libs is &lt;4.4.3_02-26.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567464" version="1" comment="xen-libs-32bit is &lt;4.4.3_02-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567465" version="1" comment="xen-tools is &lt;4.4.3_02-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567466" version="1" comment="xen-tools-domU is &lt;4.4.3_02-26.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567160" version="1" comment="wpa_supplicant is &lt;0.7.1-6.17.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567161" version="1" comment="wpa_supplicant-gui is &lt;0.7.1-6.17.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594206" version="1" comment="strongswan is &lt;4.4.0-6.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594207" version="1" comment="strongswan-doc is &lt;4.4.0-6.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334260" version="1" comment="cabextract is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566522" version="1" comment="MozillaFirefox is &lt;38.2.1esr-19.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566523" version="1" comment="MozillaFirefox-branding-SLED is &lt;31.0-0.12.51 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566524" version="1" comment="MozillaFirefox-translations is &lt;38.2.1esr-19.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566525" version="1" comment="libfreebl3 is &lt;3.19.2.0-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566526" version="1" comment="libfreebl3-32bit is &lt;3.19.2.0-0.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566527" version="1" comment="libsoftokn3 is &lt;3.19.2.0-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566528" version="1" comment="libsoftokn3-32bit is &lt;3.19.2.0-0.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566529" version="1" comment="mozilla-nss is &lt;3.19.2.0-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566530" version="1" comment="mozilla-nss-32bit is &lt;3.19.2.0-0.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566531" version="1" comment="mozilla-nss-tools is &lt;3.19.2.0-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566630" version="1" comment="gtk2 is &lt;2.18.9-0.35.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566631" version="1" comment="gtk2-32bit is &lt;2.18.9-0.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566632" version="1" comment="gtk2-lang is &lt;2.18.9-0.35.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566486" version="1" comment="MozillaFirefox is &lt;38.3.0esr-22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566487" version="1" comment="MozillaFirefox-translations is &lt;38.3.0esr-22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566484" version="1" comment="mozilla-nspr is &lt;4.10.9-11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566485" version="1" comment="mozilla-nspr-32bit is &lt;4.10.9-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566488" version="1" comment="MozillaFirefox is &lt;38.4.0esr-25.6 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566489" version="1" comment="MozillaFirefox-branding-SLED is &lt;38-15.31 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566490" version="1" comment="MozillaFirefox-translations is &lt;38.4.0esr-25.6 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566491" version="1" comment="libfreebl3 is &lt;3.19.2.1-19.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566492" version="1" comment="libfreebl3-32bit is &lt;3.19.2.1-19.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566493" version="1" comment="libsoftokn3 is &lt;3.19.2.1-19.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566494" version="1" comment="libsoftokn3-32bit is &lt;3.19.2.1-19.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566495" version="1" comment="mozilla-nspr is &lt;4.10.10-16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566496" version="1" comment="mozilla-nspr-32bit is &lt;4.10.10-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566497" version="1" comment="mozilla-nss is &lt;3.19.2.1-19.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566498" version="1" comment="mozilla-nss-32bit is &lt;3.19.2.1-19.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566499" version="1" comment="mozilla-nss-tools is &lt;3.19.2.1-19.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009339310" version="1" comment="IPython is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566646" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.91-0.14.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566647" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.91-0.14.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566648" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.91-0.14.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566649" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.95-0.17.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566650" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.95-0.17.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566651" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.95-0.17.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566541" version="1" comment="flash-player is &lt;11.2.202.491-0.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566542" version="1" comment="flash-player-gnome is &lt;11.2.202.491-0.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566543" version="1" comment="flash-player-kde4 is &lt;11.2.202.491-0.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338821" version="1" comment="ntp is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566779" version="1" comment="kvm is &lt;1.4.2-0.22.34.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567386" version="1" comment="kvm is &lt;1.4.2-32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567300" version="1" comment="xen is &lt;4.4.2_12-23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567301" version="1" comment="xen-doc-html is &lt;4.4.2_12-23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567302" version="1" comment="xen-kmp-default is &lt;4.4.2_12_3.0.101_63-23.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567303" version="1" comment="xen-kmp-pae is &lt;4.4.2_12_3.0.101_63-23.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567304" version="1" comment="xen-libs is &lt;4.4.2_12-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567305" version="1" comment="xen-libs-32bit is &lt;4.4.2_12-23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567306" version="1" comment="xen-tools is &lt;4.4.2_12-23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567307" version="1" comment="xen-tools-domU is &lt;4.4.2_12-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567144" version="1" comment="sblim-sfcb is &lt;1.3.11-0.25.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333990" version="1" comment="audit is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566924" version="1" comment="libvdpau1 is &lt;0.4.1-16.20.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566925" version="1" comment="libvdpau1-32bit is &lt;0.4.1-16.20.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334326" version="1" comment="util-linux is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334261" version="1" comment="icedtea-web is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567333" version="1" comment="icedtea-web is &lt;1.5.3-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334046" version="1" comment="ceph is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567124" version="1" comment="libldb1 is &lt;3.6.3-64.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567125" version="1" comment="libldb1-32bit is &lt;3.6.3-64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567126" version="1" comment="libsmbclient0 is &lt;3.6.3-64.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567127" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567128" version="1" comment="libtalloc2 is &lt;3.6.3-64.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567129" version="1" comment="libtalloc2-32bit is &lt;3.6.3-64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567130" version="1" comment="libtdb1 is &lt;3.6.3-64.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567131" version="1" comment="libtdb1-32bit is &lt;3.6.3-64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567132" version="1" comment="libtevent0 is &lt;3.6.3-64.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567133" version="1" comment="libtevent0-32bit is &lt;3.6.3-64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567134" version="1" comment="libwbclient0 is &lt;3.6.3-64.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567135" version="1" comment="libwbclient0-32bit is &lt;3.6.3-64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567136" version="1" comment="samba is &lt;3.6.3-64.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567137" version="1" comment="samba-32bit is &lt;3.6.3-64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567138" version="1" comment="samba-client is &lt;3.6.3-64.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567139" version="1" comment="samba-client-32bit is &lt;3.6.3-64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567140" version="1" comment="samba-doc is &lt;3.6.3-64.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567141" version="1" comment="samba-krb-printing is &lt;3.6.3-64.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567142" version="1" comment="samba-winbind is &lt;3.6.3-64.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567143" version="1" comment="samba-winbind-32bit is &lt;3.6.3-64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567320" version="1" comment="libgcc_s1 is &lt;5.3.1+r233831-10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567321" version="1" comment="libgcc_s1-32bit is &lt;5.3.1+r233831-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567322" version="1" comment="libgfortran3 is &lt;5.3.1+r233831-10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567323" version="1" comment="libgfortran3-32bit is &lt;5.3.1+r233831-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567324" version="1" comment="libgomp1 is &lt;5.3.1+r233831-10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567325" version="1" comment="libgomp1-32bit is &lt;5.3.1+r233831-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567326" version="1" comment="libquadmath0 is &lt;5.3.1+r233831-10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567327" version="1" comment="libquadmath0-32bit is &lt;5.3.1+r233831-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567328" version="1" comment="libstdc++6 is &lt;5.3.1+r233831-10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567329" version="1" comment="libstdc++6-32bit is &lt;5.3.1+r233831-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567330" version="1" comment="libstdc++6-locale is &lt;5.3.1+r233831-10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567044" version="1" comment="libecpg6 is &lt;9.4.5-0.8.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567045" version="1" comment="libpq5 is &lt;9.4.5-0.8.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567046" version="1" comment="libpq5-32bit is &lt;9.4.5-0.8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567056" version="1" comment="postgresql91 is &lt;9.1.19-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567057" version="1" comment="postgresql91-docs is &lt;9.1.19-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567047" version="1" comment="postgresql94 is &lt;9.4.5-0.8.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567048" version="1" comment="postgresql94-docs is &lt;9.4.5-0.8.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567261" version="1" comment="xen is &lt;4.2.5_18-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567262" version="1" comment="xen-doc-html is &lt;4.2.5_18-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567263" version="1" comment="xen-doc-pdf is &lt;4.2.5_18-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567264" version="1" comment="xen-kmp-default is &lt;4.2.5_18_3.0.101_0.47.71-21.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567265" version="1" comment="xen-kmp-pae is &lt;4.2.5_18_3.0.101_0.47.71-21.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567266" version="1" comment="xen-libs is &lt;4.2.5_18-21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567267" version="1" comment="xen-libs-32bit is &lt;4.2.5_18-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567268" version="1" comment="xen-tools is &lt;4.2.5_18-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567269" version="1" comment="xen-tools-domU is &lt;4.2.5_18-21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567475" version="1" comment="xen is &lt;4.4.3_06-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567476" version="1" comment="xen-doc-html is &lt;4.4.3_06-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567477" version="1" comment="xen-kmp-default is &lt;4.4.3_06_3.0.101_65-29.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567478" version="1" comment="xen-kmp-pae is &lt;4.4.3_06_3.0.101_65-29.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567479" version="1" comment="xen-libs is &lt;4.4.3_06-29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567480" version="1" comment="xen-libs-32bit is &lt;4.4.3_06-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567481" version="1" comment="xen-tools is &lt;4.4.3_06-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567482" version="1" comment="xen-tools-domU is &lt;4.4.3_06-29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567390" version="1" comment="libvirt is &lt;1.2.5-12.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567391" version="1" comment="libvirt-client is &lt;1.2.5-12.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567392" version="1" comment="libvirt-client-32bit is &lt;1.2.5-12.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567393" version="1" comment="libvirt-doc is &lt;1.2.5-12.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334264" version="1" comment="samba4 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566356" version="1" comment="bind-libs is &lt;9.9.6P1-0.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566357" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566358" version="1" comment="bind-utils is &lt;9.9.6P1-0.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567152" version="1" comment="libtidy is &lt;1.0-37.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566547" version="1" comment="flash-player is &lt;11.2.202.521-0.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566548" version="1" comment="flash-player-gnome is &lt;11.2.202.521-0.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566549" version="1" comment="flash-player-kde4 is &lt;11.2.202.521-0.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566550" version="1" comment="flash-player is &lt;11.2.202.535-0.20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566551" version="1" comment="flash-player-gnome is &lt;11.2.202.535-0.20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566552" version="1" comment="flash-player-kde4 is &lt;11.2.202.535-0.20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566990" version="1" comment="libsnmp15 is &lt;5.4.2.1-8.12.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563731" version="1" comment="libsnmp15-32bit is &lt;5.4.2.1-8.12.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566991" version="1" comment="net-snmp is &lt;5.4.2.1-8.12.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566992" version="1" comment="perl-SNMP is &lt;5.4.2.1-8.12.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566993" version="1" comment="snmp-mibs is &lt;5.4.2.1-8.12.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566359" version="1" comment="bind-libs is &lt;9.9.6P1-0.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566360" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566361" version="1" comment="bind-utils is &lt;9.9.6P1-0.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567010" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.62.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567011" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.62.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567012" version="1" comment="openldap2-client is &lt;2.4.26-0.62.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566322" version="1" comment="MozillaFirefox is &lt;38.5.0esr-28.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566323" version="1" comment="MozillaFirefox-translations is &lt;38.5.0esr-28.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567100" version="1" comment="rpcbind is &lt;0.1.6+git20080930-6.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566780" version="1" comment="kvm is &lt;1.4.2-37.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567387" version="1" comment="kvm is &lt;1.4.2-35.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566633" version="1" comment="gtk2 is &lt;2.18.9-0.39.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566634" version="1" comment="gtk2-32bit is &lt;2.18.9-0.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566635" version="1" comment="gtk2-lang is &lt;2.18.9-0.39.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567449" version="1" comment="libtiff3 is &lt;3.8.2-141.163.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567450" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.163.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566572" version="1" comment="giflib is &lt;4.1.6-13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566573" version="1" comment="giflib-32bit is &lt;4.1.6-13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567428" version="1" comment="libldb1 is &lt;3.6.3-67.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567429" version="1" comment="libldb1-32bit is &lt;3.6.3-67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567430" version="1" comment="libsmbclient0 is &lt;3.6.3-67.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567431" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567432" version="1" comment="libtalloc2 is &lt;3.6.3-67.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567433" version="1" comment="libtalloc2-32bit is &lt;3.6.3-67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567434" version="1" comment="libtdb1 is &lt;3.6.3-67.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567435" version="1" comment="libtdb1-32bit is &lt;3.6.3-67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567436" version="1" comment="libtevent0 is &lt;3.6.3-67.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567437" version="1" comment="libtevent0-32bit is &lt;3.6.3-67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567438" version="1" comment="libwbclient0 is &lt;3.6.3-67.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567439" version="1" comment="libwbclient0-32bit is &lt;3.6.3-67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567440" version="1" comment="samba is &lt;3.6.3-67.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567441" version="1" comment="samba-32bit is &lt;3.6.3-67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567442" version="1" comment="samba-client is &lt;3.6.3-67.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567443" version="1" comment="samba-client-32bit is &lt;3.6.3-67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567444" version="1" comment="samba-doc is &lt;3.6.3-67.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567445" version="1" comment="samba-krb-printing is &lt;3.6.3-67.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567446" version="1" comment="samba-winbind is &lt;3.6.3-67.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567447" version="1" comment="samba-winbind-32bit is &lt;3.6.3-67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566957" version="1" comment="libfreebl3 is &lt;3.19.2.2-22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566958" version="1" comment="libfreebl3-32bit is &lt;3.19.2.2-22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566959" version="1" comment="libsoftokn3 is &lt;3.19.2.2-22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566960" version="1" comment="libsoftokn3-32bit is &lt;3.19.2.2-22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566961" version="1" comment="mozilla-nss is &lt;3.19.2.2-22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566962" version="1" comment="mozilla-nss-32bit is &lt;3.19.2.2-22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566963" version="1" comment="mozilla-nss-tools is &lt;3.19.2.2-22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566553" version="1" comment="flash-player is &lt;11.2.202.540-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566554" version="1" comment="flash-player-gnome is &lt;11.2.202.540-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566555" version="1" comment="flash-player-kde4 is &lt;11.2.202.540-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566556" version="1" comment="flash-player is &lt;11.2.202.548-0.26.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566557" version="1" comment="flash-player-gnome is &lt;11.2.202.548-0.26.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566558" version="1" comment="flash-player-kde4 is &lt;11.2.202.548-0.26.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333994" version="1" comment="gdk-pixbuf is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567412" version="1" comment="ntp is &lt;4.2.8p4-5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567413" version="1" comment="ntp-doc is &lt;4.2.8p4-5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566984" version="1" comment="libmysql55client18 is &lt;5.5.47-0.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566985" version="1" comment="libmysql55client18-32bit is &lt;5.5.47-0.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566986" version="1" comment="libmysql55client_r18 is &lt;5.5.47-0.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566987" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.47-0.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566988" version="1" comment="mysql is &lt;5.5.47-0.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566989" version="1" comment="mysql-client is &lt;5.5.47-0.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563895" version="1" comment="wireshark is &lt;1.12.9-0.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566851" version="1" comment="libpng12-0 is &lt;1.2.31-5.35.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566852" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566362" version="1" comment="bind-libs is &lt;9.9.6P1-0.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566363" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566364" version="1" comment="bind-utils is &lt;9.9.6P1-0.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567148" version="1" comment="strongswan is &lt;4.4.0-6.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567149" version="1" comment="strongswan-doc is &lt;4.4.0-6.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567286" version="1" comment="xscreensaver is &lt;5.07-6.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334009" version="1" comment="libxml2 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566559" version="1" comment="flash-player is &lt;11.2.202.554-0.29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566560" version="1" comment="flash-player-gnome is &lt;11.2.202.554-0.29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566561" version="1" comment="flash-player-kde4 is &lt;11.2.202.554-0.29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566853" version="1" comment="libpng12-0 is &lt;1.2.31-5.38.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566854" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334290" version="1" comment="sudo is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566565" version="1" comment="foomatic-filters is &lt;3.0.2-269.39.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566616" version="1" comment="grub2-x86_64-efi is &lt;2.00-0.49.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566617" version="1" comment="grub2-x86_64-xen is &lt;2.00-0.49.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567331" version="1" comment="grub2-x86_64-efi is &lt;2.00-0.54.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567332" version="1" comment="grub2-x86_64-xen is &lt;2.00-0.54.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566562" version="1" comment="flash-player is &lt;11.2.202.559-0.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566563" version="1" comment="flash-player-gnome is &lt;11.2.202.559-0.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566564" version="1" comment="flash-player-kde4 is &lt;11.2.202.559-0.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566396" version="1" comment="dhcp is &lt;4.2.4.P2-0.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566397" version="1" comment="dhcp-client is &lt;4.2.4.P2-0.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567383" version="1" comment="krb5 is &lt;1.6.3-133.49.106.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567384" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.106.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567385" version="1" comment="krb5-client is &lt;1.6.3-133.49.106.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566365" version="1" comment="bind-libs is &lt;9.9.6P1-0.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566366" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566367" version="1" comment="bind-utils is &lt;9.9.6P1-0.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333958" version="1" comment="bind is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566942" version="1" comment="libxml2 is &lt;2.7.6-0.37.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566943" version="1" comment="libxml2-32bit is &lt;2.7.6-0.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566944" version="1" comment="libxml2-python is &lt;2.7.6-0.37.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334265" version="1" comment="pidgin-otr is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567335" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.99-0.20.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567336" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.99-0.20.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567337" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.99-0.20.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567389" version="1" comment="libssh2 is &lt;0.2-5.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566387" version="1" comment="curl is &lt;7.19.7-1.46.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566388" version="1" comment="libcurl4 is &lt;7.19.7-1.46.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566389" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567021" version="1" comment="openssh is &lt;6.2p2-0.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567022" version="1" comment="openssh-askpass is &lt;6.2p2-0.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567023" version="1" comment="openssh-askpass-gnome is &lt;6.2p2-0.24.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567417" version="1" comment="openssh is &lt;6.6p1-16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567418" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-16.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567419" version="1" comment="openssh-helpers is &lt;6.6p1-16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564877" version="1" comment="libssh2-1 is &lt;1.2.9-4.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567317" version="1" comment="flash-player is &lt;11.2.202.577-0.38.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567318" version="1" comment="flash-player-gnome is &lt;11.2.202.577-0.38.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567319" version="1" comment="flash-player-kde4 is &lt;11.2.202.577-0.38.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567314" version="1" comment="flash-player is &lt;11.2.202.569-0.35.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567315" version="1" comment="flash-player-gnome is &lt;11.2.202.569-0.35.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567316" version="1" comment="flash-player-kde4 is &lt;11.2.202.569-0.35.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567308" version="1" comment="bind-libs is &lt;9.9.6P1-0.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567309" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567310" version="1" comment="bind-utils is &lt;9.9.6P1-0.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009339313" version="1" comment="dhcpcd is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567287" version="1" comment="MozillaFirefox is &lt;38.6.1esr-34.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567288" version="1" comment="MozillaFirefox-translations is &lt;38.6.1esr-34.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334008" version="1" comment="libvpx is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566945" version="1" comment="MozillaFirefox is &lt;38.6.0esr-31.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566946" version="1" comment="MozillaFirefox-branding-SLED is &lt;38-18.24 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566947" version="1" comment="MozillaFirefox-translations is &lt;38.6.0esr-31.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566948" version="1" comment="libfreebl3 is &lt;3.20.2-25.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566949" version="1" comment="libfreebl3-32bit is &lt;3.20.2-25.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566950" version="1" comment="libsoftokn3 is &lt;3.20.2-25.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566951" version="1" comment="libsoftokn3-32bit is &lt;3.20.2-25.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566952" version="1" comment="mozilla-nss is &lt;3.20.2-25.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566953" version="1" comment="mozilla-nss-32bit is &lt;3.20.2-25.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566954" version="1" comment="mozilla-nss-tools is &lt;3.20.2-25.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567289" version="1" comment="MozillaFirefox is &lt;38.7.0esr-37.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567290" version="1" comment="MozillaFirefox-translations is &lt;38.7.0esr-37.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567291" version="1" comment="libfreebl3 is &lt;3.20.2-28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567292" version="1" comment="libfreebl3-32bit is &lt;3.20.2-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567293" version="1" comment="libsoftokn3 is &lt;3.20.2-28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567294" version="1" comment="libsoftokn3-32bit is &lt;3.20.2-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567295" version="1" comment="mozilla-nspr is &lt;4.12-24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567296" version="1" comment="mozilla-nspr-32bit is &lt;4.12-24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567297" version="1" comment="mozilla-nss is &lt;3.20.2-28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567298" version="1" comment="mozilla-nss-32bit is &lt;3.20.2-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567299" version="1" comment="mozilla-nss-tools is &lt;3.20.2-28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338984" version="1" comment="busybox is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334293" version="1" comment="puppet is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567388" version="1" comment="libotr2 is &lt;3.2.0-10.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338895" version="1" comment="giflib is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334276" version="1" comment="cairo is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334077" version="1" comment="tiff is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338897" version="1" comment="libksba is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334249" version="1" comment="gd is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338972" version="1" comment="dnsmasq is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334069" version="1" comment="binutils is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334297" version="1" comment="poppler is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009339330" version="1" comment="xpdf is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334308" version="1" comment="OpenEXR is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009339004" version="1" comment="ppp is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334180" version="1" comment="lua is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
</tests>
<objects>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sled-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mailx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-library</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libecpg6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpq5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpq5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql94</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql94-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zsh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>telepathy-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bytefx-data-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibm-data-db2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-data-firebird</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-data-oracle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-data-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-data-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-data-sybase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-jscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-locale-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-nunit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-wcf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-winforms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monodoc-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls26</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls26-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl0_9_8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl0_9_8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-rdp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cabextract</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-askpass</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-glib4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-qt4-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-pae-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-pae-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-pae-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-syms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-trace-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-trace-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-trace-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-xen-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-xen-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-xen-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-kmp-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit-1_0-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-ews</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-ews-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-pilot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>popt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>popt-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>usbmuxd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-client-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-manager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vm-install</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-doc-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-doc-pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-tools-domU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-vm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zypper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zypper-log</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inst-source-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtspi1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtspi1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>trousers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaugeas0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtalloc2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtalloc2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtdb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtdb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-krb-printing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xinetd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-i18ndata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nscd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acroread</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acroread-cmaps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acroread-fonts-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acroread-fonts-ko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acroread-fonts-zh_CN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acroread-fonts-zh_TW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acroread_ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cifs-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-branding-SLED</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-translations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-openssl097g</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-openssl097g-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-2_4-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-2_4-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xfsprogs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-bigsmp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kvm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sblim-sfcb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quota</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>permissions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icedtea-web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagick++1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickCore1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickCore1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickWand1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libotr2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fetchmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc_s1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc_s1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfortran3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfortran3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgomp1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgomp1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquadmath0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquadmath0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-base-drivers-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-base-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-calc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-calc-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-draw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-draw-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-filters-optional</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-cs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-da</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-en-GB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-en-US</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-gu-IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-hi-IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-hu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-ko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-nl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-pt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-pt-BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-ru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-sv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-zh-CN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-zh-TW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-themes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-impress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-impress-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-kde</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-kde4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-af</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-cs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-da</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-en-GB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-fi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-gu-IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-hi-IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-hu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pt-BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-xh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zh-CN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zh-TW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-mailmerge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-mono</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-officebean</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-pyuno</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-writer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-writer-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-fonts-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-fonts-rus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-fonts-std</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-omni</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimpprint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy0-config-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy0-config-gnome-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy0-config-kde4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy0-networkmanager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy0-networkmanager-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs4-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkde4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkde4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdecore4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdecore4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQtWebKit4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQtWebKit4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-qt3support</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-qt3support-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-mysql-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-postgresql-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-sqlite-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-unixODBC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-unixODBC-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-x11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flash-player</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flash-player-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flash-player-kde4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bogofilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-plugins-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient15-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient_r15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient_r15-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysql55client18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysql55client18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysql55client_r18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysql55client_r18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inkscape</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inkscape-extensions-dia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inkscape-extensions-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inkscape-extensions-fig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inkscape-extensions-gimp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inkscape-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ft2demos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpg2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpg2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtalloc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtalloc1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>finch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-meanwhile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-tcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcpcd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip-hpijs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coreutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coreutils-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql91</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>beagle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>beagle-evolution</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>beagle-firefox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>beagle-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>beagle-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mhtml-firefox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpixman-1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpixman-1-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-setuptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>puppet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>telepathy-gabble</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pwlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pwlib-plugins-avc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pwlib-plugins-dc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pwlib-plugins-v4l2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsvg-view</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfs-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfs-kernel-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-Xvnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libX11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libX11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libX11-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXext-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXext-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXfixes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXfixes-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXfixes-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXrender</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXrender-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXrender-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXv-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXv-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXt-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clamav</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvpn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXp-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libxcb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libxcb-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libxcb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>socat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzypp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython2_6-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython2_6-1_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kgreeter-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-wallpapers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-workspace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-workspace-ksysguardd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kwin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orca-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lcms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-2_4-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-2_4-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-wireless-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-wireless-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-wireless-kmp-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vino</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vino-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pywbem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpixman-1-0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lxc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgadu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-ar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-cs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-da</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-da-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-da-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-de-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-de-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-en_GB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-es-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-es-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-fr-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-fr-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-hu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-it-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-it-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-ko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-nb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-nl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-nl-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-nl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-pl-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-pl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-pt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-pt_BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-pt_BR-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-pt_BR-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-ru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-ru-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-ru-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-sv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-sv-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-sv-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-zh_CN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-zh_TW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-runtime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-runtime-xine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql91-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xalan-j2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>a2ps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mutt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>novell-qtgui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>novell-qtgui-cli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>novell-ui-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsnmp15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsnmp15-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-SNMP</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>snmp-mibs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdirstat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-askpass-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>DirectFB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rxvt-unicode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-lxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ppp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpgme</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgpgme11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsman1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openwsman-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openwsman-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pure-ftpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>suseRegister</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wpa_supplicant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wpa_supplicant-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse-browse0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse-mainloop-glib0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-esound-compat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-gdm-hooks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-bluetooth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-gconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-jack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-lirc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-zeroconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Module-Build</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Test-Simple</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblzo2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblzo2-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wget</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mdadm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>LibVNCServer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreadline5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreadline5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>readline-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevent-1_4-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>google-carlito-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhyphen0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmythes-1_2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-theme-galaxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-theme-tango</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-en</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-gu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-hi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pt-PT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zh-Hans</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zh-Hant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-sdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-share-linker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-voikko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvoikko1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-af_NA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-af_ZA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_AE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_BH</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_DZ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_EG</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_IQ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_JO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_KW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_LB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_LY</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_MA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_OM</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_QA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_SA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_SD</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_SY</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_TN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_YE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-be_BY</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-bg_BG</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-bn_BD</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-bn_IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-bs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-bs_BA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ca_AD</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ca_ES</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ca_ES_valencia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ca_FR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ca_IT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-cs_CZ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-da_DK</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-de_AT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-de_CH</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-de_DE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-dictionaries</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-el_GR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_AU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_BS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_BZ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_CA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_GB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_GH</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_IE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_JM</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_MW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_NA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_NZ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_PH</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_TT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_US</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_ZA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_ZW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_AR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_BO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_CL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_CO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_CR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_CU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_DO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_EC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_ES</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_GT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_HN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_MX</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_NI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_PA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_PE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_PR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_PY</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_SV</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_UY</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_VE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-et_EE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-fr_BE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-fr_CA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-fr_CH</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-fr_FR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-fr_LU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-fr_MC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-gu_IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-he_IL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-hi_IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-hr_HR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-hu_HU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-it_IT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-lightproof-en</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-lightproof-hu_HU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-lightproof-pt_BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-lightproof-ru_RU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-lo_LA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-lt_LT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-lv_LV</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-nb_NO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-nl_BE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-nl_NL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-nn_NO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-no</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-pl_PL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-pt_AO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-pt_BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-pt_PT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ro_RO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ru_RU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sk_SK</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sl_SI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sr_CS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sr_Latn_CS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sr_Latn_RS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sr_RS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sv_FI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sv_SE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-te</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-te_IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-th_TH</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-vi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-vi_VN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-zu_ZA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-importlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsync</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tcpdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC++6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpio-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uuid-runtime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>elfutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdw1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdw1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebl1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelf1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelf1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpfr1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmspack0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xdg-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vorbis-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ecryptfs-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ecryptfs-utils-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imlib2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libext2fs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-bad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-bad-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasecamerabinsrc-0_10-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasecamerabinsrc-0_10-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasevideo-0_10-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasevideo-0_10-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstphotography-0_10-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstphotography-0_10-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstsignalprocessor-0_10-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstsignalprocessor-0_10-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvdp-0_10-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvdp-0_10-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>patch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apport</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grep</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzip1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fuse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfuse2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clutter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PolicyKit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dnsmasq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-XML-LibXML</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netpbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-helpers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>IPython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtidy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpcbind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>giflib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>giflib-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xscreensaver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>foomatic-filters</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-x86_64-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-x86_64-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-otr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvpx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xpdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenEXR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua</name>
	</rpminfo_object>
</objects>
<states>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">11.2</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">11.3</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.5-1.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009079458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">0</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">11.4</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.6-0.14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.6-0.14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.5-1.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.7.p357-0.9.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.7-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.3.99-3.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-2.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1p1-41.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.3-1.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.26-0.7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_04_3.0.101_0.7.17-0.5.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_04_3.0.101_0.7.17-0.5.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.7-0.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.28.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.29.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.29.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-0.10.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.24-19.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.24-19.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-7.26.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7-37.50.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7-37.50.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2.3-37.50.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2.3-37.50.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.7-5.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.6-0.15.71</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.6-0.15.71</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.0-3.17.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.7-0.11.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.9-0.7.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.2_18-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.2_18_3.0.31_0.9-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.2_18_3.0.31_0.9-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.2_18-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17.10-0.5.42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.166-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17.175-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2012.9.13-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0.0_b24.1.11.4-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.7-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.7-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.0-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.14-130.133.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.35.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.35.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.35.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.58-0.6.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.3_06_3.0.58_0.6.2-0.7.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:9.5.3-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.6-0.4.2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.2-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0.0_b24.1.11.5-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.51-0.7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6ESVR7P1-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6ESVR7P1-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.7-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-0.6.7.80</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13.6-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13.6-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.24.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.24.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.24.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.34-0.7.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.31-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.2-4.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.2-4.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.74-0.6.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.4_02_3.0.74_0.6.6-0.5.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.8-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4_02_3.0.101_0.35-0.7.45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4_04_3.0.101_0.40-0.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.15.1-0.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.42-0.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.38-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.11-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.7-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16-50.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2013.1.7-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.6-0.21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.0-3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.10-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.2_20-0.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.2_20_3.0.38_0.5-0.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.0-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3.8.90-13.20.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.12-0.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.3_02-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.3_02_3.0.38_0.5-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.3_02-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.6-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.6-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.14-0.5.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.3_04-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.3_04_3.0.42_0.7-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.3_04_3.0.42_0.7-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.3_04-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.25.0-5.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.9.1-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.1+r226025-2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.1+r226025-2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.15.1-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4.P1-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6ESVR7P2-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6ESVR7P2-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4.P2-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.9-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-0.6.7.85</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.15-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.10-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.3-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.3-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.11-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.4.13-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.4.13-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6ESVR7P3-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6ESVR7P3-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_02_3.0.101_0.46-0.7.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_02_3.0.101_0.42-0.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.62-32.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.45.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.45.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.45.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.56.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.56.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.56.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-172.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-172.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.150.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.150.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.1-2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.1-2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.1-2.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.1-2.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.7.p357-0.9.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.1-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.1-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2-5.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6ESVR7P4-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6ESVR7P4-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.243-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.336-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.251-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-174.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.3_06-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.3_06_3.0.51_0.7.9-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.4_02_3.0.58_0.6.6-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.3_06-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-3.34.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.4-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.42-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.42-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.6.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.6.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.4_02-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.4_02_3.0.58_0.6.6-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.4_02-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.46-62.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.258-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.12-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.1-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.1-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.33.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.33.33.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.33.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.33.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.3-1.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.3-1.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.33.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.6-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.80.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.80.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.80.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.3-45.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.80-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.5_02_3.0.80_0.5-0.5.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.82-0.7.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_08_3.0.101_0.47.55-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_08_3.0.101_0.47.55-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0.0_b27.1.12.3-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.6-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.6-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.10-0.6.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.3-1.42.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.3-1.42.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.12-6.25.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.20.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.20.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.8-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.8-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.23-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.6-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0.0_b27.1.12.5-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0.0_b27.1.12.2-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.273-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.261-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.262-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.270-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:9.5.4-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.6-0.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.275-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.3esr-0.4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-0.6.9.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.8-56.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.2-0.4.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.2-0.4.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5-1.47.51.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5-0.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5-0.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.4esr-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.6esr-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-0.6.9.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.3-0.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.3-0.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.6-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.6-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.5esr-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0.0_b27.1.12.4-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.58-0.6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.3_06_3.0.58_0.6.6-0.7.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.93-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.5_02_3.0.93_0.5-0.5.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.93-0.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.2_06_3.0.93_0.8-0.7.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.280-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009138409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_02-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_02_3.0.93_0.5-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_02_3.0.93_0.5-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_02-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3_02-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3_02_3.0.93_0.8-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3_02_3.0.93_0.8-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3_02-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0.0_b27.1.12.6-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.6-0.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.5-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.24.4-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.24.4-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6c8-10.19.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.18-0.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.61.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.61.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.7esr-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-0.6.9.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.7esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.8esr-0.4.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.8esr-0.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.9esr-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.9esr-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.10esr-0.4.2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-0.6.9.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.1-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.1-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.10esr-0.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-0.12.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.2-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.2-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.3-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.3-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.3-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.3-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.10-2.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.6p2-0.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.3-1.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.7.p357-0.9.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.33-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.33-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.6.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.6.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.10-120.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.3-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.3-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.0-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.0-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.9-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.9-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.5_02-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.5_02_3.0.74_0.6.10-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.5_02_3.0.74_0.6.10-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.5_02-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3_08-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3_08_3.0.101_0.8-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3_08_3.0.101_0.8-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3_08-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.3-18.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.3-18.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.70.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.20.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.20.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.152.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.152.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.11.2-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.11.2-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.15.1-0.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.97.8-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-143.33.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-143.40.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.22.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.22.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.74-0.6.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.4_02_3.0.74_0.6.8-0.5.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3_08_3.0.101_0.15-0.7.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.20.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.20.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.2_06-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.2_06_3.0.82_0.7-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.2_06_3.0.82_0.7-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.2_06-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_02_3.0.101_0.5-0.5.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3_02_3.0.101_0.8-0.7.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.87.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.87.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.87.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4_02-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4_02_3.0.101_0.15-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4_02_3.0.101_0.15-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4_02-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4.P2-0.11.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.6-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.8-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:9.5.5-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.6-0.4.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.285-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.74-0.6.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.4_02_3.0.74_0.6.10-0.5.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.17.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.291-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.297-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.310-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.18-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.0-1.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.1-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.37.1-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0.0_b27.1.12.7-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.6-0.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.7.p357-0.9.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.33.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.33.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.3-1.46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.3-1.46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.33.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.12.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.11.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3.3.26-0.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3.3.26-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3.3.26-0.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.154.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.154.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.8-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.8-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.3-0.5.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-77.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-77.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.6-0.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.6-0.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5.6-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5.6-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.37-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.37-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.6.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.6.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4_04-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4_04_3.0.101_0.40-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4_04_3.0.101_0.40-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4_04-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_04_3.0.101_0.7.15-0.5.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.33.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.70.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.83.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4_02_3.0.101_0.21-0.7.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_04-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_04_3.0.101_0.5-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_04_3.0.101_0.5-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_04-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_02-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_02_3.0.101_68-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_02_3.0.101_68-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_02-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.20.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.20.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13_3.0.101_0.31-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13_3.0.101_0.31-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.18-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.18-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.3P2-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.3P2-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.9-0.2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.18-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4p8-1.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.327-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.332-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.2.0esr-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24-0.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.3.1-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.3.1-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.1-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.6-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.11-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7-6.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.70.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.85.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.16.0-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.16.0-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.24.4-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.24.4-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7-37.60.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7-37.60.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2.3-37.60.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2.3-37.60.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5.8-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5.8-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.0-0.21.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5.9-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5.9-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5.9-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5.9-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.2-1.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.98.5-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.6-0.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.12-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.12-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_04_3.0.101_0.47.50-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_04_3.0.101_0.47.50-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.82.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.82.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.82.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6c11-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.20.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.20.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2-5.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.12-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.12-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.6p2-0.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.0-217.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.28.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.28.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.52.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.52.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.52.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4_02_3.0.101_0.29-0.7.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_14-18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_14_3.0.101_0.47.67-18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_14_3.0.101_0.47.67-18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_14-18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13-1326.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.17-42.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.335-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.341-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.346-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.350-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.359-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.356-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.378-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.394-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.400-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.406-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.411-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.418-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.481-0.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.425-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4P2-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4P2-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.0-0.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.0-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.3.0esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24-0.7.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.4-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.4-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.4.0esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24-0.7.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.4-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.4-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.5.0esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24-0.7.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.6.0esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24-0.7.48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.1-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.1-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.6-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.6-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.7.0esr-0.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.2-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.2-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.8.0esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.4-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.4-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.7-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.7-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.5-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.5-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.4.0esr-0.8.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.17.3-0.8.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.17.3-0.8.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.2.0esr-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.0-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.17.2-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.17.2-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.7-0.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.7-0.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.3.0esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4_04_3.0.101_0.40-0.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.24-43.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.24-43.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.13-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.2.1-8.12.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.2.1-8.12.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.65-0.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.39-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.39-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.6.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.6.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.4-255.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.5-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.5-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.05-1.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.6-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.5.git-2.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.3-4.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5-1.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5-1.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.6-25.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.2.1-8.12.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.2.1-8.12.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.75-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.3-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.22-3.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4-1.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.43-0.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.43-0.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22-240.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.21.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5.9-0.19.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5.9-0.19.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.318.81ee561d-0.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1-6.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3.3.26-0.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3.3.26-0.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3.3.26-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.6-0.25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.24-43.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.24-43.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.23-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.23-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.71-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2808.01-0.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.72-0.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.03-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.03-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.33.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.4-1.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.72.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.72.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.72.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-156.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2-147.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2-147.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2-147.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.5-24.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.10-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2-147.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2-147.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2-147.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.7.p357-0.9.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-143.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.0-3.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.160.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.160.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.1-134.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.1-134.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.00-11.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.00-11.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.03.beta1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.8-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.4.2-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1-2.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.1-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20150827-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.15-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.15-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-2.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.424-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.23.1-0.23.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_02-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_02_3.0.101_0.40-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.12.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.11.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.11-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.8-1.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.1-68.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.1-68.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.1-134.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.1-134.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.4-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9-75.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19.1-6.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19.1-6.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.17-42.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.8-1.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4p8-1.29.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4p8-1.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.98.6-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.152-4.9.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.152-4.9.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.12-6.25.32.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.2-3.118.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20060920alpha-74.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-174.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-7.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-7.30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.35.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.35.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.54.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.54.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.6p2-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:61-1.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:61-1.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.36.RC1-52.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.67.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.67.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.67.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20060920alpha-74.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.95.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.95.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.95.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.74.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.74.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.74.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.41.9-2.10.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19.1-6.62.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009101461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19.1-6.62.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.41.9-2.10.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.103.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009139612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.46-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.46-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.34.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.34.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.429-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.438-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.440-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.442-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.451-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.457-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.75-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.12-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.7.0esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.22-7.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.22-7.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.6.0esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.5.3esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.5.0esr-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.8.4-206.29.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.0-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.33.41.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.22.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.9-4.2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4p8-1.29.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.34.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_04-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_04_3.0.101_0.47.52-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_04_3.0.101_0.47.52-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_04-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.98.7-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.13-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.7-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.45-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.45-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.85-0.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.103.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.103.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.8.0esr-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2_CKBI_1.98-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2_CKBI_1.98-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.8-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.8-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_12-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_12_3.0.101_0.47.55-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_12_3.0.101_0.47.55-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_12-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5-1.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5-1.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.460-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.466-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.508-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.468-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.18-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.7-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.22.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_08-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_08_3.0.101_0.47.55-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_08_3.0.101_0.47.55-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_08-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2_10-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2_10_3.0.101_63-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2_10_3.0.101_63-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2_10-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.71-0.12.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.22.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_06-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_06_3.0.101_0.47.52-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_06_3.0.101_0.47.52-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_06-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.14-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.7-0.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.43-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.43-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.8.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.8.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-13.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.3_02-26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.3_02_3.0.101_65-26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.3_02_3.0.101_65-26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.3_02-26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1-6.17.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.2.1esr-19.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.0-0.12.51</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2.0-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2.0-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.3.0esr-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.9-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.9-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.4.0esr-25.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38-15.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2.1-19.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2.1-19.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.10-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.10-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.91-0.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.95-0.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.491-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.22.34.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2_12-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2_12_3.0.101_63-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2_12_3.0.101_63-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2_12-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.11-0.25.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.1-16.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.1-16.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.1+r233831-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.1+r233831-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.5-0.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.5-0.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.19-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_18-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_18_3.0.101_0.47.71-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_18_3.0.101_0.47.71-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_18-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.3_06-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.3_06_3.0.101_65-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.3_06_3.0.101_65-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.3_06-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.521-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.535-0.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.2.1-8.12.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.2.1-8.12.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.62.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.62.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.5.0esr-28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.6+git20080930-6.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.163.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.163.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-67.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-67.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-67.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2.2-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2.2-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.540-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.548-0.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p4-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.47-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.47-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.9-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.07-6.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.554-0.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.2-269.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.00-0.49.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.00-0.54.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.559-0.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4.P2-0.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.106.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.106.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.37.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.99-0.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2-5.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.24.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-16.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.9-4.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.577-0.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.569-0.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.6.1esr-34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.6.0esr-31.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38-18.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.7.0esr-37.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.0-10.5.1</evr>
  </rpminfo_state>
</states>
</oval_definitions>
